On aug. 22, 19:43, Nelson B Bolyard <[EMAIL PROTECTED]> wrote:
> [EMAIL PROTECTED] wrote, On 2008-08-22 05:51:
>
> > Hi,
>
> > I have a Verisign Digital ID Class 3 - Microsoft Software Validation
> > v2 certificate, which I would like to use to sign my xpi.
>
> > I have followed the steps described on this page
> >http://oyoy.eu/huh/firefox-extension-code-signed-with-spc-pvk/
>
> > Briefly
> > 1., I use pvkimport to convert spc and pvk to pfx file
> > 2., I use pk12util to create a new database and import the cert
>
> > Verification
> > certutil - L -d . lists my one and only cert
>
> Does the line for your cert end in "u,u,u" ?
certutil -L -d .
2bee11b8-ca7d-4f71-b580-f72a581f84fa u,u,u
signtool -L -d .
using certificate directory: .
S Certificates
- ------------
* 2bee11b8-ca7d-4f71-b580-f72a581f84fa
Builtin Object Token:Verisign/RSA Secure Server CA
Builtin Object Token:GTE CyberTrust Root CA
Builtin Object Token:GTE CyberTrust Global Root
Builtin Object Token:Thawte Personal Basic CA
Builtin Object Token:Thawte Personal Premium CA
Builtin Object Token:Thawte Personal Freemail CA
Builtin Object Token:Thawte Server CA
Builtin Object Token:Thawte Premium Server CA
Builtin Object Token:Equifax Secure CA
Builtin Object Token:ABAecom (sub., Am. Bankers Assn.) Root CA
Builtin Object Token:Digital Signature Trust Co. Global CA 1
Builtin Object Token:Digital Signature Trust Co. Global CA 3
Builtin Object Token:Digital Signature Trust Co. Global CA 2
Builtin Object Token:Digital Signature Trust Co. Global CA 4
Builtin Object Token:Verisign Class 1 Public Primary Certification
Authority
Builtin Object Token:Verisign Class 2 Public Primary Certification
Authority
Builtin Object Token:Verisign Class 3 Public Primary Certification
Authority
Builtin Object Token:Verisign Class 1 Public Primary Certification
Authority -
G2
Builtin Object Token:Verisign Class 2 Public Primary Certification
Authority -
G2
Builtin Object Token:Verisign Class 3 Public Primary Certification
Authority -
G2
Builtin Object Token:Verisign Class 4 Public Primary Certification
Authority -
G2
Builtin Object Token:GlobalSign Root CA
Builtin Object Token:ValiCert Class 1 VA
Builtin Object Token:ValiCert Class 2 VA
Builtin Object Token:RSA Root Certificate 1
Builtin Object Token:Verisign Class 1 Public Primary Certification
Authority -
G3
Builtin Object Token:Verisign Class 2 Public Primary Certification
Authority -
G3
Builtin Object Token:Verisign Class 3 Public Primary Certification
Authority -
G3
Builtin Object Token:Verisign Class 4 Public Primary Certification
Authority -
G3
Builtin Object Token:Entrust.net Secure Server CA
Builtin Object Token:Entrust.net Secure Personal CA
Builtin Object Token:Entrust.net Premium 2048 Secure Server CA
Builtin Object Token:Baltimore CyberTrust Root
Builtin Object Token:Equifax Secure Global eBusiness CA
Builtin Object Token:Equifax Secure eBusiness CA 1
Builtin Object Token:Equifax Secure eBusiness CA 2
Builtin Object Token:Visa International Global Root 2
Builtin Object Token:beTRUSTed Root CA
Builtin Object Token:AddTrust Low-Value Services Root
Builtin Object Token:AddTrust External Root
Builtin Object Token:AddTrust Public Services Root
Builtin Object Token:AddTrust Qualified Certificates Root
Builtin Object Token:Verisign Class 1 Public Primary OCSP Responder
Builtin Object Token:Verisign Class 2 Public Primary OCSP Responder
Builtin Object Token:Verisign Class 3 Public Primary OCSP Responder
Builtin Object Token:Verisign Secure Server OCSP Responder
Builtin Object Token:Verisign Time Stamping Authority CA
Builtin Object Token:Thawte Time Stamping CA
Builtin Object Token:Entrust.net Global Secure Server CA
Builtin Object Token:Entrust.net Global Secure Personal CA
Builtin Object Token:AOL Time Warner Root Certification Authority 1
Builtin Object Token:AOL Time Warner Root Certification Authority 2
Builtin Object Token:beTRUSTed Root CA-Baltimore Implementation
Builtin Object Token:beTRUSTed Root CA - Entrust Implementation
Builtin Object Token:beTRUSTed Root CA - RSA Implementation
Builtin Object Token:RSA Security 2048 v3
Builtin Object Token:RSA Security 1024 v3
Builtin Object Token:GeoTrust Global CA
Builtin Object Token:GeoTrust Global CA 2
Builtin Object Token:GeoTrust Universal CA
Builtin Object Token:GeoTrust Universal CA 2
Builtin Object Token:UTN-USER First-Network Applications
Builtin Object Token:America Online Root Certification Authority 1
Builtin Object Token:America Online Root Certification Authority 2
Builtin Object Token:Visa eCommerce Root
Builtin Object Token:TC TrustCenter, Germany, Class 2 CA
Builtin Object Token:TC TrustCenter, Germany, Class 3 CA
Builtin Object Token:Certum Root CA
Builtin Object Token:Comodo AAA Services root
Builtin Object Token:Comodo Secure Services root
