On Fri, 2015-09-04 at 09:53 +0100, Gervase Markham wrote:
> On 03/09/15 19:22, Kathleen Wilson wrote:
> > 2) Remove included root certs that only have the Code Signing trust bit
> > enabled. To our knowledge, no one is using such root certs via the NSS
> > root store.
> 
> This seems like a half-way house. If no-one is using our root store as a
> code-signing root store, we should stop supporting the code-signing bit
> entirely, remove the bit from all roots, and remove the UI associated
> with it in all apps.
> 
> But if we still want to support the code-signing use case, we shouldn't
> remove these roots.


Firefox Add-Ons can be signed with code signing certificates.

In past versions of Firefox, there was code that checked for a signature in the
Add-On, and the user interface that asked for permission to install displayed
information found in the signature (the name of the owner of the code signing
certificate).

I no longer see this information shown by Firefox.

I understand that Firefox nowadays requires Add-Ons to be signed by Mozilla. How
does that work? Does Mozilla use a code-signing certificate?

I looked at an example Add-On, and the signature references certificates with
the following names:

subject=/OU=Preliminary/C=US/L=Mountain 
View/O=Addons/ST=CA/CN=jid1-AQqSMBYb0a8ADg@jetpack
issuer=/C=US/O=Mozilla Corporation/OU=Mozilla AMO Production Signing Service/CN=
production-signing-ca.addons.mozilla.org/emailAddress=services
[email protected]

subject=/C=US/O=Mozilla Corporation/OU=Mozilla AMO Production Signing Service/CN
=production-signing-ca.addons.mozilla.org/emailAddress=services
[email protected]
issuer=/C=US/O=Mozilla Corporation/OU=Mozilla AMO Production Signing
Service/CN=root-ca-production-amo

Doesn't that mean that Mozilla Firefox still relies on code signing
certificates?

Kai

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to