Re: Transitioning the default keystore format to PKCS#12

2012-11-06 Thread Michael StJohns
At 02:20 PM 11/6/2012, Vincent Ryan wrote: >> A certificate unpaired with a private key will not be imported with existing >> tools. (MS certmgr and firefox/thunderbird). If its paired with a private >> key, it gets imported into the personal cert portion of the certificate >> store. It's po

Re: Transitioning the default keystore format to PKCS#12

2012-11-06 Thread Vincent Ryan
On 6 Nov 2012, at 14:21, Michael StJohns wrote: > At 03:52 PM 11/5/2012, Vincent Ryan wrote: >> On 05/11/2012 18:28, Michael StJohns wrote: >>> At 09:17 AM 11/5/2012, Vincent Ryan wrote: Thanks for your suggestion Mike. I quite like that approach but I'm concerned that existing tools a

Re: Transitioning the default keystore format to PKCS#12

2012-11-06 Thread Michael StJohns
At 03:52 PM 11/5/2012, Vincent Ryan wrote: >On 05/11/2012 18:28, Michael StJohns wrote: >>At 09:17 AM 11/5/2012, Vincent Ryan wrote: >>>Thanks for your suggestion Mike. I quite like that approach but I'm >>>concerned that existing tools and >>>browsers do not support this new type of PKCS12 safe b

Re: Transitioning the default keystore format to PKCS#12

2012-11-05 Thread Vincent Ryan
On 05/11/2012 18:28, Michael StJohns wrote: At 09:17 AM 11/5/2012, Vincent Ryan wrote: Thanks for your suggestion Mike. I quite like that approach but I'm concerned that existing tools and browsers do not support this new type of PKCS12 safe bag. I went back and took a look at the PKCS12 stan

Re: Transitioning the default keystore format to PKCS#12

2012-11-05 Thread Michael StJohns
At 09:17 AM 11/5/2012, Vincent Ryan wrote: >Thanks for your suggestion Mike. I quite like that approach but I'm concerned >that existing tools and >browsers do not support this new type of PKCS12 safe bag. I went back and took a look at the PKCS12 standard. The ASN1 defining the list of bag typ

Re: Transitioning the default keystore format to PKCS#12

2012-11-05 Thread Vincent Ryan
Thanks for your suggestion Mike. I quite like that approach but I'm concerned that existing tools and browsers do not support this new type of PKCS12 safe bag. If we could overcome the issue with using extendedKeyUsage as a bag attribute then I think that the current proposal using cert bag woul

Re: Transitioning the default keystore format to PKCS#12

2012-11-04 Thread Michael StJohns
At 11:14 PM 11/1/2012, Michael StJohns wrote: >The appeal of re-purposing the extendedKeyUsage attribute is that it is >already well known as a certificate extension. And in addition, it can be used >by keystore owners to limit a cert's trust level to quite specific purposes. > >This is one of th

Re: Transitioning the default keystore format to PKCS#12

2012-11-02 Thread Vincent Ryan
On 2 Nov 2012, at 04:14, Michael StJohns wrote: > At 02:26 PM 11/1/2012, Vincent Ryan wrote: > >> On 1 Nov 2012, at 17:50, Michael StJohns wrote: >> >>> At 12:55 PM 10/31/2012, Vincent Ryan wrote: >>> Before considering migrating the platform default keystore format to PKCS12 its ke

Re: Transitioning the default keystore format to PKCS#12

2012-11-02 Thread Vincent Ryan
ax > >> >> Bruce A Rich >> brich at-sign us dot ibm dot com >> >> >> >> >> From: Weijun Wang >> To:security-dev@openjdk.java.net >> Date:10/31/2012 09:27 PM >> Subject:Re: Transitioning the default ke

Re: Transitioning the default keystore format to PKCS#12

2012-11-01 Thread Michael StJohns
At 02:26 PM 11/1/2012, Vincent Ryan wrote: >On 1 Nov 2012, at 17:50, Michael StJohns wrote: > >> At 12:55 PM 10/31/2012, Vincent Ryan wrote: >> >>> Before considering migrating the platform default keystore format to PKCS12 >>> its keystore implementation >>> must at least match the functionalit

Re: Transitioning the default keystore format to PKCS#12

2012-11-01 Thread Weijun Wang
KS, which > is the format used by cacerts, for example. I see. Thanks Max > > Bruce A Rich > brich at-sign us dot ibm dot com > > > > > From:Weijun Wang > To:security-dev@openjdk.java.net > Date: 10/31/2012 09:27 PM > Subject:

Re: Transitioning the default keystore format to PKCS#12

2012-11-01 Thread Vincent Ryan
On 1 Nov 2012, at 17:50, Michael StJohns wrote: > At 12:55 PM 10/31/2012, Vincent Ryan wrote: > >> Before considering migrating the platform default keystore format to PKCS12 >> its keystore implementation >> must at least match the functionality of JKS. >> >> I have developed a prototype of a

Re: Transitioning the default keystore format to PKCS#12

2012-11-01 Thread Michael StJohns
At 12:55 PM 10/31/2012, Vincent Ryan wrote: >Before considering migrating the platform default keystore format to PKCS12 >its keystore implementation >must at least match the functionality of JKS. > >I have developed a prototype of a multi-format keystore that understands both >JKS and PKCS12 >f

Re: Transitioning the default keystore format to PKCS#12

2012-11-01 Thread Bruce Rich
bject: Re: Transitioning the default keystore format to PKCS#12 Sent by:security-dev-boun...@openjdk.java.net A little off topic: Do we still care about the JCEKS storetype? Maybe no one stores secret keys in a keystore? Thanks Max On 11/01/2012 12:55 AM, Vincent Ryan

Re: Transitioning the default keystore format to PKCS#12

2012-11-01 Thread Vincent Ryan
I think storing secret keys, and passwords, is still important. We intend to add support for SecretKeyEntry to the PKCS12 implementation but there are no plans to make changes to JCEKS. On 1 Nov 2012, at 02:08, Weijun Wang wrote: > A little off topic: > > Do we still care about the JCEKS store

Re: Transitioning the default keystore format to PKCS#12

2012-10-31 Thread Weijun Wang
A little off topic: Do we still care about the JCEKS storetype? Maybe no one stores secret keys in a keystore? Thanks Max On 11/01/2012 12:55 AM, Vincent Ryan wrote: Before considering migrating the platform default keystore format to PKCS12 its keystore implementation must at least match

Re: Transitioning the default keystore format to PKCS#12

2012-10-31 Thread Vincent Ryan
Before considering migrating the platform default keystore format to PKCS12 its keystore implementation must at least match the functionality of JKS. I have developed a prototype of a multi-format keystore that understands both JKS and PKCS12 formats - it checks for the JKS magic number to dete