Re: Promote performance improvements from #559508 and #559510 to 3.12.10?

2011-04-07 Thread Robert Relyea
On 04/07/2011 04:50 AM, Ignatenko, Aleksey V wrote: Hi, My name is Aleksey Ignatenko, I'm software engineer at Intel. I want to suggest integrating two performance enhancements from the trunk to the 3.12 branch - for NSS users to see NSS performance improvement in the nearest release

Re: Importing GPG public and private keys in NSS

2011-03-28 Thread Robert Relyea
On 03/28/2011 05:32 AM, Superpacko wrote: On 23 mar, 14:40, Robert Relyea rrel...@redhat.com wrote: On 03/23/2011 06:24 AM, Superpacko wrote: Well, so i 've been told that i shuld be able to extract the MPI as bytes and pass it to NSS since GPG original key format is PEM, i should be able

Re: Importing GPG public and private keys in NSS

2011-03-23 Thread Robert Relyea
On 03/23/2011 06:24 AM, Superpacko wrote: Well, so i 've been told that i shuld be able to extract the MPI as bytes and pass it to NSS since GPG original key format is PEM, i should be able to use MPIs data as raw bytes. If it's really PEM (which should be a printable string), then you should

Re: PK11_DigestBegin vs MD5_Begin()

2011-03-23 Thread Robert Relyea
On 03/22/2011 10:20 PM, Crypto User wrote: For creating hash I found 2 sets of APIs . There seem to be different APIs. E.g CreateDigestContext(SECOidTag hashAlg) and PK11_DigestBegin related APIs in https://developer.mozilla.org/en/NSS/Cryptography_functions or MD5_Begin() and related hash

Re: Hashing function in NSS

2011-03-23 Thread Robert Relyea
On 03/23/2011 01:32 PM, Crypto User wrote: On Mar 23, 12:05 pm, Honza Bambas honzab@firemni.cz wrote: On 3/22/2011 10:29 PM, Crypto User wrote: Hi , I am trying to create APIS which will provide Hashing functionality to end user. I am using NSS to provide this on Linux. I was trying to

Re: Hashing function in NSS

2011-03-23 Thread Robert Relyea
On 03/23/2011 02:02 PM, Honza Bambas wrote: On 3/23/2011 9:32 PM, Crypto User wrote: On Mar 23, 12:05 pm, Honza Bambashonzab@firemni.cz wrote: On 3/22/2011 10:29 PM, Crypto User wrote: Hi , I am trying to create APIS which will provide Hashing functionality to end user. I am using

Re: S/MIME Encryption Certificate without email address

2011-03-22 Thread Robert Relyea
On 03/22/2011 02:23 AM, silent...@gmail.com wrote: Well, the reasons are at least obvious to us :) - the card is supposed to be in use for least 5 years. Card owners (Health Care Providers in our case) should be able to use various email providers for exchanging medical reports. The email

Re: S/MIME Encryption Certificate without email address

2011-03-22 Thread Robert Relyea
On 03/22/2011 03:09 PM, silent...@gmail.com wrote: Thank you for the reply! On Mar 22, 7:00 pm, Robert Relyea rrel...@redhat.com wrote: Unless there is an authoritative way to bind the cert to a given email address, there is no way to use those certs for email. If you want email certs

Re: Importing GPG public and private keys in NSS

2011-03-18 Thread Robert Relyea
On 03/18/2011 08:06 AM, Superpacko wrote: On 17 mar, 18:35, Robert Relyea rrel...@redhat.com wrote: On 03/17/2011 11:33 AM, Superpacko wrote: On 17 mar, 15:20, Robert Relyea rrel...@redhat.com wrote: On 03/16/2011 01:54 PM, Superpacko wrote: Hi, im working on a software that uses GPG

Re: Importing GPG public and private keys in NSS

2011-03-17 Thread Robert Relyea
On 03/16/2011 01:54 PM, Superpacko wrote: Hi, im working on a software that uses GPG as a Key Manager but leaves the encryption operations to NSS. I'm having a hard time trying to figure out how to import GPG's public and private keys in NSS. GPG stores the keys in PKT_public_key and

Re: Importing GPG public and private keys in NSS

2011-03-17 Thread Robert Relyea
On 03/17/2011 11:33 AM, Superpacko wrote: On 17 mar, 15:20, Robert Relyea rrel...@redhat.com wrote: On 03/16/2011 01:54 PM, Superpacko wrote: Hi, im working on a software that uses GPG as a Key Manager but leaves the encryption operations to NSS. I'm having a hard time trying to figure out

Re: Need assistance - how can pwspec write key length be 0 after the client key exchange?

2011-03-15 Thread Robert Relyea
On 03/15/2011 02:50 PM, Gil Bahat wrote: Well, I didn't want to get much into the reasoning but then again I suppose I can't avoid it. For a short synopsis, I'd say I'm trying to write a mechanism similar to NSS key log mechanism. In more detail: You can see my project listed here:

Re: NSS in Summer of Code?

