Brian Smith wrote:
https://bugzilla.mozilla.org/show_bug.cgi?id=367577

You need a custom build of NSS, with NSS_ECC_MORE_THAN_SUITE_B=1 e.g.:

The beef of the bug is the following in Nelson's comment :
"Based on http://www.ietf.org/ietf/IPR/certicom-ipr-rfc-3446.pdf, some of the contributors have chosen to believe that all uses of ECC, except the uses defined in the RFCs for TLS and IPSec, are potentially patent infringing. Consequently, the "Basic ECC" builds that are used in all Mozilla clients, use ECC only in the TLS protocol itself, and in cert signature verification, and use only the curves named in that document."

My interpretation would be slightly different from the one of Nelson :
NSS has been implemented in a way carefully chosen to avoid Certicom's patents, however if you limit yourself to using it in the few contexts where Certicom has pledged to provide a royalty free license to anybody, you are certain to take no risk at all.

Also, I updated the bug to reference the fact that the above document is now obsolete, a more recent version is now http://www.certicom.com/images/pdfs/certicom%20-ipr-contribution-to-ietfsept08.pdf (referenced from https://datatracker.ietf.org/ipr/1004/).

The change is that it now includes CMS in the allowed usages for the royalty free licence. So if the intended usage of the generated key is inside Thunderbird for email, 'ec-sign' should be allowed. But some might be worried that the caller of generateCRMFRequest might intend to do something else with the signature key, and should be warned.

Using generateCRMFRequest, is it possible to include extension that are requested for the certificate ? Like requesting the s/mime extended key usage extension ?
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to