Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2015-07-07 Thread David Keeler
Please file a new bug here:
https://bugzilla.mozilla.org/enter_bug.cgi?product=Corecomponent=Security%3A%20PSM
It would be helpful if you attached the certificate the device is sending.

On 07/01/2015 08:15 AM, pavel.shlyon...@gmail.com wrote:
 Hello guys.
 
 Just updated firmware in my Sonicwall TZ210W
 Now unable to sign in to management page.
 
 Secure Connection Failed
 The page you are trying to view cannot be shown because the authenticity of 
 the received data could not be verified.
 Please contact the website owners to inform them of this problem.
 What is the workaround to fix this?
 
 Certificate information.
 
 HTTPS Management Certificate 
 Certificate Issuer: /C=US/ST=California/L=Sunnyvale/O=HTTPS Management 
 Certificate for SonicWALL (self-signed)/OU=HTTPS Management Certificate for 
 SonicWALL (self-signed)/CN=192.168.168.168 
 Subject Distinguished Name: /C=US/ST=California/L=Sunnyvale/O=HTTPS 
 Management Certificate for SonicWALL (self-signed)/OU=HTTPS Management C
 ertificate for SonicWALL (self-signed)/CN=192.168.168.168 
 Certificate Serial Number: 4F50DAE9 
 Valid from: Jan  1 00:00:01 1970 GMT 
 Expires On: Jan 19 03:14:07 2038 GMT 
 Status: Not Verified - Self-signed 
  
 



signature.asc
Description: OpenPGP digital signature
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2015-07-07 Thread pavel . shlyonsky
Hello guys.

Just updated firmware in my Sonicwall TZ210W
Now unable to sign in to management page.

Secure Connection Failed
The page you are trying to view cannot be shown because the authenticity of the 
received data could not be verified.
Please contact the website owners to inform them of this problem.
What is the workaround to fix this?

Certificate information.

HTTPS Management Certificate 
Certificate Issuer: /C=US/ST=California/L=Sunnyvale/O=HTTPS Management 
Certificate for SonicWALL (self-signed)/OU=HTTPS Management Certificate for 
SonicWALL (self-signed)/CN=192.168.168.168 
Subject Distinguished Name: /C=US/ST=California/L=Sunnyvale/O=HTTPS Management 
Certificate for SonicWALL (self-signed)/OU=HTTPS Management C
ertificate for SonicWALL (self-signed)/CN=192.168.168.168 
Certificate Serial Number: 4F50DAE9 
Valid from: Jan  1 00:00:01 1970 GMT 
Expires On: Jan 19 03:14:07 2038 GMT 
Status: Not Verified - Self-signed 
 
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2015-03-03 Thread 1992 . chandu
On Monday, April 7, 2014 at 6:33:50 PM UTC-4, Kathleen Wilson wrote:
 All,
 
 We have been working on a new certificate verification library for 
 Gecko, and would greatly appreciate it if you will test this new library 
 and review the new code.
 
 Background
 
 NSS currently has two code paths for doing certificate verification. 
 Classic verification has been used for verification of non-EV 
 certificates, and libPKIX has been used for verification of EV 
 certificates.
 
 As many of you are aware, the NSS team has wanted to replace the 
 classic verification with libPKIX for a long time. However, the 
 current libPKIX code was auto-translated from Java to C, and has proven 
 to be very difficult to maintain and use. Therefore, Mozilla has created 
 a new certificate verification library called mozilla::pkix.
 
 Request for Testing
 
 Replacing the certificate verification library can only be done after 
 gaining sufficient confidence in the new code by having as many people 
 and organizations test it as possible.
 
 We ask that all of you help us test this new library as described here:
 https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Request_for_Testing
 
 Testing Window: The mozilla::pkix certificate verification library is 
 available for testing now in Nightly Firefox builds. We ask that you 
 test as soon as possible, and that you complete your testing before 
 Firefox 31 exits the Aurora branch in June.
 (See https://wiki.mozilla.org/RapidRelease/Calendar)
 
 Request for Code Review
 
 The more people who code review the new code, the better. So we ask all 
 of you C++ programmers out there to review the code and let us know if 
 you see any potential issues.
 https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Request_for_Code_Review
 
 
 We look forward to your help in testing and reviewing this new 
 certificate verification library.
 
 Mozilla Security Engineering Team

Hi,

I am facing some difficulty with a particular website.  I cannot log in to my 
college account.(my.rutgers.edu)  I get these errors
The page you are trying to view cannot be shown because the authenticity of 
the received data could not be verified.
Please contact the website owners to inform them of this problem.

I have not changed any setting.  It was working fine before I updated firefox.  
Please let me know what should I do to get rid of the problem.  Thanks in 
advance
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2015-03-03 Thread David Keeler
my.rutgers.edu only offers a single cipher suite
(TLS_RSA_WITH_RC4_128_SHA) and is TLS 1.1/1.2 intolerant [0]. We
essentially disabled RC4 and insecure fallback to TLS 1.0 by default,
which is why you're unable to connect with recent (i.e. pre-release)
versions of Firefox.
I filed bug 1139065 [1] as a tech evangelism bug to hopefully reach out
to the server administrators so they can fix their site.
In the meantime, if you set the pref
security.tls.insecure_fallback_hosts to my.rutgers.edu in
about:config, it should work.

Cheers,
David

[0] https://www.ssllabs.com/ssltest/analyze.html?d=my.rutgers.edu
[1] https://bugzilla.mozilla.org/show_bug.cgi?id=1139065

On 03/02/2015 10:47 AM, 1992.cha...@gmail.com wrote:
 Hi,
 
 I am facing some difficulty with a particular website.  I cannot log in to my 
 college account.(my.rutgers.edu)  I get these errors
 The page you are trying to view cannot be shown because the authenticity of 
 the received data could not be verified.
 Please contact the website owners to inform them of this problem.
 