2011-03-02 Thread Robert Relyea
On 03/02/2011 03:28 PM, Wan-Teh Chang wrote: On Wed, Mar 2, 2011 at 3:23 AM, Gervase Markham g...@mozilla.org wrote: Usually, we prefer mentors to propose projects because then we know that the project is something the mentor is interested in mentoring, and we can assess the project as being

Re: Freezing and making available to js the mp_int bignum package API

2011-03-02 Thread Robert Relyea
On 03/01/2011 08:43 AM, Jean-Marc Desperrier wrote: Robert Relyea wrote: About the only use I could reasonable see for it would be to support PKCS #11 modules. The other use would be as an optimized base for a big num implementation, and that's what the original distribution says : ANSI C

Re: Freezing and making available to js the mp_int bignum package API

2011-02-28 Thread Robert Relyea
On 02/28/2011 09:03 AM, Jean-Marc Desperrier wrote: Hi, There was some talk last october about accessing the mp_int API from javascript, and so freezing it in order to make it available as a frozen API. We currently don't even expose the mpi API for good reason. About the only use I could

Re: J-PAKE in NSS

2011-02-28 Thread Robert Relyea
On 02/28/2011 08:20 AM, Jean-Marc Desperrier wrote: For context, from a message I wrote in last October : Given the number of protocols that include SRP (SSL/TLS, EAP, SAML), given that there's already a proposed patch for NSS (bug 405155, bug 356855), a proposed patch for openssl (

Re: TLS server keys in DNS: client policy proposal

2011-02-08 Thread Robert Relyea
On 02/08/2011 07:56 AM, Gervase Markham wrote: On 05/02/11 21:13, Nelson B Bolyard wrote: 2) After 14 years of working on SSL/TLS for browsers, I can tell you that browsers will all ignore the paragraph that says Clients SHOULD NOT allow users to force a connection I suppose that

Re: TLS server keys in DNS: client policy proposal

2011-02-07 Thread Robert Relyea
On 02/06/2011 09:11 AM, Zack Weinberg wrote: On 02/05/2011 02:55 PM, Eddy Nigg wrote: However probably the optimal approach will be CA issued certs in DNS that also make use of DNSSEC to validate the former (DV). Eventually I believe that this will emerge as the real improvement and most

Re: removing the certificate added with CERT_NewTempCertificate

2011-02-04 Thread Robert Relyea
On 02/04/2011 09:08 AM, PeachUser wrote: Hi , CAn somebody please answer my question. It is really critical. Thanks On Feb 2, 12:41 pm, PeachUser anupama.jo...@gmail.com wrote: Hi, I want to build certifiacte chain using a certifiacte passed by user and some certificates which are already

Re: removing the certificate added with CERT_NewTempCertificate

2011-02-04 Thread Robert Relyea
On Fri, Feb 4, 2011 at 9:59 AM, Robert Relyea rrel...@redhat.com wrote: Hi, I want to build certifiacte chain using a certifiacte passed by user and some certificates which are already there in the certDB. I am using CERT_NewTempCertificate(certDB, certItem, NULL, PR_FALSE, PR_TRUE); to add

Re: Two-factor auth for Bugzilla

2011-02-02 Thread Robert Relyea
On 02/02/2011 04:48 AM, Gervase Markham wrote: On 01/02/11 23:03, Robert Relyea wrote: 1) use request/not require certificate. If a certificate is supplied, that will show up in the initial handshake. The certificate will tell the server which account and you can bypass login altogether

Re: Two-factor auth for Bugzilla

2011-02-01 Thread Robert Relyea
On 02/01/2011 12:02 PM, Marsh Ray wrote: On 02/01/2011 10:56 AM, Gervase Markham wrote: Dear crypto-hackers, Your thoughts on the following problem would be appreciated. Goal: fix bug 570252. Provide 2-factor authentication for some Bugzilla accounts.

Re: S/MIME encrypted e-mails

2011-01-31 Thread Robert Relyea
On 01/30/2011 03:04 AM, Nelson B Bolyard wrote: On 2011-01-30 02:30 PDT, Matej Kurpel wrote: On 30. 1. 2011 10:57, Nelson B Bolyard wrote: Yes, the P7M holds all those encrypted copies of the key that encrypts the main message, and of course, the ciphertext produced with that key, And cert

Re: Encoding and comparing certificates with NSS

2011-01-31 Thread Robert Relyea
Depends on what you're trying to accomplish, what question you're trying to answer. If the question is merely are these two certs identical then comparing both from stem to stern is a very good way. If you're trying to ask do these two certs identify the same subject, then you may need to

Re: Force usage of a certificate for client authentication

2011-01-26 Thread Robert Relyea
On 01/26/2011 04:38 AM, Martin Boßlet wrote: Hello, I'm facing this problem currently with Firefox (3.6.13 Linux): I want to authenticate to a server using TLS client authentication, so I imported a PKCS#12 file for this purpose. Unfortunately the certificate is from an internal CA that does

Re: Problems Building NSS on Mac OS X 10.6 (64-bit)

2011-01-24 Thread Robert Relyea
On 01/22/2011 04:58 AM, Kaspar Brand wrote: On 20.1.11 20:57, Robert Relyea wrote: On 01/19/2011 10:36 PM, Kaspar Brand wrote: That's certainly doable, but I don't think the NSS build system has support for building universal binaries (you'd have to fiddle with lipo yourself). I think

Re: NSS 3.12.5: Error '-8023' ... how to track it down?

