Re: Words from Comodo?

2008-12-31 Thread Rob Stradling
On Monday 29 December 2008 13:50:58 Eddy Nigg wrote: There is now an interest article at the register: http://www.theregister.co.uk/2008/12/29/ca_mozzilla_cert_snaf/ snip Interesting that Comodo founded the CAB forum and Comodo created a standard for domain control validation. I wonder where

Re: MD5 irretrievably broken

2008-12-31 Thread Rob Stradling
On Tuesday 30 December 2008 22:07:08 Kyle Hamilton wrote: I would suggest requiring all new roots approved to state that they do not and will not use MD5 in any newly-minted certificate (except possibly in a configuration like the TLS pseudo-random function). FWIW, Comodo have never signed

Re: Words from Comodo?

2008-12-31 Thread Rob Stradling
On Tuesday 30 December 2008 22:22:11 Gervase Markham wrote: Ian G wrote: As far as I heard, the CABForum was also formed or inspired from a similar group of vendors (browsers) that got together at the invite of the Konqueror guy to talk about phishing one day ... I'm fairly sure it wasn't

RE: How do I get the certificates out of the builtin object token?

2008-12-31 Thread David Stutzman
Ahh...I did it from my Vista workstation's firefox profile which I knew had the roots module added. Nssckbi.dll or libnssckbi.so or whatever it is on a Mac is a special PKCS#11 module that is read-only and contains the trust anchors. By default with an NSS database, it's not added. You can

RE: symmetric key issues with NSS 3.12

2008-12-31 Thread David Stutzman
-Original Message- From: On Behalf Of Nelson B Bolyard Sent: Tuesday, December 30, 2008 2:25 PM Attempting to create a 128 byte (1024 bit) aes key on the token: C:\nss\fipssymkeyutil -K -n aesKey3 -t aes -s 128 -d . Enter Password or Pin for NSS FIPS 140-2 Certificate DB: aesKey3

Re: How do I get the certificates out of the builtin object token?

2008-12-31 Thread Kyle Hamilton
KyleMac:.netscape kyanha$ modutil -add roots -libfile /Applications/Firefox.app/Contents/MacOS/libnssckbi.dylib -dbdir . WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser

Re: PositiveSSL is not valid for browsers

2008-12-31 Thread Gervase Markham
Eddy Nigg wrote: perhaps Mozilla should start to use EV certs for the update mechanism of Firefox and *enforce* it? There might be many other sites which potentially could wreak havoc not measurable in terms of money only. Perhaps we should. Can you file a bug about this, please? There may be

Re: PositiveSSL is not valid for browsers

2008-12-31 Thread Gervase Markham
Kyle Hamilton wrote: Hmmm... actually, it would be possible, but only with the cooperation of the CAs. We currently know the EV policy OIDs for EV-enabled roots. What we don't know is the policy OIDs assigned for different types of validation, ...nor do we have, more to the point, a

Re: PositiveSSL is not valid for browsers

2008-12-31 Thread Ian G
On 31/12/08 15:38, Gervase Markham wrote: Eddy Nigg wrote: perhaps Mozilla should start to use EV certs for the update mechanism of Firefox and *enforce* it? There might be many other sites which potentially could wreak havoc not measurable in terms of money only. Perhaps we should. Can you

Re: PositiveSSL is not valid for browsers

2008-12-31 Thread Eddy Nigg
On 12/31/2008 04:36 PM, Gervase Markham: Kyle Hamilton wrote: Hmmm... actually, it would be possible, but only with the cooperation of the CAs. We currently know the EV policy OIDs for EV-enabled roots. What we don't know is the policy OIDs assigned for different types of validation, ...nor

Re: PositiveSSL is not valid for browsers

2008-12-31 Thread Ian G
On 31/12/08 01:31, Ben Bucksch wrote: On 30.12.2008 23:34, Kyle Hamilton wrote: That difference /can/ be communicated to the end-user, unobtrusively. Sure, but they can't use that information. I just asked a friend whether she knows what VeriSign is - she never heard of it. If you have no

Re: How do I get the certificates out of the builtin object token?