 I have not changed any setting.  It was working fine before I updated 
 firefox.  Please let me know what should I do to get rid of the problem.  
 Thanks in advance
 
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-11-06 Thread crodenberg
On Thursday, October 16, 2014 3:04:59 PM UTC-5, treb...@gmail.com wrote:
 On Monday, April 7, 2014 6:33:50 PM UTC-4, Kathleen Wilson wrote:
  All,
  
  
  
  We have been working on a new certificate verification library for 
  
  Gecko, and would greatly appreciate it if you will test this new library 
  
  and review the new code.
  
  
  
  Background
  
  
  
  NSS currently has two code paths for doing certificate verification. 
  
  Classic verification has been used for verification of non-EV 
  
  certificates, and libPKIX has been used for verification of EV 
  
  certificates.
  
  
  
  As many of you are aware, the NSS team has wanted to replace the 
  
  classic verification with libPKIX for a long time. However, the 
  
  current libPKIX code was auto-translated from Java to C, and has proven 
  
  to be very difficult to maintain and use. Therefore, Mozilla has created 
  
  a new certificate verification library called mozilla::pkix.
  
  
  
  Request for Testing
  
  
  
  Replacing the certificate verification library can only be done after 
  
  gaining sufficient confidence in the new code by having as many people 
  
  and organizations test it as possible.
  
  
  
  We ask that all of you help us test this new library as described here:
  
  https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Request_for_Testing
  
  
  
  Testing Window: The mozilla::pkix certificate verification library is 
  
  available for testing now in Nightly Firefox builds. We ask that you 
  
  test as soon as possible, and that you complete your testing before 
  
  Firefox 31 exits the Aurora branch in June.
  
  (See https://wiki.mozilla.org/RapidRelease/Calendar)
  
  
  
  Request for Code Review
  
  
  
  The more people who code review the new code, the better. So we ask all 
  
  of you C++ programmers out there to review the code and let us know if 
  
  you see any potential issues.
  
  https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Request_for_Code_Review
  
  
  
  
  
  We look forward to your help in testing and reviewing this new 
  
  certificate verification library.
  
  
  
  Mozilla Security Engineering Team
 
 Mozilla::pkix includes some changes in support of current best practices and 
 policies, as listed below. If you notice an issue due to any of these 
 changes, please feel free to let us know. However, we believe that in most 
 cases, the simplest resolution will be to update the SSL certificate in your 
 webserver. 
 
 
 YOU F**KTARDS.. SOMETIMES WE HAVE ABSOLUTELY ZERO F**KING CONTROL OVER THE 
 SSL CERT PRESENTED.. WE **know** IT SHOULD BE TRUSTED BECAUSE ITS AN INTERNAL 
 F**KING DEVICE, AND DON'T GIVE ONE FLYING F**K IF THE CERT IS VALID OR NOT.. 
 
 WE **SHOULD** BE ALLOWED REGARDLESS OF THE F**KING CAUSE, TO ADD AN 
 EXCEPTION.. TAKE THE SAME F**KING URL TO ANY OTHER BROWSER, AND AT WORST YOU 
 GET CHROME WHICH NOW WON'T REMEMBER USER/PASS COMBOS TO GET INTO THOSE SITES
 
 
  BUT IT STILL F**KING LETS YOU GET TO THE GOD DAMNED F**KING SITE!
 
 WHY IS IT THAT YOU SMART A** F**KERS CAN'T UNDERSTAND YOU **CAN NOT FORCE 
 THIS ON PEOPLE**  YOU **MUST** ALLOW THEM TO ADD AN EXCEPTION EVEN IF 
 TEMPORARY!  OTHERWISE BY NOT ALLOWING US TO DO SO YOU FORCE US TO USE ANOTHER 
 BROWSER.. FOR SOME OF US AS PART OF OUR JOB.. AND WHAT THEN IS THE POINT OF 
 HAVING FIREFOX IF YOU CAN'T USE IT TO DO YOUR F**KING WORK?
 
 F**KTARD DEVELOPERS you think you're so smart, you think you know everything 
 and that because YOU think vendors of broken hardware should be forced to 
 fix.. or what.. buy something new? ... F U devs.. you fix this.. or see 
 people abandon you and loose what little cred you had in the browser war!

I agree with the opinion this user is trying to get across. We end users must 
have an option to completely circumvent security measures when we know a 
connection is trusted. Otherwise, like the poster indicated, we have to ditch 
Firefox and use a browser that gives us that capability. 

We, the end users, don't want to make a statement of how global security 
practices should theoretically work. We want to use a browser that we have 
control of and can use as a tool to accomplish a task. Removing some of the 
functionality of the browser and forcing us into a rigid security model only 
makes us install a second browser. Over time, I can imagine that the second 
browser would usurp Firefox's position as Preferred browser.

Just an opinion, from an end-user.
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-11-06 Thread Richard Barnes

 On Nov 5, 2014, at 3:43 PM, crodenb...@gmail.com wrote:
 
 On Thursday, October 16, 2014 3:04:59 PM UTC-5, treb...@gmail.com wrote:
 On Monday, April 7, 2014 6:33:50 PM UTC-4, Kathleen Wilson wrote:
 All,
 
 
 
 We have been working on a new certificate verification library for 
 
 Gecko, and would greatly appreciate it if you will test this new library 
 
 and review the new code.
 
 
 
 Background
 
 
 
 NSS currently has two code paths for doing certificate verification. 
 
 Classic verification has been used for verification of non-EV 
 
 certificates, and libPKIX has been used for verification of EV 
 
 certificates.
 
 
 
 As many of you are aware, the NSS team has wanted to replace the 
 
 classic verification with libPKIX for a long time. However, the 
 
 current libPKIX code was auto-translated from Java to C, and has proven 
 
 to be very difficult to maintain and use. Therefore, Mozilla has created 
 
 a new certificate verification library called mozilla::pkix.
 
 
 
 Request for Testing
 
 
 
 Replacing the certificate verification library can only be done after 
 
 gaining sufficient confidence in the new code by having as many people 
 
 and organizations test it as possible.
 
