Julien Pierre wrote:
<snip>
This site makes a lot of unsubstantiated and bogus allegations .
I am only responding to show how little the author knows about Mozilla.
Julien, thanks for responding to this.
Here's my own summary of the situation, in response to the material
published in the Privacy Software Corporation Newsletter dated July 24,
2006:
1. The file NSSCKBI.DLL mentioned in the PSC newsletter contains the
pre-loaded root CA certificate list shipped with Mozilla-based products,
including Firefox, Thunderbird, Mozilla Suite, Seamonkey, and Camino. It
is part of the Network Security Services (NSS) cryptographic library
that provides SSL and other support for Mozilla-based products.
NSSCKBI.DLL contains only the root CA certificate data; it does not
actually perform any certificate-related operations.
2. The Windows registry key referenced by the PSC newsletter:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates
is associated with Microsoft Windows, and contains data associated with
pre-loaded root CA certificates used by Internet Explorer and other
Windows applications.
This registry key has nothing to do with Mozilla-based products, NSS, or
NSSCKBI.DLL. NSS and other Mozilla code do not use this key or write to
it; as noted above NSS stores pre-loaded root CA certificate data in
NSSCKBI.DLL.
Other parts of the Mozilla code do read and write the Windows registry,
but they do so in a separate section of the registry, under
HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\...
3. Contrary to the assertion in the PSC newsletter, the root CA
certificates used by Mozilla-based products (including the certificates
stored in NSSCKBI.DLL) can be viewed and edited from within the
preferences dialogs of those various products. For example, with Firefox
1.5 Under Windows the user can view and edit certificate data as follows:
1. From the "Tools" menu, select the "Options..." menu item.
2. In the resulting dialog box, click on the "Advanced" toolbar
button.
3. Select the "Security" tab.
4. Click on the "View Certificates" button.
5. In the resulting dialog box, select the "Authorities" tab.
6. Click on a CA certificate to select it.
7. Click on the "View" button to view the certificate and related
information, on the "Edit" button to modify settings for the
CA and its certificate, and on the "Delete" button to delete
the certificate.
Other Mozilla-based products have similar features.
Note that "deleting" a pre-loaded CA certificate doesn't actually delete
it from the file NSSCKBI.DLL, but rather disables use of that CA and its
certificate within the Mozilla-based product in question.
4. Although it's not relevant to Mozilla (as discussed above), note that
(contrary to the assertion of the PSC newsletter) the pre-loaded set of
CA certificates for Microsoft Windows as stored in the registry key
mentioned above can in fact be viewed and edited as well. For Windows XP
and Internet Explorer 6, the steps are as follows:
1. From the "Tools" menu select the "Internet Options..." menu item.
2. In the resulting dialog box select the "Content" tab.
3. Click on either the "Certificates" button (for CA certificates
related to SSL) or the "Publishers" button (for CA certificates
related to ActiveX code signing).
4. In the resulting dialog box select the "Trusted Root Certification
Authorities" tab.
5. Click on a CA certificate to select it.
6. Click on the "View" button to view the certificate and related
information, on the "Advanced" button to modify settings for the
CA and its certificate, and on the "Remove" button to delete
the certificate.
5. The Mozilla Foundation selects CA certificates for pre-loading into
Mozilla-based products based on its policy as described at
https://www.mozilla.org/projects/security/pki/nss/ca-certificates/policy.html
As part of this policy we evaluate the benefits and risks of including a
particular CA's certificate in our pre-loaded list, including looking at
independent evaluations of the CA in question. For CAs included since
the policy was officially adopted, we maintain in the Mozilla project's
Bugzilla bug database a public record of discussions related to the
decision to include or not include a particular CA; see
http://www.hecker.org/mozilla/ca-certificate-list
for references to such records (in the "Related Bugs" column).
If anyone, including PSC, has reason to believe that including a
particular CA's certificate poses a security risk to users of
Mozilla-based products then they are free to submit a bug report
providing evidence to that effect and we'll look into it. Such reports
can be submitted directly into the Mozilla bug database at
<http://bugzilla.mozilla.org/> or can be sent to the email address
[EMAIL PROTECTED]
Again, though it's not directly relevant to Mozilla-based products,
other browser vendors (e.g., Microsoft, Apple, Opera, etc.) maintain
similar pre-loaded CA certificate lists and have similar policies
related to including new CA certificates in the list. Note that there is
substantial (though not 100%) overlap between the various lists; for
example, the Thawte, USERtrust, and Quo Vadis CAs mentioned in the PSC
newsletter are in both the Mozilla list and the Windows list.
I hope this answers the questions raised by the PSC newsletter. If
anyone has any further questions please feel free to post in this forum
or email me directly.
Frank
--
Frank Hecker
Executive Director
[EMAIL PROTECTED]
_______________________________________________
dev-security mailing list
dev-security@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security