2009/9/25 Robert Relyea <rrel...@redhat.com>:
>
> Because of the way the system works, deleting a cert from builtins would be
> equivalent to marking it untrusted. The user could still override our choice
> in softoken. Unfortunately the trustorder is set on the module, not the slot
> (/me mentally slapping myself for that), otherwise we could add a second
> slot in the builtins which had certs which had a lower trust order than
> softoken. We could then put disabled certs in that second token. It's
> probably not to difficult to give each slot it's own trust order that
> overrides the overall module trust order, but it would have to be added to
> NSS.

Huh.  So you could theoretically add another module, like libnssckbi,
that has a lower trust order than softoken, and thus can override even
softoken's user-set bits.  (It shouldn't be difficult to create
another PKCS#11 device that has its own slot...)

> This means the feature is probably implementable without a lot of work, but
> then the question becomes, do we really want to do this? Once implemented,
> it would be very difficult to turn off (Hmm, well perhaps PSM could control
> whether or not the 'disabled certs' override the other trust flags as well
> or not.

If you want to get rid of the 'disabled certs' override, use secdb to
remove the disabled certs device from consideration?

>
> We should probably have that discussion before we decide to do 'forced
> turn-offs' on certificates.
>
> bob

-Kyle H
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to