 
 
 We ask that all of you help us test this new library as described here:
 
 https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Request_for_Testing
 
 
 
 Testing Window: The mozilla::pkix certificate verification library is 
 
 available for testing now in Nightly Firefox builds. We ask that you 
 
 test as soon as possible, and that you complete your testing before 
 
 Firefox 31 exits the Aurora branch in June.
 
 (See https://wiki.mozilla.org/RapidRelease/Calendar)
 
 
 
 Request for Code Review
 
 
 
 The more people who code review the new code, the better. So we ask all 
 
 of you C++ programmers out there to review the code and let us know if 
 
 you see any potential issues.
 
 https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Request_for_Code_Review
 
 
 
 
 
 We look forward to your help in testing and reviewing this new 
 
 certificate verification library.
 
 
 
 Mozilla Security Engineering Team
 
 Mozilla::pkix includes some changes in support of current best practices and 
 policies, as listed below. If you notice an issue due to any of these 
 changes, please feel free to let us know. However, we believe that in most 
 cases, the simplest resolution will be to update the SSL certificate in your 
 webserver. 
 
 
 YOU F**KTARDS.. SOMETIMES WE HAVE ABSOLUTELY ZERO F**KING CONTROL OVER THE 
 SSL CERT PRESENTED.. WE **know** IT SHOULD BE TRUSTED BECAUSE ITS AN 
 INTERNAL F**KING DEVICE, AND DON'T GIVE ONE FLYING F**K IF THE CERT IS VALID 
 OR NOT.. 
 
 WE **SHOULD** BE ALLOWED REGARDLESS OF THE F**KING CAUSE, TO ADD AN 
 EXCEPTION.. TAKE THE SAME F**KING URL TO ANY OTHER BROWSER, AND AT WORST YOU 
 GET CHROME WHICH NOW WON'T REMEMBER USER/PASS COMBOS TO GET INTO THOSE SITES
 
 
  BUT IT STILL F**KING LETS YOU GET TO THE GOD DAMNED F**KING SITE!
 
 WHY IS IT THAT YOU SMART A** F**KERS CAN'T UNDERSTAND YOU **CAN NOT FORCE 
 THIS ON PEOPLE**  YOU **MUST** ALLOW THEM TO ADD AN EXCEPTION EVEN IF 
 TEMPORARY!  OTHERWISE BY NOT ALLOWING US TO DO SO YOU FORCE US TO USE 
 ANOTHER BROWSER.. FOR SOME OF US AS PART OF OUR JOB.. AND WHAT THEN IS THE 
 POINT OF HAVING FIREFOX IF YOU CAN'T USE IT TO DO YOUR F**KING WORK?
 
 F**KTARD DEVELOPERS you think you're so smart, you think you know everything 
 and that because YOU think vendors of broken hardware should be forced to 
 fix.. or what.. buy something new? ... F U devs.. you fix this.. or see 
 people abandon you and loose what little cred you had in the browser war!
 
 I agree with the opinion this user is trying to get across. We end users must 
 have an option to completely circumvent security measures when we know a 
 connection is trusted. Otherwise, like the poster indicated, we have to ditch 
 Firefox and use a browser that gives us that capability. 
 
 We, the end users, don't want to make a statement of how global security 
 practices should theoretically work. We want to use a browser that we have 
 control of and can use as a tool to accomplish a task. Removing some of the 
 functionality of the browser and forcing us into a rigid security model only 
 makes us install a second browser. Over time, I can imagine that the second 
 browser would usurp Firefox's position as Preferred browser.
 
 Just an opinion, from an end-user.

Just to let you know, we hear you.  We're having some internal discussions 
about how to better balance the considerations here.  

On the one hand, for most people in most situations, the browser needs to make 
an intelligent choice on behalf of the user.  Sometimes, that's going to 
involve not connecting at all.  

On the other hand, we also need to enable power users, who have done their 
homework, to get their work done.

Look for some proposals here soon.

--Richard



 -- 
 dev-tech-crypto 

Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-10-17 Thread Erwann Abalea
Le jeudi 16 octobre 2014 22:04:59 UTC+2, treb...@gmail.com a écrit :
[...]

 YOU F**KTARDS.. SOMETIMES WE HAVE ABSOLUTELY ZERO F**KING CONTROL OVER THE 
 SSL CERT PRESENTED.. WE **know** IT SHOULD BE TRUSTED BECAUSE ITS AN INTERNAL 
 F**KING DEVICE, AND DON'T GIVE ONE FLYING F**K IF THE CERT IS VALID OR NOT.. 

[...]

 F**KTARD DEVELOPERS you think you're so smart, you think you know everything 
 and that because YOU think vendors of broken hardware should be forced to 
 fix.. or what.. buy something new? ... F U devs.. you fix this.. or see 
 people abandon you and loose what little cred you had in the browser war!

All this could have been written using less capital letters and less bad words. 
That doesn't help your cause.
Next time you're angry, find a wall and hit it, or go run outside while 
yelling. Then come back positive-minded.

Kiss.
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-10-16 Thread treborg2
On Monday, April 7, 2014 6:33:50 PM UTC-4, Kathleen Wilson wrote:
 All,
 
 
 
 We have been working on a new certificate verification library for 
 
 Gecko, and would greatly appreciate it if you will test this new library 
 
 and review the new code.
 
 
 
 Background
 
 
 
 NSS currently has two code paths for doing certificate verification. 
 
 Classic verification has been used for verification of non-EV 
 
 certificates, and libPKIX has been used for verification of EV 
 
 certificates.
 
 
 
 As many of you are aware, the NSS team has wanted to replace the 
 
 classic verification with libPKIX for a long time. However, the 
 
 current libPKIX code was auto-translated from Java to C, and has proven 
 
 to be very difficult to maintain and use. Therefore, Mozilla has created 
 
 a new certificate verification library called mozilla::pkix.
 
 
 
 Request for Testing
 
 
 
 Replacing the certificate verification library can only be done after 
 
 gaining sufficient confidence in the new code by having as many people 
 
 and organizations test it as possible.
 
