Hi,

I am testing NSS 3.9.12 with CKBI 1.82 on Windows. To verify that the bogus certificates are recognized as such I run vfychain. The certificates are exported from the Windows certificate store.

Having vfychain use CERT_VerifyCertificate gives me this output


[../nss/wntmsci12.pro/bin]$ ./vfychain.exe -d db -p  www-google.cer
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. Builtin Object Token:Bogus Google :
ERROR -8171: Peer's certificate has been marked as not trusted by the user.
[../nss/wntmsci12.pro/bin]$

Same with all other bogus certificates.
Now using the CERT_PKIXVerifyCert function:

[../nss/wntmsci12.pro/bin]$ ./vfychain.exe -d db -pp -g leaf www-google.cer
Chain is good!
[../nss/wntmsci12.pro/bin]$

Let nss use CRL distribution points proves that the invocation of vfychain is correct:

[../nss/wntmsci12.pro/bin]$ ./vfychain.exe -d db -pp -g leaf -m crl www-google.cer
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. Builtin Object Token:UTN USERFirst Hardware Root CA [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
[../nss/wntmsci12.pro/bin]$

WireShark confirms that the CRL is being fetched via HTTP Get.

In both cases the nssckbi.dll is loaded from the db folder, as specified by the -d switch. I confirmed this by using the ProcessMonitor.

Have I overlooked something? Can someone confirm this?

Best Regards,
Joachim

--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to