W3C Releases First Working Draft of Web Crypto API 63
From David Dahl's weblog: "Good news! With a lot of hard work – I want to tip my hat to Ryan Sleevi at Google – the W3C Web Crypto API First Public Working Draft has been published.
If you have an interest in cryptography or DOM APIs and especially an interest in crypto-in-the-DOM, please read the draft and forward any commentary to the comments mailing list: public-webcrypto-comments@w3.org"
This should be helpful in implementing the Cryptocat vision. Features include a secure random number generator, key generation and management primitives, and cipher primitives. The use cases section suggests multi-factor auth, protected document exchange, and secure (from the) cloud storage: "When storing data with remote service providers, users may wish to protect the confidentiality of their documents and data prior to uploading them. The Web Cryptography API allows an application to have a user select a private or secret key, to either derive encryption keys from the selected key or to directly encrypt documents using this key, and then to upload the transformed/encrypted data to the service provider using existing APIs."
Update: 09/19 00:01 GMT by U L : daviddahl commented: "I have built a working extension that provides 'window.mozCrypto', which does SHA2 hash, RSA keygen, public key crypto and RSA signature/verification, see: https://addons.mozilla.org/en-US/firefox/addon/domcrypt/ and source: https://github.com/daviddahl/domcrypt I plan on updating the extension once the Draft is more settled (after a first round of commentary & iteration)"
Client/Server support? (Score:2)
Anyone know which browsers & httpd's are planning support for this soon? Webkit?
Re:Client/Server support? (Score:5, Insightful)
Chrome will probably put in an update which contains this when nobody's looking. Firefox will update two weeks after Chrome. And IE will take another two years, and their interface for it will be completely broken. Opera will have already had it implemented a month before everybody else, but nobody cares because nobody uses Opera.
Re: (Score:2)
I love how hilariously likely that comment is, but it also makes me kinda sad since I use Opera. :(
Re: (Score:1)
You'll notice that this is from David Dahl (at Mozilla)... with a Googler as co-author. Maybe Firefox will get there first.
Re: (Score:3)
Safari, Chrome, Firefox, and IE will all support this...in slightly different ways.
Re:Client/Server support? (Score:4, Insightful)
Re: (Score:3, Interesting)
Re: (Score:2)
Re: (Score:1)
How you secure your keyring is upto you.
Most users will like the convienence of a single password model, but this time that password never leaves the device you are using. Still at risk to keyloggers just like before.
You could if you wanted secure your own secret keyring using a mixture of methods, such as a combined smartcard, password and biometrics. The biometric code unlocks data on a smartcard, the smartcard provides part of the data to the browser and the password entered into the computer completes
Re:obvious question (Score:4, Informative)
Basically it's for when your so paranoid that you fear even your cloud service app provider.
For example, you go and use Cloud Doc Editor and write some docs and save them locally...
But what about the remote server? What's it doing with that data? Is it making copies?
Could it know you write erotic fan-fic about Captain Picard having sex with Rainbow Dash?
Re: (Score:1)
Basically it's for when your so paranoid that you fear even your cloud service app provider.
Maybe. The W3C draft lists "Cloud Storage" as one of its use cases [w3.org], but remember that the app provider is also delivering the JavaScript that runs the decryption and loads up the DOM, so it could intercept the plaintext or decryption key if it wished. It doesn't protect against a malicious cloud service app provider, but it does make it easier for them to secure against data breeches (if their backups were stolen, for instance) and/or rely on 3rd party storage providers.
This has really interesting implica
Re: (Score:2)
Probably not. Encryption-in-the-DOM doesn't really do much for that (and, anyway, SSL client certificates for authentication do more for that, but almost no one uses them.)
Re: (Score:2)
No it doesn't. It's just for crypto between server and client.
Re: (Score:2)
Re: (Score:2)
Well, there's encryption egg sausage and encryption, that's not got much encryption in it.
So, Why? (Score:1)
Why can't the server do it? Thin Client Fat Client... Why are you making my client fat Sir?
Re:So, Why? (Score:5, Informative)
If the server does the encryption, then the server has to see the unencrypted content.
If the client does the encryption, the server doesn't have to see the unencrypted content.
Also, if the server does the work and you have a million clients, then the server has to do a million units of work rather than the clients each doing one unit of work. This can make the server more impacted by traffic spikes and provide a less-consistent and sometimes lower-quality user experience than just offloading that work to the client.
Alternatively, its more expensive (more CPU = more $$) for the server operator, who often owns the app. So there's an incentive to build apps in a way that the work is offloaded.
Re: (Score:2)
The server can't decrypt the page for you. That would eliminate the entire point of encrypting the page in the first place. The server encrypts the page and gives it to you, then your browser decrypts it using this interface specified by the W3C. Are you actually dumb, or is that just a hobby?
Re: (Score:2)
That's SSL and has been here for 17 years. This API is useful for other stuff, like data that never leaves the client unencrypted.
Re: (Score:2)
This is more about encrypting your data in the client and storing data encrypted on the server. So when a server compromise happends your data can't be easily stolen.
I remember thinking about implementing this... (Score:4, Interesting)
It was because NearlyFreeSpeech doesn't support HTTPS, and I wanted to implement some sort of encryption. So, I figured that my server could encrypt pagelets and send them, and then the client could use a previously-established key to decrypt the pagelets, attaching them to the DOM structure in a logical way. The problem is, since JavaScript explicitly disallows XSS, I couldn't figure out a way to contact a separate key authority server. This meant that however I did it, I'd be (more) vulnerable to a man-in-the-middle attack.
Looking this over, it looks like this specification doesn't solve that issue. I know that key authorities can be compromised, but it's better to require two points of failure rather than one.
JavaScript and XSS (Score:3)
JavaScript doesn't "explicitly disallow XSS". Most browsers (through implementations of the still-in-draft Content Security Policy, and, for IE, additionally through its own "XSS filter") include means of restricting XSS, but those browsers also allow pages to control whether and how those XSS-limiting features are applied.
Re: (Score:3)
Re: (Score:3)
Expanding on that JSONP mention to hopefully save someone a googling...
XMLHTTPRequest calls are subject to single-origin policy, so can't be used for XSS. However, SCRIPT tags don't have this restriction, even for tags that are dynamically created using JavaScript. JSONP is a trick that leverages this to implement XSS.
The main limitation is that JSONP can't be used to call non-JSONP web services. So changes to the third-party service may be needed in order to support JSONP.
As an aside, dynamically loading i
Re: (Score:2)
Oh, derp. I don't know what I was thinking, then.
Re: (Score:3)
Uh... JavaScript has allowed cross-site XHR for going on four years now. It does, however, require appropriate configuration on the server you're contacting. The bigger problem with that design is that if your web hosting server doesn't support HTTPS, how will the third-party server handing out authentication tokens set the token on the server side?
No, this is better handled through a DH key exchange. Then both sides have a shared symmetric key, and both sides can store it locally (with client-side stora
Re: (Score:3)
I was thinking about this originally in January of 2011, and I think I remember finding people mentioning XHR but not finding anything beyond scant mentions. No good "what is this and how do I do" documentation. I was originally thinking a DH key exchange, but that requires you to store it each session, which means each session is vulnerable to MitM, or to use HTML5 things that were not widespread two years ago.
Re: (Score:3)
Right. HTML5 local storage is a fairly recent addition. You might also have been able to use a cookie with the "secure" flag set, which means the cookie is sent only over HTTPS connections, but AFAIK can be accessed in JavaScript code locally. I'm not certain whether such cookies are accessible through JavaScript that arrived over unencrypted HTTP, though, so that might not work.
Regarding cross-origin XHR, it's pretty straightforward. It works just like regular XHR. The only difference is that the ser
Re: (Score:2)
Right. HTML5 local storage is a fairly recent addition. You might also have been able to use a cookie with the "secure" flag set, which means the cookie is sent only over HTTPS connections, but AFAIK can be accessed in JavaScript code locally. I'm not certain whether such cookies are accessible through JavaScript that arrived over unencrypted HTTP, though, so that might not work.
You're supposed to be able to mark a cookie as being unavailable to Javascript (well, as being only for use with HTTP connections; secure transport of the cookie is an orthogonal attribute) but that's both something I wouldn't rely on working and also easy to disrupt from JS; there's nothing to stop any cookie from being overwritten with something else. Cookies aren't designed for deep security.
Re: (Score:2)
Tip: WebSockets don't have any cross-origin limitations. You can connect to anything from anywhere.
So there you go. Now you can make that key authority server :D
In other news... (Score:2)
Microsoft releases less secure copy of W3C Web Crypto API already implemented in Internet Explorer 10 called SecureXaml while citing the changes as "features".
Re: (Score:2)
Why do I even read news anymore? (Score:1)
They are never, ever good. Just more stupid crap that stresses me out and makes me tired.
Secure JavaScript crypto environment? (Score:1)
Douglas Crockford tends to disagree [crockford.com]. And he's not alone [matasano.com].
How do they mitigate these inherent security problems of the JavaScript platform in the API draft? With XSS, I can always overwrite the browser's crypto API object, replacing it with a rogue implementation.
My understanding has been that JavaScript in its present form is not a viable platform for cryptography.
Re: (Score:2)
I believe both Firefox and Chrome have support for:
http://www.w3.org/TR/CSP/ [w3.org]
Which allows for more control on where code should be loaded from.
Actually I think having crypto as part of the browser is a bigger chance of success then just implementing the crypto in Javascript as some people clearly have already done. You don't want to implement a cryptographically secure pseudorandom number generator in Javascript it will never be secure.
Re: (Score:1)
Re: (Score:2)
This. Providing proper crypto primitives in the JS standard library is a good thing, I suppose, but it doesn't solve any (and I do mean any) of the underlying problems with things like CryptoCat. CC actually had quite good crypto primitives (implemented from scrach in JS, but apparently implemented well).
The problem was that every time a user wanted to use CC, they had to download the page (and its JS) from the CC server... and there are so many ways to attack that. An obvious one is to insert a backdoor in
Re: (Score:2)
Re: (Score:2)
Um... no. No part of any of the attacks I described requires any interception or replacement of the crypto code (I thought I made that clear). You're still going to have to serve a webpage though. In fact, in order to use these new crypto functions, you're going to have to serve script as well.
I (the attacker, whether via MitM or server control or some other mechanism) can modify that to my heart's content. I don't even have to modify the existing scripts; just inject my own that captures every keystroke se
MashSSL (Score:2)
Why PKCS#1v1.5? (Score:4, Interesting)
Most of the time when you see people using it today it is for backwards compatibility, but in this case they are designing a brand new API. Why not go with the one which we know to be secure instead of encouraging the use of a dangerously vulnerable scheme?
Re: (Score:1)
Re: (Score:2)
It's not a working draft... (Score:1)
Re: (Score:2)
Re: (Score:2)
I have built a working extension that provides 'window.mozCrypto', which does SHA2 hash, RSA keygen, public key crypto and RSA signature/verification,
No offence, but that's about a hundredth of what SSLeay (the thing that came before OpenSSL) was doing 15 years ago. That's a long, long way to go before you have a general-purpose crypto API usable by web developers.
Re: (Score:2)
Off-topic, but you can actually already run an entire Linux OS in the browser. Of course, first you have to emulate an x86-based computer to run it on.
You think I'm joking... [bellard.org]
With your powers combined... (Score:1)