 
 
 We ask that all of you help us test this new library as described here:
 
 https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Request_for_Testing
 
 
 
 Testing Window: The mozilla::pkix certificate verification library is 
 
 available for testing now in Nightly Firefox builds. We ask that you 
 
 test as soon as possible, and that you complete your testing before 
 
 Firefox 31 exits the Aurora branch in June.
 
 (See https://wiki.mozilla.org/RapidRelease/Calendar)
 
 
 
 Request for Code Review
 
 
 
 The more people who code review the new code, the better. So we ask all 
 
 of you C++ programmers out there to review the code and let us know if 
 
 you see any potential issues.
 
 https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Request_for_Code_Review
 
 
 
 
 
 We look forward to your help in testing and reviewing this new 
 
 certificate verification library.
 
 
 
 Mozilla Security Engineering Team

Mozilla::pkix includes some changes in support of current best practices and 
policies, as listed below. If you notice an issue due to any of these changes, 
please feel free to let us know. However, we believe that in most cases, the 
simplest resolution will be to update the SSL certificate in your webserver. 


YOU F**KTARDS.. SOMETIMES WE HAVE ABSOLUTELY ZERO F**KING CONTROL OVER THE SSL 
CERT PRESENTED.. WE **know** IT SHOULD BE TRUSTED BECAUSE ITS AN INTERNAL 
F**KING DEVICE, AND DON'T GIVE ONE FLYING F**K IF THE CERT IS VALID OR NOT.. 

WE **SHOULD** BE ALLOWED REGARDLESS OF THE F**KING CAUSE, TO ADD AN EXCEPTION.. 
TAKE THE SAME F**KING URL TO ANY OTHER BROWSER, AND AT WORST YOU GET CHROME 
WHICH NOW WON'T REMEMBER USER/PASS COMBOS TO GET INTO THOSE SITES


 BUT IT STILL F**KING LETS YOU GET TO THE GOD DAMNED F**KING SITE!

WHY IS IT THAT YOU SMART A** F**KERS CAN'T UNDERSTAND YOU **CAN NOT FORCE THIS 
ON PEOPLE**  YOU **MUST** ALLOW THEM TO ADD AN EXCEPTION EVEN IF TEMPORARY!  
OTHERWISE BY NOT ALLOWING US TO DO SO YOU FORCE US TO USE ANOTHER BROWSER.. FOR 
SOME OF US AS PART OF OUR JOB.. AND WHAT THEN IS THE POINT OF HAVING FIREFOX IF 
YOU CAN'T USE IT TO DO YOUR F**KING WORK?

F**KTARD DEVELOPERS you think you're so smart, you think you know everything 
and that because YOU think vendors of broken hardware should be forced to fix.. 
or what.. buy something new? ... F U devs.. you fix this.. or see people 
abandon you and loose what little cred you had in the browser war!
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-10-05 Thread davpjdab
I am accessing pfSense router/s that have self-generated certificates so 
obviously they do not validate publicly. Prior to Firefox 31 I had the security 
warning and had clicked through to add the certificate for a number of these 
routers on our internal networks.
The list of certificates in Firefox then included a bunch under the name 
CompanyName.
After upgrade to Firefox 31 it started taking a long time (15-20 seconds) to 
bring up the login page to these routers. During that time the CPU was running 
100%. Then after login, every few minutes Firefox would use 100% CPU for a 
minute or 2, becoming effectively unresponsive in any tab.
I tried Firefox 24, 28, 29, 30 - none of these had the symptoms.
Tried Firefox 31, 32, 33 (beta) and 34 (aurora). They all had the symptoms 
described.
Looking in pfSense forums I discovered this post - 
https://forum.pfsense.org/index.php?topic=82295.0
I deleted the certificates under CompanyName.
Now display time for the Login page is back to normal, and Firefox CPU time is 
not going crazy every few minutes.
Maybe there is something that can be done to help this situation? Maybe these 
old private certificates need to be cleaned out on upgrade? Or maybe 
something in the code that is going nuts trying to validate these private 
certificates needs to be fixed?
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-10-05 Thread davpjdab
I am accessing pfSense router/s that have self-generated certificates so 
obviously they do not validate publicly. Prior to Firefox 31 I had the security 
warning and had clicked through to add the certificate for a number of these 
routers on our internal networks.
The list of certificates in Firefox then included a bunch under the name 
CompanyName.
After upgrade to Firefox 31 it started taking a long time (15-20 seconds) to 
bring up the login page to these routers. During that time the CPU was running 
100%. Then after login, every few minutes Firefox would use 100% CPU for a 
minute or 2, becoming effectively unresponsive in any tab.
I tried Firefox 24, 28, 29, 30 - none of these had the symptoms.
Tried Firefox 31, 32, 33 (beta) and 34 (aurora). They all had the symptoms 
described.
Looking in pfSense forums I discovered this post - 
https://forum.pfsense.org/index.php?topic=82295.0 - and added to it.
I deleted the certificates under CompanyName.
Now display time for the Login page is back to normal, and Firefox CPU time is 
not going crazy every few minutes.
Maybe there is something that can be done to hep this situation? Maybe these 
old private certificates need to be cleaned out on upgrade? Or maybe 
something in the code that is going nuts trying to validate these private 
certificates needs to be fixed?
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-10-05 Thread Brian Smith
On Thu, Oct 2, 2014 at 9:03 AM,  davpj...@ozemail.com.au wrote:
 Maybe there is something that can be done to hep this situation? Maybe these 
 old private certificates need to be cleaned out on upgrade? Or maybe 
 something in the code that is going nuts trying to validate these private 
 certificates needs to be fixed?

There is already a bug report about this issue:
https://bugzilla.mozilla.org/show_bug.cgi?id=1056341

Cheers,
Brian
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-09-22 Thread mamace
On Monday, April 7, 2014 6:33:50 PM UTC-4, Kathleen Wilson wrote:
 All,
 
 
 
 We have been working on a new certificate verification library for 
 
 Gecko, and would greatly appreciate it if you will test this new library 
 
 and review the new code.
 
