NSS (and therefor mozilla products) do not do automatic fetching of certificates at this point in time.

Currently all protocols have a way of transmitting the necessary intermediate certificates, and mozilla products depends on these protocols.
Automatic fetching is a PKIX feature, and is targeted for NSS 3.12.

bob

Anders Rundgren wrote:
The following 3-level certificate hierachy works as expected when looking on it 
in MSIE:

Root certificate: http://webpki.org/mozbug/root.cer  (to be imported)
Actual CA certificate: http://webpki.org/mozbug/cacert.cer (NOT to be imported 
since the EE cert's AIA CAissuers URI points to this)
EE certificate and private key: http://webpki.org/mozbug/anders.p12 (Import and use 
password "testing")

Using Mozilla FF (latest release on Windows) the built-in certificate viewer 
says that the EE cert is untrusted even though Root was imported and edited as 
trusted.

Are there any known problems with path building in the certificate viewer?  I 
don't use Thunderbird so I could not tesr with e-mail.

Anders
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to