Closed Bug 495876 Opened 16 years ago Closed 9 years ago

Implement key size array at KEYPARAMS in KEYGEN tag for RSA keys

Categories

(Core :: Security: PSM, enhancement)

enhancement
Not set
normal

Tracking

()

RESOLVED WONTFIX

People

(Reporter: eddy_nigg, Unassigned)

References

Details

(Whiteboard: [psm-enroll])

I don't know if this follows any accepted standard (for example HTML 5), but we should implement a way to set the requested key sizes offered in the select box for the KEYGEN tag when using RSA keys (the default). If no value is set, the default as per bug 495836 should be used. I'll try to propose a patch for this.
Eddy, be sure that any scheme you design works for DSA and ECDSA as well as for RSA.
I'm following right now two different ideas and I would appreciate some input: The minimum key size should never be below 2048 bit - otherwise fail - report error. 1.) One parameter with a string of comma limited numbers, e.g. "2048,3072,4096,5120". 2.) Only one parameter with a string of the required key size, e.g. "3072". Opinions?
> Opinions? 1. How does the proposed scheme work with DSA and ECDSA? 2. I'm not convinced that Mozilla should be forcing all its users to follow NIST's rules/minimums. As you may know, Firefox has a "FIPS mode" which claims to conform to the NIST requirements of FIPS 140-2. It is probably appropriate to enforce NIST minimum key sizes while in FIPS mode, but I would be reluctant to force it on users who care not about FIPS. Remember, RC4 is not a FIPS/NIST approved cipher, and it is STILL the single most used cipher in all of SSL/TLS, because it is the fastest and most economical (from a cost per transaction point of view). No browser today can realistically propose to stop supporting RC4. I think the situation with 1k bit USER certs is the same. I'd prefer to see investment going into crypto.generateCRMFRequest than into the KEYGEN tag. There are many advantages to CRMF, not the least of which is its ability to request certificates for keys that CANNOT be used for signing, which is comething that PKCS#10 and SPKAC cannot do.
1.) This bug should have no affect on DSA I think. 2.) This bug is about providing an option to set a preferred key size or an array of preferred key sizes by the site operator. This bug isn't about increasing the key size to satisfy NIST. Nevertheless we shouldn't use something below 2048 today for reasons stated in bug 495836. 3.) generateCRMFRequest isn't supported so far by any other browser to all of my knowledge. KEYGEN is supported by more than one. (also unfortunately my experience with generateCRMFRequest isn't that great, but that's beyond the issue here of course).
This may be drifting off topic, but what other browsers support KEYGEN?
The Webkit family (Safari, Konqueror and potentially also Chrome).
Assignee: kaie → nobody
Whiteboard: [psm-enroll]
We aren't allocating resources to improving keygen.
Status: NEW → RESOLVED
Closed: 9 years ago
Resolution: --- → WONTFIX
You need to log in before you can comment on or make changes to this bug.