Hello,
I'm facing this problem currently with Firefox (3.6.13 Linux):

I want to authenticate to a server using TLS client authentication, so
I imported a PKCS#12 file for this purpose.
Unfortunately the certificate is from an internal CA that does neither
issue keyUsage, extendedKeyUsage
nor NetscapeCertType extensions. When I tried to connect to the
server, it failed and my certificate wasn't even considered,
i.e. I was not asked for selecting a certificate (I had the "ask
always" box checked).

>From reading previous posts I gathered that when selecting acceptable
certificates, an acceptable candidate
must contain the digitalSignature keyUsage and also the
extendedKeyUsage clientAuthentication.
I looked through NSS sources and found the following in certdb.c:

case certUsageSSLClient:
            requiredKeyUsage = KU_DIGITAL_SIGNATURE;
            requiredCertType = NS_CERT_TYPE_SSL_CLIENT;
            break;

Is this the code that controls whether a certificate is considered as
a viable candidate?
Can you please summarize the exact semantics for the certificate
selection algorithm?

Then, is there a way to force Firefox into using the certificate I
imported even if it doesn't meet the
requirements (Similar to forcing FF to enter sites where host name and
the CN of the certificate mismatch)?
The internal CA does not want to issue their certificates any other
way and I wouldn't like to tell my
client "Get Windows, install IE, then it should work." :) Maybe
about:config settings?

Thanks in advance,
Martin
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to