 
 
 Background
 
 
 
 NSS currently has two code paths for doing certificate verification. 
 
 Classic verification has been used for verification of non-EV 
 
 certificates, and libPKIX has been used for verification of EV 
 
 certificates.
 
 
 
 As many of you are aware, the NSS team has wanted to replace the 
 
 classic verification with libPKIX for a long time. However, the 
 
 current libPKIX code was auto-translated from Java to C, and has proven 
 
 to be very difficult to maintain and use. Therefore, Mozilla has created 
 
 a new certificate verification library called mozilla::pkix.
 
 
 
 Request for Testing
 
 
 
 Replacing the certificate verification library can only be done after 
 
 gaining sufficient confidence in the new code by having as many people 
 
 and organizations test it as possible.
 
 
 
 We ask that all of you help us test this new library as described here:
 
 https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Request_for_Testing
 
 
 
 Testing Window: The mozilla::pkix certificate verification library is 
 
 available for testing now in Nightly Firefox builds. We ask that you 
 
 test as soon as possible, and that you complete your testing before 
 
 Firefox 31 exits the Aurora branch in June.
 
 (See https://wiki.mozilla.org/RapidRelease/Calendar)
 
 
 
 Request for Code Review
 
 
 
 The more people who code review the new code, the better. So we ask all 
 
 of you C++ programmers out there to review the code and let us know if 
 
 you see any potential issues.
 
 https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Request_for_Code_Review
 
 
 
 
 
 We look forward to your help in testing and reviewing this new 
 
 certificate verification library.
 
 
 
 Mozilla Security Engineering Team

We use self-signed certificates for our DEV, TEST, and Staging environments and 
now we cannot access the sites via Firefox. When i change the the about:config 
mozilla::pkix attribute to false, we get a 404 error.
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-08-15 Thread Julien Pierre

Brian,

I just ran into the Netscape Cert Type critical extension issue with an 
internal cert.

Is there an override setting to allow this cert to work in Firefox still ?

IMO, the Firefox behavior is particularly bad, because Firefox won't 
even let you look at the cert details to see what the problematic 
extension is. I had to look at the cert details in Chrome (which still 
uses libpkix) .


Julien

--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-08-15 Thread David Keeler
Hi Julien,

Currently there is no way to override that behavior. We're working on
improving the situation in bug 1009161.
See also bug 1054368 regarding a way to view the certificate for
non-overridable errors.
If you can get in touch with whoever administers the internal
certificates, I would encourage them to take a look at
https://wiki.mozilla.org/SecurityEngineering/x509Certs for information
on how to create a certificate hierarchy that is compatible with RFC 5280.

David

On 08/15/2014 12:47 AM, Julien Pierre wrote:
 Brian,
 
 I just ran into the Netscape Cert Type critical extension issue with an
 internal cert.
 Is there an override setting to allow this cert to work in Firefox still ?
 
 IMO, the Firefox behavior is particularly bad, because Firefox won't
 even let you look at the cert details to see what the problematic
 extension is. I had to look at the cert details in Chrome (which still
 uses libpkix) .
 
 Julien
 
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-08-12 Thread bruce
On Monday, April 7, 2014 6:33:50 PM UTC-4, Kathleen Wilson wrote:
 All,
 
 
 
 We have been working on a new certificate verification library for 
 
 Gecko, and would greatly appreciate it if you will test this new library 
 
 and review the new code.
 
 
 
 Background
 
 
 
 NSS currently has two code paths for doing certificate verification. 
 
 Classic verification has been used for verification of non-EV 
 
 certificates, and libPKIX has been used for verification of EV 
 
 certificates.
 
 
 
 As many of you are aware, the NSS team has wanted to replace the 
 
 classic verification with libPKIX for a long time. However, the 
 
 current libPKIX code was auto-translated from Java to C, and has proven 
 
 to be very difficult to maintain and use. Therefore, Mozilla has created 
 
 a new certificate verification library called mozilla::pkix.
 
 
 
 Request for Testing
 
 
 
 Replacing the certificate verification library can only be done after 
 
 gaining sufficient confidence in the new code by having as many people 
 
 and organizations test it as possible.
 
 
 
 We ask that all of you help us test this new library as described here:
 
 https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Request_for_Testing
 
 
 
 Testing Window: The mozilla::pkix certificate verification library is 
 
 available for testing now in Nightly Firefox builds. We ask that you 
 
 test as soon as possible, and that you complete your testing before 
 
 Firefox 31 exits the Aurora branch in June.
 
 (See https://wiki.mozilla.org/RapidRelease/Calendar)
 
 
 
 Request for Code Review
 
 
 
 The more people who code review the new code, the better. So we ask all 
 
 of you C++ programmers out there to review the code and let us know if 
 
 you see any potential issues.
 
 https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Request_for_Code_Review
 
 
 
 
 
 We look forward to your help in testing and reviewing this new 
 
 certificate verification library.
 
 
 
 Mozilla Security Engineering Team

Yup - having a problem. Novell ZENworks optionally uses an internal CA and with 
FF 31 I can no longer connect to the management console or any of the other web 
services. I'll try turning off the new CA checker to see if that works. I like 
the idea of better security, but you just pissed off a lot of my customers.

Bruce McDowell
McDowell Consulting LLC
br...@consultbruce.com
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-08-07 Thread Richard Barnes
On Aug 5, 2014, at 1:25 PM, Brian Smith br...@briansmith.org wrote:

 On Tue, Aug 5, 2014 at 9:51 AM,  mjle...@gmail.com wrote:
 Since updating to 31, I have not been able to log into a self signed web 
 page:
 
 Secure Connection Failed
 
 An error occurred during a connection to taiserver:444. Certificate key 
 usage inadequate for attempted operation. (Error code: 
 sec_error_inadequate_key_usage)
 
 How do I get this corrected?
 
