Hi Subrata,

Although I find your extension interesting, I think that the on-line stuff
is nowhere ready.  KeyGen, generateCRMFrequest, and Xenroll have
severe limitations which have made most large PKIs in the EU use
home-brewed PKI provisioning solutions.  I am trying to create a
standard for this.  It will be built on XML rather than ASN.1.

Here comes something related:

----- Original Message ----- 
From: "Anders Rundgren" <[EMAIL PROTECTED]>
To: <ietf-pkix@imc.org>
Sent: Saturday, March 31, 2007 08:32
Subject: netscape-cert-renewal-url & beyond


Although the "netscape-cert-renewal-url" certificate extension does
not appear to be incorporated in any PKIX RFC, it is anyway
documented in vendor specs like:
http://msdn2.microsoft.com/en-us/library/aa378149.aspx

I have two open questions regarding this particular extension:

1. Is it supported by any PKI-clients and if so which ones?

2. If it is not already supported on major scale wouldn't it be
worthwhile supporting such a facility?  My personal experience
with certificates (I have had numerous), is that they tend to silently
expire, leaving you high and dry and concluding that "passwords are
better".   When you have to "renew" from scratch you are thrown
into laborious processes which can take weeks to perform.

If you have certificate and key in a connected device
like a web-server or mobile phone, you could very well
create something like we already have with Windows update,
JRE update, Adobe update, where the user in some instances
only would have to issue a PIN in order to get a credential
update.   For commercial certificates the process would be
slightly more complex but of course an auto-renewal-process
must support this use-case as well.

I do not propose making the Netscape extension a PKIX
standard but rather start discussing the road to a better
support of credential life-cycles.

Comments?

Anders Rundgren


----- Original Message ----- 
From: "Subrata Mazumdar" <[EMAIL PROTECTED]>
Newsgroups: mozilla.dev.tech.crypto
To: <dev-tech-crypto@lists.mozilla.org>
Sent: Friday, March 30, 2007 14:16
Subject: Re: Announcement: Firefox Extension for Key Generation and 
CertificateEnrollment


Here is a follow-up to the original message:
  - I forgot tomention, the "KeyManager" extension only works on Windows
and Linux.
    If there is interest, I may be able to create a version for SUN-Solaris.
  - addson.mozilla.org changed their policy - the extension is now
publicly available. You do not have to regsiter to download the extension.
    Here is direct the URL for the extension page:
https://addons.mozilla.org/en-US/firefox/addon/4471
    Still, please write review if you use the extension and give
comments using the discussion link  on the extension page.
 - if you are not really keen on learning Mozilla-NSS command line
utilities, such as certutil, pk12util, signtool etc., if you  can use
this extension to do the same tasks. It presents XUL based forms for
various parameters.
  -

Thanks,
--
Subrata



Subrata Mazumdar wrote:
> Hi,
> I would like bring to your attention of our firefox extension for
> stand-alone key generation and enrollment.
> The extension is available from "sandbox" in
> https://addons.mozilla.org/en-US/firefox/. According to sandbox policy
> rule, you have to register, login, and then subscribe for sandbox in
> order to download any extensions from sandbox.
>
> Title: KeyManager Tool: Firefox Extension for Key Generation and
> Certificate Enrollment
> KeyManager is a stand alone PKI tool for key generation and
> certificate enrollment. The KeyManager tool is packaged as “chrome”
> based Firefox extension. We have extended the Certificate Manager
> wizard in Mozilla PSM and added the capability for key generation and
> SCEP based certificate enrollment. Currently, PSM allows import and
> export of keys but does not provide interface for local key
> generation. In addition, the tool supports signing of proxy
> certificates for delegation of authorities and provides XUL based GUI
> for signing archive files.
> The KeyManager tool has following features:
> - Generation of keys, signing self-signing certificate and generation
> of PKCS#10 based Certificate Signing Requests (CSR)
> (Uses XPCOM based interface for NSS commandline tool for
> certutil/certcgi andr XUL based GUI)
> - Signing of Proxy Certificate and other users' certificates
> - SCEP based Certificate enrollment
> - Signing of archive files (provides XUL based GUI for signtool in
> Mozilla NSS)
> - Generation of configuration file for OpenSSL based applications ;
> very useful if are trying to use
> OpenSC based engine for smartcard with OpenSSL
> For more info: http://pubs.research.avayalabs.com/pdfs/ALR-2006-044.pdf
>
> If you download and use the tool, please write a review. I need enough
> review in order for the extension to be nominated for publicly
> available extension.
>
> Thanks.
> -- 
> Subrata Mazumdar
>
>
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to