Re: revocation of roots

2008-10-24 Thread Julien R Pierre - Sun Microsystems
Ian, Ian G wrote: Also, add the caveat that this guesstimate only applies Mozilla product, and not these: - software that uses NSS but isn't a product of Mozilla - other libraries They have to sort themselves out. Whether we can do much about the other vendors is an open question. From

Re: storing custom public key / private key pair securely in Firefox

2008-10-24 Thread [EMAIL PROTECTED]
Hi, Thanks for your responses. So it seems like I want to create X.509 certificates from my keys and add them to the PKCS 11 data store in firefox. I want my certificates to be protected by a password to access them so does this mean they require their own slot? And if so, how do I create a new

Re: Dealing with third-party subordinates of T-Systems and others

2008-10-24 Thread Eddy Nigg
On 10/24/2008 05:34 PM, Frank Hecker: Eddy Nigg wrote: I'd like to pick this discussion up once again and evaluate what the goals of Mozilla and the Mozilla CA policy really are. Certainly the above is not the defined goal, but rather provide some reasonable assurance about the CAs included in N

Re: revocation of roots

2008-10-24 Thread Paul Hoffman
At 9:42 AM -0700 10/24/08, Robert Relyea wrote: >Paul Hoffman wrote: >>Robert: you are already in that business by distributing trust anchors that >>you have (sometimes) vetted. You are a CA without signing anything, just by >>distributing a trust anchor repository. >> >Yes, but by doing so we a

Re: revocation of roots

2008-10-24 Thread Eddy Nigg
On 10/24/2008 05:07 PM, Paul Hoffman: Robert: you are already in that business by distributing trust anchors that you have (sometimes) vetted. You are a CA without signing anything, just by distributing a trust anchor repository. Kind ofMozilla doesn't certify really anything, but exten

Re: revocation of roots

2008-10-24 Thread Frank Hecker
Frank Hecker wrote: So personally I'd consider a 5-day timeframe reasonable, and based on past conversations with people doing update releases, I think it might be pushed down as low as 3 days. I should clarify that this timeframe doesn't include any CA-related time prior to the Mozilla proj

Re: revocation of roots

2008-10-24 Thread Frank Hecker
Ian G wrote: OK, could we speculate that Mozo apps also could turn out a security update for their products in ... say 2 business days? Or, what number? And then, we could suggest that the whole process is likely to take a week (5 business days)? The Firefox team has done security updates wit

Re: Dealing with third-party subordinates of T-Systems and others

2008-10-24 Thread Frank Hecker
Eddy Nigg wrote: I'd like to pick this discussion up once again and evaluate what the goals of Mozilla and the Mozilla CA policy really are. Certainly the above is not the defined goal, but rather provide some reasonable assurance about the CAs included in NSS and Mozilla products and allow us

Re: revocation of roots

2008-10-24 Thread Robert Relyea
Paul Hoffman wrote: At 3:25 PM +0200 10/24/08, Ian G wrote: Robert Relyea wrote: The problem with this idea is that mozilla probably does not want to be in the CA business. The overhead of creating a mozilla root key in a safe and secure manner is quite involved (and more than doing a k

Re: revocation of roots

2008-10-24 Thread Paul Hoffman
At 3:25 PM +0200 10/24/08, Ian G wrote: >Robert Relyea wrote: > > The problem with this idea is that mozilla probably does not want to be >> in the CA business. The overhead of creating a mozilla root key in a >> safe and secure manner is quite involved (and more than doing a key gen > > on a smart

Re: revocation of roots

2008-10-24 Thread Ian G
Kyle Hamilton wrote: > RFC3280 has been obsoleted by RFC5280. Aside from that, though... > > ...did the people who created PKIX just not realize that if a non-root > certificate needs the ability to be revoked, a root certificate would > also? Hi Kyle, Of course it was realised, but what they

Re: revocation of roots

2008-10-24 Thread Ian G
Robert Relyea wrote: >>> >>> Can we eliminate the whole CA notion by just using a single sig over >>> the list from a "root" ... and just deliver signed updates? > We could use PKIX to authorize the roots by setting up a mozilla root, > then cross signing each of the approved roots. In that case m

Re: revocation of roots

2008-10-24 Thread Ian G
Julien R Pierre - Sun Microsystems wrote: > Eddy, > > Eddy Nigg wrote: >> On 10/23/2008 12:34 AM, Julien R Pierre - Sun Microsystems: >>>... However reality shows that it takes quite some time until >> a new version of NSS seeps to the application level, including with >> Mozilla's own products (w