 Please file a bug at
 https://bugzilla.mozilla.org/enter_bug.cgi?product=Corecomponent=Security:%20PSM
 (Product: Core, Component: PSM) and attach the certificate in question
 to the bug report.

Of course, it sounds likely to be related to the new key usage checks listed in 
the relevant wiki page:
https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Behavior_Changes

You might check to see if that's the case before filing a bug.

--Richard



 
 Cheers,
 Brian
 -- 
 dev-tech-crypto mailing list
 dev-tech-crypto@lists.mozilla.org
 https://lists.mozilla.org/listinfo/dev-tech-crypto

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-08-05 Thread mjley59
Since updating to 31, I have not been able to log into a self signed web page:

Secure Connection Failed

An error occurred during a connection to taiserver:444. Certificate key usage 
inadequate for attempted operation. (Error code: sec_error_inadequate_key_usage)

How do I get this corrected?

Mike
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-08-05 Thread Brian Smith
On Tue, Aug 5, 2014 at 9:51 AM,  mjle...@gmail.com wrote:
 Since updating to 31, I have not been able to log into a self signed web page:

 Secure Connection Failed

 An error occurred during a connection to taiserver:444. Certificate key usage 
 inadequate for attempted operation. (Error code: 
 sec_error_inadequate_key_usage)

 How do I get this corrected?

Please file a bug at
https://bugzilla.mozilla.org/enter_bug.cgi?product=Corecomponent=Security:%20PSM
(Product: Core, Component: PSM) and attach the certificate in question
to the bug report.

Cheers,
Brian
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-08-04 Thread David Keeler
On 08/02/2014 08:39 AM, colinhogg...@gmail.com wrote:
 Since the latest update 3 days ago I have been unable to log in to any of my 
 Netgear equipment using Firefox.  I get the error: (Error code: 
 sec_error_extension_value_invalid.   I can access my equipment using Explorer 
 so I can only assume it might be something to do with this access list. 
 

That sounds like bug 101 (
https://bugzilla.mozilla.org/show_bug.cgi?id=101 ).
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-07-25 Thread jugal . saini
Team

After upgrade to Firefox 31, I am not able to request any https link through my 
firewall and getting certificate failure. I tried re-import of firewall 
certificate but in vein.

Please suggest.


On Tuesday, 8 April 2014 04:03:50 UTC+5:30, Kathleen Wilson  wrote:
 All,
 
 
 
 We have been working on a new certificate verification library for 
 
 Gecko, and would greatly appreciate it if you will test this new library 
 
 and review the new code.
 
 
 
 Background
 
 
 
 NSS currently has two code paths for doing certificate verification. 
 
 Classic verification has been used for verification of non-EV 
 
 certificates, and libPKIX has been used for verification of EV 
 
 certificates.
 
 
 
 As many of you are aware, the NSS team has wanted to replace the 
 
 classic verification with libPKIX for a long time. However, the 
 
 current libPKIX code was auto-translated from Java to C, and has proven 
 
 to be very difficult to maintain and use. Therefore, Mozilla has created 
 
 a new certificate verification library called mozilla::pkix.
 
 
 
 Request for Testing
 
 
 
 Replacing the certificate verification library can only be done after 
 
 gaining sufficient confidence in the new code by having as many people 
 
 and organizations test it as possible.
 
 
 
 We ask that all of you help us test this new library as described here:
 
 https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Request_for_Testing
 
 
 
 Testing Window: The mozilla::pkix certificate verification library is 
 
 available for testing now in Nightly Firefox builds. We ask that you 
 
 test as soon as possible, and that you complete your testing before 
 
 Firefox 31 exits the Aurora branch in June.
 
 (See https://wiki.mozilla.org/RapidRelease/Calendar)
 
 
 
 Request for Code Review
 
 
 
 The more people who code review the new code, the better. So we ask all 
 
 of you C++ programmers out there to review the code and let us know if 
 
 you see any potential issues.
 
 https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Request_for_Code_Review
 
 
 
 
 
 We look forward to your help in testing and reviewing this new 
 
 certificate verification library.
 
 
 
 Mozilla Security Engineering Team

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-07-25 Thread David Keeler
Hi Jugal,

For issues with mozilla::pkix, the following might be helpful:
https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Behavior_Changes
If that doesn't resolve the issue, please file a bug here:
https://bugzilla.mozilla.org/enter_bug.cgi?product=Corecomponent=Security:%20PSMshort_desc=%28mozilla::pkix%29
It would be helpful if you could include either a link to a
publicly-accessible site that exhibits the problem or post a copy of the
certificate chain that is problematic. The error code (something like
sec_error_...) would also be helpful.

Thanks,
David

On 07/24/2014 09:26 PM, jugal.sa...@gmail.com wrote:
 Team
 
 After upgrade to Firefox 31, I am not able to request any https link through 
 my firewall and getting certificate failure. I tried re-import of firewall 
 certificate but in vein.
 
 Please suggest.
 
 
 On Tuesday, 8 April 2014 04:03:50 UTC+5:30, Kathleen Wilson  wrote:
 All,



 We have been working on a new certificate verification library for 

 Gecko, and would greatly appreciate it if you will test this new library 

 and review the new code.



 Background



 NSS currently has two code paths for doing certificate verification. 

 Classic verification has been used for verification of non-EV 

 certificates, and libPKIX has been used for verification of EV 

 certificates.



 As many of you are aware, the NSS team has wanted to replace the 

 classic verification with libPKIX for a long time. However, the 

 current libPKIX code was auto-translated from Java to C, and has proven 

 to be very difficult to maintain and use. Therefore, Mozilla has created 

 a new certificate verification library called mozilla::pkix.



 Request for Testing



 Replacing the certificate verification library can only be done after 

 gaining sufficient confidence in the new code by having as many people 

 and organizations test it as possible.



 We ask that all of you help us test this new library as described here:

 https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Request_for_Testing



 Testing Window: The mozilla::pkix certificate verification library is 

 available for testing now in Nightly Firefox builds. We ask that you 

 test as soon as possible, and that you complete your testing before 

 Firefox 31 exits the Aurora branch in June.