2011-01-13 Thread Robert Relyea
On 01/13/2011 10:46 AM, Bernhard Thalmayr wrote: Hi again, today I a built a debug version of NSS 3.12.8 (as I haven't found 3.12.9 yet) I wouldn't expect 3.12.9 to fix the problem, as you seem to be running into a unique issue. The issue is still there, but occours much later then with

Re: NSS 3.12.5: Error '-8023' ... how to track it down?

2011-01-12 Thread Robert Relyea
On 01/12/2011 01:26 PM, Bernhard Thalmayr wrote: So here we go ... the PCKS#11 logger shows the following 331569088[1bd1610]: C_DigestUpdate 331569088[1bd1610]: hSession = 0x88 331569088[1bd1610]: pPart = 0x6e580a4 331569088[1bd1610]: ulPartLen = 70 331569088[1bd1610]: rv = CKR_OK

NSS 3.12.9 RTM Released.

2011-01-12 Thread Robert Relyea
Release notes are coming soon. The tag is NSS_3_12_9_RTM. bob -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: NSS 3.12.5: Error '-8023' ... how to track it down?

2011-01-11 Thread Robert Relyea
On 01/11/2011 12:51 PM, Bernhard Thalmayr wrote: Hi Wan-Teh, thanks for your reply. Will it be helpfull to use the 'PKCS #11 Module Logger' before starting with 'printfs'? I tried that and get at least some output in the specified log. -Bernhard yes, that will tell you which PKCS #11

Re: NSS SoftToken Capabilities

2011-01-05 Thread Robert Relyea
On 01/05/2011 12:33 PM, Anders Rundgren wrote: Matej Kurpel wrote: On 4. 1. 2011 22:23, Robert Relyea wrote: On 01/03/2011 01:04 PM, Anders Rundgren wrote: Hi, I'm in the starting phase upgrading Firefox so that it can provision credentials in a way that that banks and governments require

Re: NSS SoftToken Capabilities

2011-01-05 Thread Robert Relyea
On 01/05/2011 12:50 PM, Nelson B Bolyard wrote: On 2011-01-03 13:04 PDT, Anders Rundgren wrote: Hi, I'm in the starting phase upgrading Firefox so that it can provision credentials in a way that that banks and governments require which among many things include E2ES (End-to-End Security) and

Re: NSS SoftToken Capabilities

2011-01-04 Thread Robert Relyea
On 01/03/2011 01:04 PM, Anders Rundgren wrote: Hi, I'm in the starting phase upgrading Firefox so that it can provision credentials in a way that that banks and governments require which among many things include E2ES (End-to-End Security) and issuer- specified PIN-codes (or just policies

NSS meeting.

2010-12-16 Thread Robert Relyea
1. Oracle move: Tinderbox is up. Build machines are up. NISCC tests are running. Some tests machines are still failing 2. NSS 3.12.9 There are 2 changes to be picked up before Friday. Alexi has some changes, but won't be ready until January. We'll release a 3.12.10 for Alexi's

NSS 3.12.9 release

2010-12-09 Thread Robert Relyea
NSS 3.12.9 schedule NSS 3.12.9 beta2 is tagged and in FF 4.0 Beta 8 Once our release build and release regression tests pass this build will be marked RC1. RTM will not be before 12/17. We'll know more on 12/16. -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org

Re: Firefox forgets to C_CloseAllSessions and C_Finalize when closing it

2010-11-22 Thread Robert Relyea
On 11/20/2010 07:56 AM, Matej Kurpel wrote: On 16. 11. 2010 14:53, Matej Kurpel wrote: Hello, I am implementing a PKCS#11 module and have just implemented C_GenerateKeyPair. For this purpose, I have set up a html page with the keygen tag which sends the form data to my php script to write

Re: Plan B for J-PAKE in Fennec B3 / Firefox B9 -- exposing MPI to Firefox for one beta cycle

2010-11-18 Thread Robert Relyea
On 11/18/2010 03:08 PM, Brian Smith wrote: (Note that this is to: dev-tech-crypto) Short Version: We are looking at taking a private patch for one Firefox beta cycle in mozilla-central to export the MPI functions from FreeBL on all platforms in our private copy of NSS. Then, we could push

Re: Thunderbird can decrypt without private key?

