On 11/20/2013 3:10 AM, fma spew wrote:
Our customers' end-users have their end-user certificates stored in the
"Personal logical certificate store" on Windows. The rest of needed
certificates, ("Intermediary" and/or "Trusted Root Certificates") are also
stored on Windows certificate stores. Our plug-in allows the end-user to
choose one of those "Personal" certificates and create digital signatures.
ok, there are several different actions here:

* get access to a personal signing certificate
* sign a document with it

I'm pretty sure that WebCrypto will have a way so sign a document with a certificate. It's not clear to me whether WebCrypto as currently specced also has a way to prompt the user to access personal certificates. bsmith/ekr, do you know what the capabilities are?

It seems like a clear win to me for our cryptosystem to be able to access certificates in CAPI, whether or not we honor the system root certificates by default or not. This could also be used with the existing system of HTTPS client certificates, which is seldom used on the web currently primarily because the UI sucks.



  3- We haven't found any indication of Mozilla about alternatives for these
kind of plug-ins, meaning plug-ins that need access to, in this case,
Windows stuff. Google has provided alternatives though.

Can you be more specific about the alternatives in Chrome?
I was referring to NaCl. We have not tested yet using CAPI to get to
Personal certificates from NaCl. So we do not know yet whether this case
falls into the "unsafe activities" that NaCl prevents (see
https://developers.google.com/native-client/overview#common-use-cases).
From what I know of NaCl, you won't be able to get outside the sandbox and access any system libraries, so unless Chrome makes client certificates available to you via API, it won't help this use case.

We might have wrongly interpreted Mozilla's position and plan regarding the
support of NPAPI. Our perception was that even Mozilla was thinking about
phasing out NPAPI in the near future (end of 2014) and that no alternative
technology was present.
This is simply not true, it is FUD spread by Chrome developers who ought to know better. We believe NPAPI plugins are a legacy technology, and we want to build the web platform so that plugins aren't necessary. We also have security and stability issues with common plugins, and so we have designed the opt-in click to activate mechanism so that users are aware of the third-party code running in their browser. But for desktop Firefox, NPAPI is likely to be around for the predictable future (three years?).

--BDS

_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to