In order to make OCSP-over-Proxies work, changes are required to the way SSL is hooked into the Mozilla client applications, as I had outlined in my previous posting.

While the code changes to PSM have not yet been reviewed, it seems to work for me, I don't see any problems during my own testing.

To make sure my observation is right, I'd greatly appreciate your help in testing the changes. Even if you can't test whether OCSP-over-Proxy is working, it is very important for me to confirm the changes do not introduce regressions when using SSL, be it https, imap+ssl, smtp+tls, etc.

I produced and uploaded a bunch of test builds. They are based on yesterday's MOZILLA_1_8_BRANCH, so the base applications are a bit newer than Firefox 1.5 / Thunderbird 1.5 / Seamonkey 1.0, but not as experimental as the trunk of Mozilla client development.

There are builds of Firefox, Thunderbird and Semonkey for Linux, Mac OS X and Win32 available. (All names are trademarks of their respective owners)

http://kuix.de/mozilla/ocspproxy/20060202/

Please feel free to provide feedback by private mail (kengert@), all comments are highly welcome.

Thanks and Regards,
Kai


Kai Engert wrote:
As of today, OCSP in NSS does not work from within an environment that requires the use of a proxy server to access the OCSP responder server.

Instead of extending NSS' internal HTTP client with support for proxies, we are working on a mechanism that allows a client application to do HTTP communication on behalf of NSS.

This strategy seems reasonable, as Mozilla applications already come with functionality to access various kinds of proxies, including configuration and authentication.

A callback API is currently being specified and its draft can be found in the patches attached to: https://bugzilla.mozilla.org/show_bug.cgi?id=152426

If you'd like to add support for HTTP proxies in your own NSS application, you will be able to provide your own implementation of the callback API, possibly as a thin layer to some other HTTP library of your choice? I found a list of some other libraries here: http://curl.haxx.se/libcurl/competitors.html

We plan to provide documentation on how to make use of the new HTTP callback API on this wiki page: http://developer.mozilla.org/en/docs/HTTP_Delegation

In order to implement this callback API in Mozilla client applications (Firefox/Thunderbird/Seamonkey), changes are required to PSM and the way it does SSL. You can track the work here: https://bugzilla.mozilla.org/show_bug.cgi?id=111384

There are text attachments that explain the changes in more detail.

Did you produce an application that includes not just NSS, but also PSM and it's additional SSL layering? If your own application using PSM is not yet a multithreaded application, be warned that a future version of PSM will require the use of additional threads.

Kai
_______________________________________________
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to