Mele wrote:
I have tried to delete a root cert from Fx and have found that the cert comes back and appears FULLY FUNCTIONAL rather than being disabled. So, I don't understand your statement.
Actually I saw your post elsewhere and decided to check this out. Here's what I observed (using Firefox 1.5.0.4 on Windows XP SP2):
1. I started with a root CA certificate that was pre-loaded and marked as trusted for all uses (in my case the ABA.ECOM root CA). (I verified this using the "Edit" button.)
2. I then used the "Delete" button to attempt to delete the root CA certificate that was pre-loaded . The operation attempted to succeed and the root CA cert disappeared from the displayed list.
3. I then exited Firefox, restarted it, and went back to the root CA list. The root CA certificate I had "deleted" was still in the displayed list of root certs, but when I checked using "Edit" it was *not* marked as trusted for any purpose.
Background: Pre-loaded root CA certs in NSSCIBK.DLL can't really be deleted from that file, because it's a read-only shared library that is separate from the modifiable Mozilla certificate database. I haven't verified this, but I suspect that root CA certs in the modifiable database (which is populated by the user) can in fact be deleted "for real", but root CA certs in NSSCKBI.DLL can only be marked as untrusted.
From a security point of view the effect is the same -- any certificates issued under the "deleted" CA are no longer recognized as valid -- but I agree that this is confusing from a UI point of view. I've filed a bug about this against the PSM component of Firefox (the component that I think is handing the UI for this):
https://bugzilla.mozilla.org/show_bug.cgi?id=345934
I would like to ask why are there root certs for Fx that cannot be verified because, according to Fx, the issuer is NOT trusted?
To my knowledge no root CA certs shipped pre-loaded with Firefox (and other Mozilla-based products) are marked as untrusted "out of the box". However it is certainly possible for a user to explicitly mark a root cert as not trusted; this can be done for both pre-loaded root CA certs and for root CA certs that the user might have later downloaded into Firefox and marked as trusted on their own.
It makes me nervous having certs that cannot be verified and that, when deleted, promptly return to the list and appear functional. Those certs are not even on the list that is on your web page. I assume they are legacy certs
That is correct. The list on my web page covers only CA certs that were added since the Mozilla Foundation took over the task of selecting new CAs to be added. There's currently a bug filed relating to creating an official page that lists all pre-loaded CA certificates:
https://bugzilla.mozilla.org/show_bug.cgi?id=333272
but why are certs that cannot be verified there at all? I am referring to beTRUSTed Root CCA Baltimore Implementation, beTRUSTEed Root CA RSA Implementation, and beTRUSTed Root CA Entrust Implementation.
In my vanilla installation of Firefox all of the beTRUSTed root CA certs are marked as trusted. If they are not marked as trusted in your copy of Firefox I suspect that it's because you attempted to delete the beTRUSTed CA certs in the past, with results as I describe above.
I am unable to delete the GTE CyberTrust Root CA that expired in February. That one also comes back. Why? I also deleted the GoDaddy cert and it comes back.
These CA certs are also in NSSCKBI.DLL and hence cannot be deleted "for real", but only marked as untrusted.
If these are actually disabled then why are they back in the list and not at least grayed out or have "disabled" beside them? Should I not be informed that they are disabled if they truly are?
I agree that this is confusing behavior, which is why I filed a bug report about it as noted above.
I have another question regarding Fx certs that is not directly related to PSC's findings but would like to ask it. Why does Fx not have any certs from Microsoft? It is very irritating every time I go to a secure Microsoft site on Fx to have Fx tell me that the certificate cannot be trusted (Microsoft Secure Server Authority which is an intermediate cert).
Can you give an example of such a site, so we can try it out? Also, note that we don't pre-load intermediate CA certs, only root CA certs, so if the Microsoft CA in question is an intermediate CA then we would not pre-load it, but instead would have to pre-load whatever root CA cert it was ultimately issued from.
Along these lines, I also would like to know why Fx jumbles up the intermediate and root certs all on one tab? They should be on separate tabs.
As mentioned above, as a matter of policy we don't pre-load intermediate certs, only root CA certs, so as installed "out of the box" the Firefox CA cert list will contain only root CA certs. Also, unlike Internet Explorer, Firefox does *not* cache and store intermediate CA certs that it encounters in the course of doing SSL connections and the like.
As a result the only intermediate CA certs that might end up in the Firefox cert database are those that are explicitly added by the user. This is a relatively uncommon thing, which may be why we don't split intermediate CAs out as a separate list in the Firefox UI. However I'm not really the expert on this particular aspect of Firefox, so I'll defer to others more knowledgeable than I.
Frank -- Frank Hecker [EMAIL PROTECTED] _______________________________________________ dev-security mailing list dev-security@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security