2010-11-10 Thread Robert Relyea
On 11/10/2010 05:34 AM, Matej Kurpel wrote: Hello, I am implementing a PKCS#11 module for Thunderbird and I have stuck upon a weird behavior of Thunderbird. Let me explain: For the purposes of testing, I have created a second gmail account. I have also generated the keys and certificate for

Re: Thunderbird UnwrapKey on message decryption?

2010-11-01 Thread Robert Relyea
On 11/01/2010 12:33 AM, Matej Kurpel wrote: Hello, I am implementing a PKCS#11 module. Today I tried to send encrypted e-mail to my second gmail account, and it works perfectly (in fact, nothing is needed from my token to support this). However, when the message arrives and I try to read it,

Re: Importing a symmetric private key into NSS?

2010-10-29 Thread Robert Relyea
On 10/28/2010 11:39 PM, Deepak wrote: Hello, I've been trying to import an AES 256 encrypted RSA Private Key imported into NSS, to function as a PKCS 11 AES Secret Key Object (aka object class CKO_SECRET_KEY, key type CKK_AES), but have been unsuccessful. Confusion. Do you mean a pkcs

Re: Importing a symmetric private key into NSS?

2010-10-29 Thread Robert Relyea
On 10/29/2010 03:36 PM, Deepak Kumar wrote: Rob, thanks for the response. This is still a new domain for me, so undoubtedly I'm getting some terminology mixed up. Backing up, and to try and be clear, what I'm trying to do is import a symmetric AES encryption key into NSS. OK

Re: NSS certificate DB concurrency

2010-10-26 Thread Robert Relyea
On 10/25/2010 11:30 PM, James Yonan wrote: I'm trying to do a programmatic certificate import into Firefox 3.x using NSS_Initialize, PK11_GetInternalKeySlot, CERT_DecodeCertFromPackage, PK11_ImportCert, and CERT_ChangeCertTrust. I've seen various postings on this list in the past that seem to

Re: certutil generated with MSVC9 for Windows 64 bits doesn´t work with tokens

2010-10-26 Thread Robert Relyea
On 10/26/2010 08:52 AM, Marcio wrote: Hi there, Running certutil -U -d 'dir of db on my profile' I can not see the token and slot with my certificate. I´m using: a) certutil (compiled as WIN954_64 with MSVC9 64) b) SafeSign (aetpkss1.dll) (64 bits) c) Gemplus Smart Cardd Reader d)

Re: certutil generated with MSVC9 for Windows 64 bits doesn´t work with tokens

2010-10-26 Thread Robert Relyea
On 10/26/2010 12:06 PM, Marcio wrote: On 26 out, 14:41, Robert Relyea rrel...@redhat.com wrote: On 10/26/2010 08:52 AM, Marcio wrote: Hi there, Running certutil -U -d 'dir of db on my profile' I can not see the token and slot with my certificate. I´m

Re: JSS building error on Windows

2010-10-25 Thread Robert Relyea
9) cd jss../mozilla/security/jss 10) make results: Makefile:49: ../coreconf/config.mk: No such file or directory Makefile:69: ../coreconf/rules.mk: No such file or directory make: *** No rule to make target '../coreconf/rules.mk'. Stop. This seems a bit bizarre. I you built NSS from

Re: how to modify the absolute profile path in secmod.db

2010-10-25 Thread Robert Relyea
On 10/23/2010 02:36 PM, al...@yahoo.com wrote: On 10/12/2010 4:38 PM, Robert Relyea wrote: On 10/08/2010 10:58 AM, al...@yahoo.com wrote: I noticed when moving a profile that secmod.db retains the old absolute profile path (configdir='...') Is the path used for anything? Not by default

Re: Usage of FreeBL and FreeBL/mpi through JavaScript in Firefox 4 Sync

2010-10-21 Thread Robert Relyea
On 10/20/2010 05:13 PM, Brian Smith wrote: See https://bugzilla.mozilla.org/show_bug.cgi?id=601645. The following internal functions and data structures in FreeBL that would be used Firefox 4.0 Sync's J-PAKE implementation through JSCtypes (a mechanism for calling native code through

Re: Firefox Sync, Key Exchange/Entry, and FIPS (was Re: NSS linkage and FIPS-140 compliance for Firefox)

2010-10-21 Thread Robert Relyea
On 10/20/2010 06:29 PM, Brian Smith wrote: Brian Smith wrote: (Because of Firefox Sync, we are now always going to have crypto features that won't work in FIPS mode.) Sigh, ignoring FIPS mode in a feature, is usually a red flag. It means you are handling CSP's where you really

Re: NSS linkage and FIPS-140 compliance for Firefox

2010-10-20 Thread Robert Relyea
On 10/18/2010 05:06 PM, Brian Smith wrote: [I cannot participate in any legal discussions now. Please don't ask me questions about legal stuff.] We (Mozilla) are are exploring some approaches to statically link NSS into Firefox to reduce dynamic linkage overhead caused by the NSS shared