2008-12-31 Thread Nelson B Bolyard
Kyle Hamilton wrote, On 2008-12-31 06:36 PST: KyleMac:.netscape kyanha$ modutil -add roots -libfile /Applications/Firefox.app/Contents/MacOS/libnssckbi.dylib -dbdir . WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the

Re: CAs and external entities (resellers, outsourcing)

2008-12-31 Thread Frank Hecker
Kyle Hamilton wrote: Ummm... has an enterprise PKI ever been included in Mozilla? Sorry, I wasn't being clear here. I'm not referring to enterprises that have their own root CAs. I was referring to schemes where enterprises work through CAs like VeriSign to issue certificates to their own

RE: Can't unwrap key into NSS in FIPS mode

2008-12-31 Thread David Stutzman
Nelson, I wonder if anything from this thread has any bearing here as you describe some FIPS restrictions: http://groups.google.com/group/mozilla.dev.tech.crypto/browse_thread/thread/a5d22af274d36c6a?pli=1 I've been trying to help out Alex in the Sun forums and pointed him over here with this

RE: Can't unwrap key into NSS in FIPS mode

2008-12-31 Thread David Stutzman
If I wrap/unwrap with a token object RSA key, I get a different error trying to encrypt with the unwrapped AES key: RSA key from NSS DB: SunPKCS11-NSSfips RSA private key, 2048 bits (id 2464323849, token object, sensitive, extractable) pulled sym key out of keystore? SunPKCS11-NSSfips AES

Re: Can't unwrap key into NSS in FIPS mode

2008-12-31 Thread Nelson B Bolyard
David Stutzman wrote, On 2008-12-31 11:30: If I wrap/unwrap with a token object RSA key, I get a different error trying to encrypt with the unwrapped AES key: RSA key from NSS DB: SunPKCS11-NSSfips RSA private key, 2048 bits (id 2464323849, token object, sensitive, extractable) pulled sym

Re: MD5 broken, certs whose signatures use MD5 now vulnerable

2008-12-31 Thread Nelson B Bolyard
Frank Hecker wrote, On 2008-12-31 10:48 PST: Nelson B Bolyard wrote: A representative of Verisign has posted a response to this issue at https://blogs.verisign.com/ssl-blog/2008/12/on_md5_vulnerabilities_and_mit.php The VeriSign post is not 100% clear on exactly how VeriSign has removed

Re: MD5 broken, certs whose signatures use MD5 now vulnerable

2008-12-31 Thread Ian G
Personally, I cannot see that there is an imminent danger. The attack requires substantial resource, unpublished techniques, dramatic timing attempts and retrys and no doubt other caveats ... and will be stopped whenever MD5 is dropped, which is apparantly very soon or already. See the

Re: How do I get the certificates out of the builtin object token?

2008-12-31 Thread Kyle Hamilton
Bug 471734. Poking around Apple's developer site, the only thing I can come up with for error -2804 is cfragNoLibraryErr, with the description The named library was not found. I'm also seeing that some functions in the code fragment library were deprecated in 10.5, but I can't find information

Re: MD5 broken, certs whose signatures use MD5 now vulnerable

2008-12-31 Thread Paul Hoffman
At 6:48 PM + 12/31/08, Frank Hecker wrote: Nelson B Bolyard wrote: A representative of Verisign has posted a response to this issue at https://blogs.verisign.com/ssl-blog/2008/12/on_md5_vulnerabilities_and_mit.php The VeriSign post is not 100% clear on exactly how VeriSign has removed this

Re: CAs and external entities (resellers, outsourcing)

2008-12-31 Thread Eddy Nigg
On 12/31/2008 08:57 PM, Frank Hecker: employees, servers, etc. IIRC in a number of these schemes the CA is responsible for actually issuing the certificates but the validation is done by the enterprise. (For example, the CA might provide a web-based interface by which authorized representatives

Re: CAs and external entities (resellers, outsourcing)

2008-12-31 Thread Eddy Nigg
On 12/31/2008 12:30 PM, Rob Stradling: Yes, Reseller and RA are 2 distinct roles. However, in some cases, a single entity may choose (and be approved) to perform both of these roles. I fully agree that the Reseller role should not perform any validation procedures at all. Robin, could you

Re: Security-Critical Information (i.e. Private Key) transmitted by Firefox to CA (i.e. Thawte) during X.509 key/cert generation

2008-12-31 Thread Daniel Veditz
Kaspar Brand wrote: Michael Ströder wrote: I'd love to have an option to forbid CRMFRequest calls... Not too difficult to achieve, actually. Just add this line to your prefs.js: user_pref(capability.policy.default.Crypto.generateCRMFRequest, noAccess); That may work now, but capability