 (See https://wiki.mozilla.org/RapidRelease/Calendar)



 Request for Code Review



 The more people who code review the new code, the better. So we ask all 

 of you C++ programmers out there to review the code and let us know if 

 you see any potential issues.

 https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Request_for_Code_Review





 We look forward to your help in testing and reviewing this new 

 certificate verification library.



 Mozilla Security Engineering Team
 
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-04-28 Thread David Keeler
On 04/26/2014 01:44 AM, Erwann Abalea wrote:
 Took a quick look at the code, it looks like KU/EKU checks is ok, 
 BasicConstraints checks are weirdly done, NameConstraints checks are hard to 
 follow, CertificatePolicies checks is a joke. I now notice that I didn't see 
 date checks (I may have missed it). Init part of the validation code follows 
 RFC5280 algorithm, but that's all.
 Revocation checking is done by OCSP only.
 And there's a LOT of magic values everywhere; I noticed them first for OID 
 comparisons, but there's little to no use of an ASN.1/DER parser (IIRC, 
 there's already 2 implementations in NSS).

Erwann,

It would be a great help if you could either expand on the issues you
found here or file bugs in bugzilla. The sooner we catch and deal with
issues the better.

Date checks are done here:
https://mxr.mozilla.org/mozilla-central/source/security/pkix/lib/pkixcheck.cpp#29
There's a minimal DER decoder here:
https://mxr.mozilla.org/mozilla-central/source/security/pkix/lib/pkixder.h
that implements what is needed for this library and nothing more (for
example,
https://mxr.mozilla.org/mozilla-central/source/security/pkix/lib/pkixocsp.cpp
makes heavy use of it).

Thank you,
David
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-04-28 Thread Kyle Hamilton
On Fri, Apr 25, 2014 at 6:59 AM, Erwann Abalea eaba...@gmail.com wrote:
 Le vendredi 25 avril 2014 13:46:51 UTC+2, Martin Paljak a écrit :
 On Thu, Apr 24, 2014 at 9:07 PM, Kathleen Wilson kwil...@mozilla.com
wrote:
  Also, we added a section to the wiki page to list some behavior
changes that
  could cause a website certificate to no longer validate with Firefox
31.
 
https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Behavior_Changes

 What is the rationale for this:

 4. Mozilla::pkix performs chaining based on issuer name alone, and
 does not require that issuer's subject key match the authority key
 info (AKI) extension in the certificate. Classic verification enforces
 the AKI restriction.

 AKI is only a helper for certificate path building.
 It's mandatory for CAs to issue certificates with matching keyIdentifiers
(issued.AKI.keyIdentifier = issuer.SKI), but it's not mandatory for relying
parties to verify that the values match.

Erwann (and all),

AKI is necessary for multiple public keys used by the same Subject
certifier.  It's particularly useful for a rolling chain of public keys,
each one used to sign certificates within a given period of months, but
with overlapping validity periods.

0 3 6 9121518212427
|u|v|v|v|v|.|.|.|.|
|.|u|v|v|v|v|.|.|.|
|.|.|u|v|v|v|v|.|.|
|.|.|.|u|v|v|v|v|.|
|.|.|.|.|u|v|v|v|v|

In this diagram, 'u' means in use.  'v' means valid.  The numbers at
the top refer to 'counted months'.  So, in this case, the private keys are
used for 3 months while their issued certificates are valid for up to 12
months.  There are 5 potential keys, identifiable only through the use of
the AKID extension.

Yes, the certified entity is supposed to provide its verifiable chain, back
to the root (but not including the root)... at least, according to TLS, and
other IETF Security working-area client protocols.  But, it's not mandatory
per PKIX, and it's also not mandatory per X.509, either.

I believe this to be a poor design decision on the part of Mozilla.

-Kyle H
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-04-28 Thread Brian Smith
On Mon, Apr 28, 2014 at 4:45 PM, Erwann Abalea eaba...@gmail.com wrote:

 The chain builder can test all possible issuers until it finds a valid one
 (that's what OpenSSL does, for example). The AKI is only here to say
 pssst, this is most probably the certificate you should try first.


Right. We need to measure whether our lack of support for AKI/SKI, which
causes us to do such a brute-force search, actually causes real-world
performance concerns. I am hoping that it doesn't matter so that we can
remove AKI/SKI from the WebPKI X.509 profile.

There's another missing check on the new PKIX lib, PrivateKeyUsagePeriod
 extension. It's been declared as deprecated in RFC2459 and 3280, isn't
 mentioned anymore in RFC5280, but it's still defined in X.509, and used on
 some places, such as CSCA (e-passports, where CA renewal with rekey also
 happen on a regular basis).


CSCA is out of scope for mozilla::pkix, at least at this time. More
generally, PrivateKeyUsagePeriodand other deprecated features, including
*all* of the proprietary Netscape/NSS extensions like Netscape Cert Type,
are also out of scope. Note that new features like the Must-Staple
extension *are* within scope and can/should/will be added.


  I agree, it's not mandatory at all. And even if a bunch of certificates
 is sent along the EE cert, the RP is supposed to take them as potential
 candidates for its chain building algorithm. Potential candidates only.


Exactly. (In the code, the candidate issuer is called potentialIssuer.)

Thanks for looking so closely at the code. Please let me know if you have
any questions that would help with your investigation of it.

Cheers,
Brian
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-04-26 Thread Erwann Abalea
Le vendredi 25 avril 2014 21:09:58 UTC+2, Martin Paljak a écrit :
 On Fri, Apr 25, 2014 at 4:59 PM, Erwann Abalea eaba...@gmail.com wrote:
  AKI is only a helper for certificate path building.
  It's mandatory for CAs to issue certificates with matching keyIdentifiers 
  (issued.AKI.keyIdentifier = issuer.SKI), but it's not mandatory for relying 
  parties to verify that the values match.
 