Re: client-only support of DHE ciphers

2010-10-12 Thread Robert Relyea
On 10/11/2010 09:52 PM, Peter Djalaliev wrote: Hello, I've seen here: http://groups.google.com/group/mozilla.dev.tech.crypto/browse_thread/thread/388343d7bf3746c8/72fa1ee248ed91db?lnk=gstq=DHE#72fa1ee248ed91db and here:

Re: how to modify the absolute profile path in secmod.db

2010-10-12 Thread Robert Relyea
On 10/08/2010 10:58 AM, al...@yahoo.com wrote: I noticed when moving a profile that secmod.db retains the old absolute profile path (configdir='...') Is the path used for anything? Not by default. There are a number of parameters there, but when the applications initializes NSS, the values it

Re: Persisting symmetric/secret keys with JSS in FIPS mode

2010-09-24 Thread Robert Relyea
4) ??? Probably 4 - JSS experts are getting few and far between on this mailing list. ;( bob -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: How to get personal certificate?(urgency)

2010-09-15 Thread Robert Relyea
On 09/15/2010 03:39 PM, Wei Deng wrote: I am Wei Deng working in mozilla China. Most Chinese e-banks support IE only, because they use MS' activex techs. We have cooperated with CCB(one of the biggest banks in China), and most work has been finished. Maybe it will be online as soon as

Re: NSS, P#11 and beyond...

2010-09-10 Thread Robert Relyea
On 09/10/2010 10:10 AM, Vasily Sakharov wrote: Hi Robert, By chance as I can see you are one of the most active gurus in both PKCS#11 and mozilla lists. BTW, thanks for your comments as to our GOST related addons into P#11 v2.30. Hereby I just wonder whom we have to be in touch as to

Re: signature verification. VFY_CreateContextWithAlgorithmID help

2010-09-08 Thread Robert Relyea
On 09/08/2010 05:52 AM, tedx wrote: On Sep 8, 3:09 am, Nelson B nel...@bolyard.me wrote: On 2010/09/07 17:08 PDT, tedx wrote: I've hacked up something to try but I've now encountered a compilation error that I don't understand. Has anyone else seen this? nss_signing.c: In function

Re: Proposal to remove SSL 2.0 support from NSS trunk (NSS 3.13)

2010-09-01 Thread Robert Relyea
On 08/27/2010 03:46 PM, Wan-Teh Chang wrote: I propose that we remove SSL 2.0 support from the NSS trunk (NSS 3.13). SSL 2.0 is an old and insecure protocol. No products should be using SSL 2.0 today. But removing the SSL 2.0 code from NSS has one major benefit to the continual

Re: Why does Softoken refuse to create keys with C_CreateObject in FIPS mode?

2010-08-23 Thread Robert Relyea
On 08/23/2010 12:00 AM, Brian Smith wrote: Nelson B Bolyard wrote: It's all about making it difficult enough that people start to ask why is this obviously more difficult than the casual developer thinks it must be? Thank you. That makes a lot of sense. My understanding is

Re: PKCS#11 module: C_GetAttributeValue problems

2010-08-13 Thread Robert Relyea
On 08/13/2010 05:37 AM, Konstantin Andreev wrote: On 08/13/10 04:44, Robert Relyea wrote: On Wed, Aug 11, 2010 at 1:18 PM, Matej Kurpelmkur...@gmail.com wrote: [ ... skip ... ] Later, thunderbird asks for its attributes CKA_TOKEN and CKA_LABEL but gives zero-sized buffers for both values

Re: PKCS#11 module: C_GetAttributeValue problems

2010-08-13 Thread Robert Relyea
Guys, I figured out that Thunderbird didn't like this assignment of CKA_TOKEN when assigning the values (with the buffers of right sizes already allocated): pTemplate[i].pValue = (CK_BBOOL *)TRUE; (but it compiled fine). I changed it to *((CK_BBOOL *)pTemplate[i].pValue) = TRUE; Oh, yes, The

Re: PKCS#11 module: C_GetAttributeValue problems

2010-08-12 Thread Robert Relyea
On 08/11/2010 09:53 PM, Wan-Teh Chang wrote: On Wed, Aug 11, 2010 at 1:18 PM, Matej Kurpel mkur...@gmail.com wrote: Hello, I am trying to implement a PKCS#11 module for my diploma thesis. It is intended to be used with thunderbird. I am using opensc pkcs11-spy module to debug it. I have

Re: Passing random numbers between tokens - what FIPS thinks ?

2010-07-23 Thread Robert Relyea
On 07/17/2010 04:13 PM, Nelson B Bolyard wrote: FIPS 140 will not allow *any* hardware pure noise source to be used by itself as a random number/bit source. Instead, such a source MUST be fed into a DRBG from which any internal random data is taken. Some of the FIPS 140 requirements are a

Re: Netscape Enterprise Server 3.63 2048 bit ssl cert

2010-07-23 Thread Robert Relyea
On 07/23/2010 12:41 PM, msg wrote: msg nos...@nospam.nowhere wrote in news:xns9dbd9d232636bnospamnospamnowh...@216.196.97.169: Greetings: The utility 'sec-key' bundled with Netscape Enterprise Server 3.63 only generates 1024 bit keys; finding a CA with good browser acceptance who will

Re: How to refresh Firefox keystore

2010-07-12 Thread Robert Relyea
On 07/05/2010 04:13 PM, james07 wrote: I notice the cert8.db and key3.db files get updated only when the JVM shuts down. That may explain why the new certificate doesn't show up. Is this (update of the db files) the expected behavior? It seems strange. Is there a way to commit the change?

Re: How to refresh Firefox keystore

2010-07-12 Thread Robert Relyea
On 07/05/2010 06:28 PM, Subrata Mazumdar wrote: I not sure about the current version (3.6) of FF, but earlier versions (FF 2.0 and 3.0), the key/certificate DB did not support multiple write interfaces i.e. DB write using one API does not get propagated to other API. As a result, keys/certs

Re: JSS in Firefox - loading applets over mutual SSL stopped working since the v. 3.6.x

2010-07-12 Thread Robert Relyea
On 07/12/2010 03:07 PM, Robert Relyea wrote: On 07/12/2010 01:25 AM, waldemar.ko...@max.com.pl wrote: Hi, upgrading to FF 3.6.x (latest checked - 3.6.6) causes Java applets to stop loading over mutual SSL connection. The same setup works correctly in FF version 3.5.3. I've tried

Re: How to refresh Firefox keystore

2010-07-01 Thread Robert Relyea
On 06/30/2010 10:47 PM, james07 wrote: Hi, I have an applet that uses JSS to import an RSA keypair into Firefox's keystore, as per the following code. CryptoManager.initialize(C:\Users\James\AppData\Roaming\Mozilla\Firefox\Profiles\y78kp7l6.default); CryptoManager

Re: PK11_CipherOp with RC4 and invalid memory access

2010-06-22 Thread Robert Relyea
Yes, it works correctly, so I assume that it doesn't use the extra bytes. It is however not just reading uninitialized memory (which valgrind usually tracks correctly), but it reads unallocated memory. It is also interesting that it doesn't read beyond the bounds for small sizes, so it

Re: PK11_CipherOp with RC4 and invalid memory access

2010-06-21 Thread Robert Relyea
On 06/19/2010 01:43 PM, Mads Kiilerich wrote: Hi I'm trying to port an application from OpenSSL to NSS. The biggest problem right now is that valgrind reports that NSS accesses invalid memory when using RC4. There is no problem with chunk sizes up to 8 and sizes divisible with 4, but for

Re: How pkcs#11 modules read the CONFIG_STRING from modutil -string command

2010-06-17 Thread Robert Relyea
On 06/17/2010 04:18 PM, Nelson B Bolyard wrote: On 2010-06-17 13:45 PDT, Klaus Heinrich Kiwi wrote: If I'm coding a PKCS#11 module, how exactly the -string parameter from modutil gets passed down to the library? i.e., $ modutil -add mylib -libfile /lib/mylib.so -string my conf string I

Re: (nss-3.12.6) unable to engage FIPS mode: security library: invalid arguments.

2010-06-14 Thread Robert Relyea
On 06/13/2010 05:24 PM, Robin H. Johnson wrote: On Sun, Jun 13, 2010 at 03:08:07PM -0700, Nelson B Bolyard wrote: On 2010-06-13 13:02 PDT, Robin H. Johnson wrote: On Sun, Jun 13, 2010 at 02:02:39AM -0700, Nelson B Bolyard wrote: The root of the problem is that the shared

Re: how to create a soft token using NSS?

2010-06-11 Thread Robert Relyea
Private Key and Certificate Services, then they will still be able to export their keys. bob I highly recommend familiarizing your self with the PKCS #11 spec or none of they things I said will make sense. thanks. 在 2010年6月11日 上午12:34,Robert Relyea rrel...@redhat.com mailto:rrel...@redhat.com

Re: Secret key creation with C_ObjectCreate

2010-06-01 Thread Robert Relyea
On 05/31/2010 02:02 AM, Sebastian Mayer wrote: Hi All, I'm having some difficulties in creating a simple AES key as follows: CK_OBJECT_HANDLE hKey; CK_OBJECT_CLASS keyClass = CKO_SECRET_KEY; CK_KEY_TYPE keyType = CKK_AES; CK_BYTE keyValue[] = { 0x01, 0x23, 0x45,

Re: NSS - signing with MAC

2010-06-01 Thread Robert Relyea
On 06/01/2010 07:47 AM, Konstantin Andreev wrote: Not a policy issue I suppose... Some days ago I have found that: No one block cipher MAC'ing mechanism is working in either current release or trunc NSS, in either mode. I've already investigated the issue and about to file a bug this or

Re: NSS soft token on a USB pen drive?

2010-05-26 Thread Robert Relyea
On 05/26/2010 06:57 AM, Bud P. Bruegger wrote: Hello everyone, I thought this was an FAQ but couldn't find anything searching around. I'd like to put my key3db, cert8db on a USB pen drive to have a portable soft token with some user certs that I can use from several PCs (work, home) that

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-21 Thread Robert Relyea
intent of a self signed and unknown certificate (i.e. is it legitimate, or a man in the middle) without any external help represents a failing is to show a pretty fundamental lack of understanding as to how this all works. Once again, I make no such claim. I said that if there is in

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-21 Thread Robert Relyea
On 05/21/2010 07:52 AM, Gervase Markham wrote: On 21/05/10 05:36, Matt McCutchen wrote: I'm not claiming that the user knows. I only said that if there is in fact no impersonation, then the error is a false positive. This seems a fine definition to me. If the browser says OMG - someone

Re: automatically deleting expired certificates..

2010-05-19 Thread Robert Relyea
On 05/19/2010 02:51 PM, Bud P. Bruegger wrote: Hello, I would like to ask your advice on how to best deal with a problem related to deleting certificates/keys. I'm currently experimenting with creating short-lived certificates for TLS-client-authentication using the keygen element. While it

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-17 Thread Robert Relyea
Check esp. section 7.6 So What Can We Do?. This paper is about a year old, and we discussed it here when it was now. My favorite quote: Given a choice between dancing pigs and security, users will pick dancing pigs every time. The quote above was taken out of context. The

Re: Classification of client certificates by NSS / Mozilla Firefox

2010-05-04 Thread Robert Relyea
That results in 2 questions from me: 1. What is the criteria of NSS for distinguishing between own and others certificates? 2. I recently read that there is a hidden flag to mark a token implementation as friendly, allowing to search for certificates without logging in. Is there any

Re: dynamic library issue on linux

2010-04-28 Thread Robert Relyea
On 04/28/2010 03:37 AM, David Stutzman wrote: On 4/27/2010 12:32 PM, Nelson B Bolyard wrote: Hi David, Long time ... I've been lurking...I still read the messages almost every day. Nice to see you're still around as well. Are your newly built NSS shared libs in a directory in your

Re: dynamic library issue on linux

2010-04-27 Thread Robert Relyea
On 04/27/2010 09:32 AM, Nelson B Bolyard wrote: On 2010-04-27 07:07 PST, David Stutzman wrote: I just built nss-3.12.6 with the tarball from mozilla.org[1] and when I try to create a new DB using certutil -N -d . I get the following error. I'm running certutil out of the dist folder in

Re: NSS RSA Key Gen Known Answer Testing for FIPS Validation Question...

2010-04-15 Thread Robert Relyea
On 04/15/2010 03:58 PM, Saran wrote: I am trying to generate output responce vectors for RSA Key Gen Known Answer test for our FIPS validation. I presume this is for algorithm certs (not the known answer power on self tests). The KeyGen RSA request file has input values like modulus, e,

Re: how to use own CRL_callback

2010-04-15 Thread Robert Relyea
On 04/14/2010 03:30 PM, huican wrote: Hello Bob, Thanks for your reply... I have more questions inline ; On Wed, Apr 14, 2010 at 5:15 PM, Robert Relyea rrel...@redhat.com wrote: On 04/14/2010 02:58 PM, huican wrote: Hello, I am new to NSS crypto, I just wonder whether

Re: how to use own CRL_callback

2010-04-14 Thread Robert Relyea
On 04/14/2010 02:58 PM, huican wrote: Hello, I am new to NSS crypto, I just wonder whether there is any easy way to use my own crl_callback function for CRL check. No, there isn't a callback, there is a verify function that allows you to control just about every possible semantic of

NSS Completes its 5th FIPS validation

2010-04-14 Thread Robert Relyea
The NSS team just completed its 5th FIPS validation with NSS 3.12.4. NSS again has been validated up to Level-2 on Solaris (#1279, sparc and x86), Level-2 on RHEL5 (#1280, 64 and 32 bit), and Level-1 on Mac and Windows (#1278). In 1997, NSS was the first software module to get FIPS Level-2

Re: Alerts on TLS Renegotiation

2010-04-08 Thread Robert Relyea
On 04/07/2010 09:35 PM, Nelson B Bolyard wrote: We plan on alerting users in a future update. This is fair warning to server operators and those who are debugging their sites. If this is a real threat don't users deserve a fair warning now? I fully agree! If users are

Re: Alerts on TLS Renegotiation

2010-04-01 Thread Robert Relyea
On 03/31/2010 05:26 AM, Eddy Nigg wrote: [ Please follow up to mozilla.dev.tech.crypto ] After some discussion at bug 554594 I'm following up here - the bug was unfortunately misused by me a little for the initial discussion. At https://wiki.mozilla.org/Security:Renegotiation under item 4.4

