Hi

In our case, we use <keygen> to generate a keypair on our SSCD (smartcard)
using Firefox, cause -with the PKCS#11 module configured-, it asks where to
store the keys, so the user select CARD.

Using Webcrypto or other JS stuff I wont be able to populate my smartcards,
so -IMHO- you should keep it as long as there's a real alternative for this
kind of operations.
You already removed signText and since then I cannot use "national
certificates renewal" feature on Firefox (only on IE)...not with Edge or
Firefox.

I know a lot of colleagues with the same problem, and that's why there has
been a rumble about "out of scope smartcards on Webcrypto".

I could agree with you that smartcards are not intended for Web, they suck
and whatever...but if you start to remove this feature, then it's time I
start looking for other Job :P




On Fri, Jul 31, 2015 at 1:00 PM, Hubert Kario <hka...@redhat.com> wrote:

> On Thursday 30 July 2015 14:32:01 Richard Barnes wrote:
> > On Thu, Jul 30, 2015 at 6:53 AM, Hubert Kario <hka...@redhat.com> wrote:
> > > On Wednesday 29 July 2015 16:35:41 David Keeler wrote:
> > > > [cc'd to dev-security for visibility. This discussion is intended to
> > > > happen on dev-platform; please reply to that list.]
> > > >
> > > > Ryan Sleevi recently announced the pre-intention to deprecate and
> > > > eventually remove support for the <keygen> element and special-case
> > > > handling of the application/x-x509-*-cert MIME types from the blink
> > > > platform (i.e. Chrome).
> > > >
> > > > Much, if not all, of that reasoning applies to gecko as well.
> > > > Furthermore, it would be a considerable architectural improvement if
> > > > gecko were to remove these features (particularly with respect to
> e10s).
> > > > Additionally, if they were removed from blink, the compatibility
> impact
> > > > of removing them from gecko would be lessened.
> > > >
> > > > I therefore propose we follow suit and begin the process of
> deprecating
> > > > and removing these features. The intention of this post is to begin a
> > > > discussion to determine the feasibility of doing so.
> > >
> > > because pushing people to use Internet Explorer^W^W Spartan^W Edge in
> > > enterprise networks is a good plan to continue loosing market share for
> > > Mozilla products! /s
> > >
> > > lack of easy, cross-application certificate deployment is the _reason_
> for
> > > low
> > > rates of deployment of client certificates, but where they are
> deployed,
> > > they
> > > are _critical_
> >
> > <keygen> doesn't help you with cross-application deployment.  After all,
> IE
> > doesn't support it.
>
> and how removing <keygen> makes the situation better?
>
> yes, Firefox doesn't deploy to system cert store (by default), but it's a
> bug
> in Firefox, not a feature
> --
> Regards,
> Hubert Kario
> _______________________________________________
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform
>
>
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to