Builtin Object Token:Comodo Trusted Services root
Builtin Object Token:IPS Chained CAs root
Builtin Object Token:IPS CLASE1 root
Builtin Object Token:IPS CLASE3 root
Builtin Object Token:IPS CLASEA1 root
Builtin Object Token:IPS CLASEA3 root
Builtin Object Token:IPS Servidores root
Builtin Object Token:IPS Timestamping root
Builtin Object Token:QuoVadis Root CA
Builtin Object Token:Security Communication Root CA
Builtin Object Token:Sonera Class 1 Root CA
Builtin Object Token:Sonera Class 2 Root CA
Builtin Object Token:Staat der Nederlanden Root CA
Builtin Object Token:TDC Internet Root CA
Builtin Object Token:TDC OCES Root CA
Builtin Object Token:UTN DATACorp SGC Root CA
Builtin Object Token:UTN USERFirst Email Root CA
Builtin Object Token:UTN USERFirst Hardware Root CA
Builtin Object Token:UTN USERFirst Object Root CA
Builtin Object Token:Camerfirma Chambers of Commerce Root
Builtin Object Token:Camerfirma Global Chambersign Root
Builtin Object Token:NetLock Qualified (Class QA) Root
Builtin Object Token:NetLock Notary (Class A) Root
Builtin Object Token:NetLock Business (Class B) Root
Builtin Object Token:NetLock Express (Class C) Root
Builtin Object Token:XRamp Global CA Root
Builtin Object Token:Go Daddy Class 2 CA
Builtin Object Token:Starfield Class 2 CA
Builtin Object Token:StartCom Ltd.
Builtin Object Token:Taiwan GRCA
Builtin Object Token:Firmaprofesional Root CA
Builtin Object Token:Wells Fargo Root CA
Builtin Object Token:Swisscom Root CA 1
- ------------
Certificates that can be used to sign objects have *'s to their left.
> > signtool -L -d . lists all of the certs, but only mine has a * before
> > the name
>
> What version of NSS are you using?
nss 3.11.4
nspr 4.6.4
> If you run the signtool program without any command line options, it outputs
> a page of "usage" information. The first non-blank line of that
> output looks like this:
>
> Signing Tool <VERSION> - a signing tool for jar files
Signing Tool 3.11.4 Basic ECC - a signing tool for jar files
> where <VERSION> is a "string" of characters (letters, numbers, periods,
> and words) that say what version of signtool you're using. Please tell
> us that info.
>
> > When I try to use it with signtool, I get this
> > ...
> > Generating zigbert.sf file..
> > warning - can't find private key for this cert
> > signtool: PROBLEM signing data (Unknown issuer)
>
> There are two separate issues there. They are:
> a) signtool thinks it cannot find the private key with which to sign the
> jar, and
> b) signtool reports that it cannot verify the signature on your cert,
> because it cannot find the cert for the issuer of your cert. That means
> that the signature it generates (if it can find the private key) will not
> be verifiable by clients (browsers) because the certificate chain will be
> incomplete.
>
> You need to get the certificate for the issuer of your code signing cert,
> and that needs to go into your cert DB too. If that cert had been present
> in Microsoft's cert store when you created the pfx file, it would have been
> put into the pfx file. So, I gather that you don't have that cert in either
> your NSS cert DB, nor in Microsoft's cert store.
>
You tell me if something is missing, see a bove the list
I have in the ms cert store this as well
Issued To
VeriSign Class 3 Code Signing 2004 CA
Certification path
VeriSign Class 3 Public Primary CA
VeriSign Class 3 Code Signing 2004 CA
If this is what I need, should I export it as pfx and import it into
the nss db?
> I suggest you do these things:
> 1) download the Verisign CA cert for the CA that issued your code signing
> cert, and get it into your Windows cert store. Verisign should have a web
> page of instructions on how to do that somewhere.
Not sure whether I know what it is, where to look for it and what is
the extension of this, and how to put it into the nss db?
Thanks
> 2) using Windows cert manager, edit your code signing cert and give it a
> "friendly name". I suggest using this friendly name:
> "Giorgio's Verisign code signing cert"
>
> Then create your pfx file again.
> Then list the pfx file with pk12util -l, as you did before (thanks).
> You should then see that there are two certs it in, and that your cert
> now has that "nickname" (friendly name), instead of its present "friendly
> name", which IINM is "2bee11b8-ca7d-4f71-b580-f72a581f84fa". (Not very
> friendly, is it?)
> Then create a new cert and key DB pair, and use pk12util to import your
> new pfx into it, and then try all this again.
>
> That should cure the "unknown issuer" problem. It may or may not have
> any effect on the "can't find private key" problem. But let's try that
> first.
Thanks, Nelson
_______________________________________________
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto