RE: About generating a new rootcert module (nssckbi lib)

2003-01-06 Thread Cesard, Patrick O.
I want to be able to load trusted root CA certs and valid (but not trusted)
intermediate CA certs.  NSS requires an unbroken CA chain up to a root in
order to validate a cert, and some SSL apps don't always send a CA chain. 

-- POC

-Original Message-
From: Ian McGreer [mailto:[EMAIL PROTECTED]]
Sent: Friday, January 03, 2003 3:15 PM
To: [EMAIL PROTECTED]
Subject: Re: About generating a new rootcert module (nssckbi lib)


Actually, why do you want to create a builtin CA with valid CA trust? 
The purpose of the builtin module is to supply trusted roots, which is 
probably why valid CA trust was overlooked - we only use the trusted CA bit.

-Ian

Ian McGreer wrote:
 POC wrote:
 
 Hello,

 The addbuiltin cmd creates a certdata.txt, which is then used to build
 the nssckbi lib. A couple of things about that:

 1. The new certdata.txt does not get processed properly by
 certdata.perl (when doing the gmake generate in
 mozilla\security\nss\lib\ckfw\builtins); but got it to work (i.e., the
 certdata.c file gets created and I can gmake the nssckbi lib) by
 manually adding the CVS_ID at the top of the certdata.txt file; but
 there's still a problem with the perl script; here's the error
 message:

 Name main::a used only once: possible typo at certdata.perl line
 212.
 Can't do inplace edit:  is not a regular file at certdata.perl line
 48.
 
 
 
 The addbuiltin command does not create certdata.txt.  It is meant to 
 add to certdata.txt.  There is some special text, including the cvsid, 
 at the beginning of that file that needs to be processes by the script. 
  As noted in addbuiltin.c, the correct usage is addbuiltin ...  
 certdata.txt.
 
 2. The trust flags specified when running addbuiltin do not stay the
 same after listing the cert with certutil: E.g., I specified trust
 flags c,, when running addbuiltin, but certutil shows p,p,p when
 listing the cert...
 
 
 That sounds like a bug.  It appears that addbuiltin does not support 
 valid CA trust (probably because that value was added later).
 
 -Ian
 




Re: How do I set the default Certificate?

2003-01-06 Thread Julien Pierre
Hi,

tom glaab wrote:

Julien Pierre [EMAIL PROTECTED] wrote


In truth, most people do not have more than one valid cert per issuer 
with a different subject, much less more than one valid cert for more 
than one issuer. 


I'm in the minority then, and it is annoying. I've had a corporate
cert for years, and it includes an email cert. Now a mandate has come
down for everybody to get an identity-only cert from the same
corporate CA, even if you already have one.


Normally, this is acomplished not by changing the subject of the 
certificate, but by changing the keyusage. Changing the subject does not 
make sense if the two certs belong to the same person and are from the 
same issuer. This tells me your PKI is not implemented correctly.

For example, I have two corporate certs, one which is for encryption and 
another for signing. The subject of both certificates is identical. The 
signing certificate is used for identification purposes. You can see 
them both in the signature of this message.

I do find it annoying. While it's probably rare to find a person with
multiple certs from the same CA I can see it happening more often... a
single user may have his normal identity cert but also have a
privileged or administrative cert. This probably shows more about the
corporation's ignorance of PKI, but that's another story.


Well, there you go ...



smime.p7s
Description: S/MIME Cryptographic Signature


Re: Mozilla, PKCS#11 and MacOSX ???

2003-01-06 Thread Wan-Teh Chang
bk390934 wrote:

I'm trying to understand what Mozilla 1.2 and 1.3 for MacOSX are made of.

I am a total newbie to MacOSX and I have some basic questions:
- is Mozilla a CFM or MachO app?


Mozilla 1.2 is a CFM app.

I believe Mozilla 1.3 will be a Mach-O app.  Please ask in
netscape.public.mozilla.macosx to confirm this.


- does it use Carbon or Cocoa?


Mozilla 1.2 (a CFM app) uses Carbon.

I believe the Mach-O version of Mozilla 1.3 will use
Carbon, but again please ask in netscape.public.mozilla.macosx
to confirm this.

Note that there is a Mach-O, Cocoa browser called Chimera that
is based on the Gecko embedding environment from the Mozilla
project.


- does it support PKCS#11 modules that are MachO dylibs?


The Mach-O version of Mozilla supports PKCS#11 modules that are
Mach-O dylibs.

The CFM version of Mozilla only supports PKCS#11 modules that
are CFM shlbs.


- what are the requirements for PKCS#11 modules specifically for the MacOSX 
version of Mozilla, where is this documented (didn't find it), what type of 
library is required?

A fully PKCS#11 compliant module should have no problem working
with Mozilla.  It seems that the authors of some PKCS#11 modules
only aim to implement the subset of PKCS#11 that Mozilla uses.
Perhaps there are practical problems with a full implementation
of PKCS#11.

We used to have a PKCS#11 conformance test suite.  That test
suite is somewhat out of date now because in NSS 3.4+ (used in
Mozilla 1.0.1 or later) we started to use more PKCS#11 features.
The PKCS#11 features we currently use are not documented.

Wan-Teh





Re: About generating a new rootcert module (nssckbi lib)

2003-01-06 Thread Ian McGreer
POC wrote:

I want to be able to load trusted root CA certs and valid (but not
trusted) intermediate CA certs.  NSS requires an unbroken CA chain up
to a root in order to validate a cert, and some SSL apps don't always
send a CA chain along with their end user cert. I therefore pre-load
some of the known intermediate CAs I know will be issuing certs to
such apps.

-- POC



As Wan-Teh pointed out, those servers are misconfigured.  However, I 
will note that at any rate, you don't need to give the intermediate 
certs valid CA trust.  That trust bit is essentially a hack for the 
browser.  It is used to mark certs as CA certs when they cannot 
otherwise be determined as such (e.g., missing the basic constraints 
extension, etc.)  The chain will be constructed properly if the 
intermediates are given no trust, which is the correct thing to do.

-Ian