Re: NSS Newbie - FIPS Sample

2010-03-30 Thread Robert Relyea
On 03/30/2010 03:38 PM, rbellamy wrote: I apologize if this has already been covered, or if it falls under the umbrella of stoopid questions. I'm trying to work through the FIPS sample, and am having a difficult time. First of all, the includes call out to cryptoki.h, which doesn't seem to

Re: TLS logout in Firefox

2010-03-16 Thread Robert Relyea
On 03/16/2010 03:48 AM, Jean-Marc Desperrier wrote: Robert Relyea wrote: The crypto object offers a logout method that does it. http://mxr.mozilla.org/security/source/security/manager/ssl/src/nsCrypto.cpp#2875 This will get Anders what he needs right now. (side effect, everything

Re: TLS logout in Firefox

2010-03-15 Thread Robert Relyea
On 03/11/2010 10:57 AM, Wan-Teh Chang wrote: 2010/3/11 Robert Relyea rrel...@redhat.com: The Microsoft thing is also non-standard. (and also not well documented -- which version of IE did it show up in?). I found it documented at http://msdn.microsoft.com/en-us/library/ms536979(VS

Re: Cipher not picked/enabled in a TLS session

2010-03-15 Thread Robert Relyea
On 03/15/2010 10:03 AM, Gregory BELLIER wrote: Robert Relyea a écrit : In sslsock.c, I print ssl3_CipherPrefSetDefault and I can see that my cipher is not enabled. Do you have any hints/tests which could help me ? Some tests I could do ? What am I missing ? OK, this is your

Re: Replacing keygen - A really bad idea

2010-03-15 Thread Robert Relyea
On 03/12/2010 10:12 PM, Anders Rundgren wrote: Why is replacing the 15 year old Netscape hack suddenly a bad idea? Because you cannot create a secure provisioning system without having some kind of [by the issuer recognizably] predefined key in the token. With such a key, the token would be

Re: TLS logout in Firefox

2010-03-11 Thread Robert Relyea
On 03/11/2010 05:59 AM, Anders Rundgren wrote: Hi, I can't help it, but TLS client cert auth is really a very crappy system when used in browsers. I was a little bit surprised once when I logged on to the Swedish tax department, then did logout, and returned still being logged in!

Re: Cipher not picked/enabled in a TLS session

2010-03-11 Thread Robert Relyea
In sslsock.c, I print ssl3_CipherPrefSetDefault and I can see that my cipher is not enabled. Do you have any hints/tests which could help me ? Some tests I could do ? What am I missing ? OK, this is your overall problem. If NSS does not have a cipher enabled, it will neither advertise it

Re: Who is using NSS in their projects?

2010-03-08 Thread Robert Relyea
On 03/06/2010 02:00 PM, Nelson Bolyard wrote: On 2010-03-02 10:06 PST, davidwboswell davidwbosw...@yahoo.com wrote: I maintain a list of applications that use Mozilla technologies in their projects and wanted to add more examples of projects that use NSS.

NSS 3.12.6 is RTM.

2010-03-04 Thread Robert Relyea
The NSS team has just RTM'ed NSS 3.12.6. The primary feature of NSS 3.12.6 is support for the TLS Renegotiation Indication Extension, RFC 5746. Release notes are forthcoming with other additions and bug fixes. In addition, a new version of JSS has been released, JSS 4.3.2 which allows

Re: Support for CKA_ALWAYS_AUTHENTICATE

2010-02-04 Thread Robert Relyea
On 02/01/2010 02:09 AM, Helge Bragstad wrote: Hi, My understanding from previous postings on this list is that the CKA_ALWAYS_AUTHENTICATE + CKU_CONTEXT_SPECIFIC features of PKCS #11 are not supported in NSS. Is this likely to be implemented in the near future? Actually, that's not the

Re: Keys, Nicknames, and CK_Object_Handles

2010-01-28 Thread Robert Relyea
where the key is stored saved as well. The different is CKA_ID is a persistant across different program instances and CK_OBJECT_HANDLE is not. bob Thanks, Kai On Wed, Jan 27, 2010 at 8:40 PM, Robert Relyea rrel...@redhat.com wrote: On 01/27/2010 03:38 PM, Kai Chan wrote: Hi

Re: Keys, Nicknames, and CK_Object_Handles

2010-01-28 Thread Robert Relyea
On 01/28/2010 03:22 PM, Kai Chan wrote: Thank you for clarifying. I was trying to figure out the details from this portion in the PK11 FAQ (https://developer.mozilla.org/en/PKCS11_FAQ) : How is private key handled when an external PKCS #11 module is loaded? Is it picked up from the token

Re: Keys, Nicknames, and CK_Object_Handles

2010-01-27 Thread Robert Relyea
On 01/27/2010 03:38 PM, Kai Chan wrote: Hi, From what I gather, keys are generated with matching certificates. If you mean 'when keys are generated, they have matching certs', then the answer is no. Keys are generated bare. When the cert is imported, it 'latches' on to the keys that it's

<    1   2   3   4   5   >