On 03/21/2009 09:32 PM, Ian G:
On 21/3/09 16:54, Eddy Nigg wrote:

Huu? No outcry about rudeness in mailing lists here?


Eddy, I agree that rudeness was carrying us away from the problem and on to the personalities. Indeed, it's up to all of us to be be minded of this. For reasons that are too wordy to be worth the bytes, I didn't do it, so thanks!

Well, I just thought that I'd remind you about how outraged you were when I said the same thing....besides that such comments were seen allover many times and I think it's just a funny expression. Perhaps you should offer to both of us some of your stuff so we'll have some fun together ;-)


Now, to the problem. It seems that we have a consensus that client certificates (in a client authentication role at least) are unusable with the current system.

I think that the word unusable is far too strong. See, there are improvements possible and most likely should be made at various levels, but unusable? I can claim tens of thousands of active accounts using nothing else than client certificate authentication. In the OpenID space I know about Verisign and some other providers offering them too - with StartSSL being a provider based solemnly on client cert authentication.

And, the way forward is more UI support [1], as suggested by Johnathan.

Yes, I think Johnath has a few ideas to make the UI better...

Now - long pause, deep breath - everything below which you mention sounds to me as if you are trying to invent client certificate authentication once again from scratch...well, it already exists and mostly works fairly well...most of it below works more or less the way you would like it to be...not sure what I'm missing or if you are missing something here...

...or perhaps indeed learn to configure your servers properly and get some advice on application programming, middle-ware, protocol layers and sessions...


a. For every request for a client-cert, there would be a request from low-level code to intermediate-level code for a key/certificate.

b. In the intermediate layer, that request would be matched against a list of pre-established tuples like {domain name, certificate, action, status}.

c. If the typle isn't found (which means the domain name wasn't indexed) then the intermediate level code would pass the request up to the higher-layer code to ask the user (pop-up?) :

    * which certificate to use (if more than one available)
    * whether to accept this choice:
      + once
      + for minutes (say 30 minutes, but configurable)
      + for now (in memory, not saved to disk) [2]
      + forever (save tuple to disk).
    * whether to display the client identity in use

d. The intermediate layer returns the key/cert to be used via either tuple matching or via user interface. Then, once the tuple is set/saved, we have a good chance of transparent session restart.

How does that sound?



iang

[1] Yes, we noted that servers may be misconfigured. But, waiting for the servers to be properly configured looks implausible, we might be waiting for a long time, and even then we won't have solved the full problem. It seems fairly clear that clients will *always* have to deal with it, regardless.

[2] For my money, I want the "for now" option because I want to be re-asked in a few days of what's going on ... and be forced to rethink whether I want a long term relationship here or not. I don't want the browser to store any relationship in any permanent store until I tell it. That's just me...


--
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: start...@startcom.org
Blog:   https://blog.startcom.org

--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to