The client-side processing of digital signatures is the major problem, I
think. And the main barrier against the adoption of PKI. Key stores are far
from a standardization. CryptoAPI, CNG, Mozilla, JAVA KS, CSP, PKCS#11, etc.


Bruno de Paula Ribeiro
Analista de Sistemas
(11) 4501 1886

Certisign Certificadora Digital
certisign.com.br



-----Mensagem original-----
De: dev-tech-crypto-bounces+bribeiro=certisign.com...@lists.mozilla.org
[mailto:dev-tech-crypto-bounces+bribeiro=certisign.com...@lists.mozilla.org]
Em nome de Anders Rundgren
Enviada em: terça-feira, 10 de fevereiro de 2009 17:39
Para: mozilla's crypto code discussion list
Assunto: Re: Application of client certificates on a US government website

Nelson B Bolyard wrote:
>>Kyle Hamilton wrote
>> Hey, I just ran into the first application of client certificate
>> authentication requirement on a public US government website that I've
>> seen.
<snip>

>I played with it a bit.
>As far as I can tell, it is not doing SSL client authentication, per se',
>at least not using the browser's built-in SSL client auth capabilities.
>The page https://sas.uspto.gov/authenticate/AuthenticateUserLocalEPF.html
>downloads some Javascript which in turn downloads a Java applet named
>EntrustTruePassClient.  This looks for a file on your local disk with
>a file name ending in .epf. The page says:
>> NOTE : DIGITAL CERTIFICATES provided by USPTO have a file name that ends
in ".epf".
>I gather that it also contains your private key.  What it does, exactly,
>after that is unknown to me.  I lost interest after seeing that it's not
>doing SSL client auth.

You are probably right.  May I as a person living in a country where
at least 20% of the adult population use "soft certificates" for on-line
banking and e-government services provide some facts why this
situation is far from being unique?

Soft certificates may be a piece of junk but they are at least available.

However, provisioning of soft certificates is close to N/A since
there is no standard and the stuff that's available is below any
reasonable quality; you cannot even set a PIN policy, not to
mention how different these schemes appear to users!

In Safari the user will have to select between medium or strong
keys and in Vista/IE you must typically put the issuer in the trusted
site-list in order to get a ActiveX control to work.

Therefore Java applets is a good choice since it make authentication
an application, taking care of the missing pieces, policy and
provisioning and it works in most browsers and OSes.

In case you feel that this is not what you want, may I suggest
that we start by identifying what's lacking and see if there is any
way we could fix it?

Regards
Anders
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to