 
 While I might agree to the reasoning behind why it doesn't matter, I
 don't see why a cautious implementation (not to call it *paranoid*
 which might have a different meaning to some) does not *check* what
 others are *required to do*. And do that *by default*. Not doing it
 under some more relaxed conditions (export cipher anyone ?).

Priorities. Let them first do their mandatory duties, and *then* add some 
paranoid checks.
Took a quick look at the code, it looks like KU/EKU checks is ok, 
BasicConstraints checks are weirdly done, NameConstraints checks are hard to 
follow, CertificatePolicies checks is a joke. I now notice that I didn't see 
date checks (I may have missed it). Init part of the validation code follows 
RFC5280 algorithm, but that's all.
Revocation checking is done by OCSP only.
And there's a LOT of magic values everywhere; I noticed them first for OID 
comparisons, but there's little to no use of an ASN.1/DER parser (IIRC, there's 
already 2 implementations in NSS).
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-04-25 Thread Martin Paljak
On Thu, Apr 24, 2014 at 9:07 PM, Kathleen Wilson kwil...@mozilla.com wrote:
 Also, we added a section to the wiki page to list some behavior changes that
 could cause a website certificate to no longer validate with Firefox 31.
 https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Behavior_Changes

What is the rationale for this:

4. Mozilla::pkix performs chaining based on issuer name alone, and
does not require that issuer's subject key match the authority key
info (AKI) extension in the certificate. Classic verification enforces
the AKI restriction.

?
--
Martin
+372 515 6495
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-04-25 Thread Erwann Abalea
Le vendredi 25 avril 2014 13:46:51 UTC+2, Martin Paljak a écrit :
 On Thu, Apr 24, 2014 at 9:07 PM, Kathleen Wilson kwil...@mozilla.com wrote:
  Also, we added a section to the wiki page to list some behavior changes that
  could cause a website certificate to no longer validate with Firefox 31.
  https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Behavior_Changes
 
 What is the rationale for this:
 
 4. Mozilla::pkix performs chaining based on issuer name alone, and
 does not require that issuer's subject key match the authority key
 info (AKI) extension in the certificate. Classic verification enforces
 the AKI restriction.

AKI is only a helper for certificate path building.
It's mandatory for CAs to issue certificates with matching keyIdentifiers 
(issued.AKI.keyIdentifier = issuer.SKI), but it's not mandatory for relying 
parties to verify that the values match.
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-04-25 Thread Zack Weinberg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 04/25/2014 09:59 AM, Erwann Abalea wrote:
 Le vendredi 25 avril 2014 13:46:51 UTC+2, Martin Paljak a écrit :
 
 What is the rationale for this:
 
 4. Mozilla::pkix performs chaining based on issuer name alone,
 and does not require that issuer's subject key match the
 authority key info (AKI) extension in the certificate. Classic
 verification enforces the AKI restriction.
 
 AKI is only a helper for certificate path building. It's mandatory 
 for CAs to issue certificates with matching keyIdentifiers 
 (issued.AKI.keyIdentifier = issuer.SKI), but it's not mandatory
 for relying parties to verify that the values match.

That doesn't seem like enough of a justification to me.  It may not be
mandatory, but please explain why it is not *necessary* (i.e. why no
security guarantees depend on it).

zw

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
Comment: Using GnuPG with Icedove - http://www.enigmail.net/
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=dTnD
-END PGP SIGNATURE-
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-04-25 Thread Camilo Viecco


On 4/25/14, 9:18 AM, Zack Weinberg wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 04/25/2014 09:59 AM, Erwann Abalea wrote:

Le vendredi 25 avril 2014 13:46:51 UTC+2, Martin Paljak a écrit :

What is the rationale for this:

4. Mozilla::pkix performs chaining based on issuer name alone,
and does not require that issuer's subject key match the
authority key info (AKI) extension in the certificate. Classic
verification enforces the AKI restriction.

AKI is only a helper for certificate path building. It's mandatory
for CAs to issue certificates with matching keyIdentifiers
(issued.AKI.keyIdentifier = issuer.SKI), but it's not mandatory
for relying parties to verify that the values match.

That doesn't seem like enough of a justification to me.  It may not be
mandatory, but please explain why it is not *necessary* (i.e. why no
security guarantees depend on it).
Lets pretend for the sake of the argument that you are an attacker and 
can modify the value of the AKI (assume that the AKI is not signed by 
the CA).  You will notice that this field is NOT used to determine your 
identity (like the name or subject-alt-names) you or the determine 
capabilites of your cert (and private key) (like the basic constraints, 
KU, EKU, Cert Policies, name constraints extensions).


Is it more clear now?

Camilo

--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-04-25 Thread Martin Paljak
On Fri, Apr 25, 2014 at 4:59 PM, Erwann Abalea eaba...@gmail.com wrote:
 AKI is only a helper for certificate path building.
 It's mandatory for CAs to issue certificates with matching keyIdentifiers 
 (issued.AKI.keyIdentifier = issuer.SKI), but it's not mandatory for relying 
 parties to verify that the values match.


While I might agree to the reasoning behind why it doesn't matter, I
don't see why a cautious implementation (not to call it *paranoid*
which might have a different meaning to some) does not *check* what
others are *required to do*. And do that *by default*. Not doing it
under some more relaxed conditions (export cipher anyone ?).

Best,
--
Martin
+372 515 6495
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


Re: Announcing Mozilla::PKIX, a New Certificate Verification Library

2014-04-24 Thread Kathleen Wilson

On 4/7/14, 3:33 PM, Kathleen Wilson wrote:

All,

We have been working on a new certificate verification library for
Gecko, and would greatly appreciate it if you will test this new library
and review the new code.



A special Bug Bounty program has been announced regarding this:
https://blog.mozilla.org/security/2014/04/24/1-security-bug-bounty-for-certificate-verification/

Also, we added a section to the wiki page to list some behavior changes 
that could cause a website certificate to no longer validate with 
Firefox 31.

https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Behavior_Changes

Kathleen

--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto