Kyle Hamilton wrote, On 2008-07-28 17:23:
> This is, honestly, a matter of "NSS's implementors decided to force
> administrators and users to jump through hoops."  There may be
> legitimate policy concerns with certain policies that require
> everything to be inside the database that NSS uses.

Nothing requires that.  The requirement is that the certs and keys be in
PKCS#11 modules.  NSS's own PKCS#11 modules are but a few out of hundreds.
(Well, tens, at least :).

> .. but for those who don't have those policy restrictions, it could be
> called "inelegant".

The requirement to put all cryptographically sensitive information into a
well defined crypto boundary seems very elegant.  It explains how NSS was
able to work with so many third party crypto gizmos starting in the late
90's, and how it was able to get 4 FIPS 140 certifications.

I certainly wouldn't call files containing RSA private keys in bare PKCS#8
files even remotely elegant, or safe.

> Which revision of PKCS#11 was NSS support written to?  I'm seeing that
> the latest available from RSA Labs is v2.20 amendment 3.

NSS will work with any module that is v2.x, I believe.  NSS's own PKCS#11
module claims to be 2.10 (don't know why, because it has many features from
2.20).

There is a PKCS#11 module that uses Windows' key and cert stores as its
stores, although it is unsupported.  One could write a PKCS#11 module that
uses PEM files in some directory as its store, and if done well, NSS would
very likely work with it.  But I have no incentive to write such a thing.
Please feel free.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to