On Thursday, 30 July 2015 20:32:07 UTC+2, Richard Barnes  wrote:
> On Thu, Jul 30, 2015 at 6:53 AM, Hubert Kario <hka...@redhat.com> wrote:
> 
> > On Wednesday 29 July 2015 16:35:41 David Keeler wrote:
> > > [cc'd to dev-security for visibility. This discussion is intended to
> > > happen on dev-platform; please reply to that list.]
> > >
> > > Ryan Sleevi recently announced the pre-intention to deprecate and
> > > eventually remove support for the <keygen> element and special-case
> > > handling of the application/x-x509-*-cert MIME types from the blink
> > > platform (i.e. Chrome).
> > >
> > > Rather than reiterate his detailed analysis, I'll refer to the post here:
> > >
> > >
> > https://groups.google.com/a/chromium.org/d/msg/blink-dev/pX5NbX0Xack/kmHsyMG
> > > JZAMJ
> >
> > <snarky sarcasm>
> > Well, gmail doesn't support S/MIME or GPG/MIME so obviously <keygen> is
> > useless and should be removed.
> > </snarky sarcasm>
> >
> > > Much, if not all, of that reasoning applies to gecko as well.
> > > Furthermore, it would be a considerable architectural improvement if
> > > gecko were to remove these features (particularly with respect to e10s).
> > > Additionally, if they were removed from blink, the compatibility impact
> > > of removing them from gecko would be lessened.
> > >
> > > I therefore propose we follow suit and begin the process of deprecating
> > > and removing these features. The intention of this post is to begin a
> > > discussion to determine the feasibility of doing so.
> >
> > because pushing people to use Internet Explorer^W^W Spartan^W Edge in
> > enterprise networks is a good plan to continue loosing market share for
> > Mozilla products! /s
> >
> > lack of easy, cross-application certificate deployment is the _reason_ for
> > low
> > rates of deployment of client certificates, but where they are deployed,
> > they
> > are _critical_
> >
> 
> <keygen> doesn't help you with cross-application deployment.  After all, IE
> doesn't support it.
> 
> 
> 
> > you really suggest I should tell regular people to copy paste CSR's, keep
> > safe
> > their private keys and be able to pair keys to certs when even programmers
> > and
> > system administrators have problems with current certificate deployments?
> > (user certs vs web server certs)
> >
> 
> The point has been made a couple of times that you can pretty effectively
> polyfill <keygen> with either WebCrypto or JS crypto libraries.  You can do
> the whole key generation and enrollment process that way, and the only
> manual step is to download the cert and import it into the browser.  Do it
> with JS, and you can support far more browsers than <keygen> supports today.

I don't think you can. I argued this in more detail on the html5 commit to 
deprecate keygen
https://github.com/whatwg/html/commit/1b438067d84da2ee95988842cdd8fe2655444936
which I noted has not had much discussion other than a PR that was quickly 
accepted.

I opened an issue on the whatwg github database so that the discussions could 
be cross referenced, and the arguments be out in the open.

> 
> --Richard
> 
> 
> > suggesting removal of such a feature because is not often used is like
> > suggesting removal of mains valve because it is not used often
> >
> > And I say it as a former sysadmin, not Red Hat employee.
> > --
> > Regards,
> > Hubert Kario
> >
> >
> > _______________________________________________
> > dev-platform mailing list
> > dev-platform@lists.mozilla.org
> > https://lists.mozilla.org/listinfo/dev-platform
> >
> >
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to