On 10/10/2011 12:16 PM, Wan-Teh Chang wrote:
> After you match a trust object to a certificate, check the
> CKA_TRUST_SERVER_AUTH, CKA_TRUST_EMAIL_PROTECTION, and
> CKA_TRUST_CODE_SIGNING attributes in the trust object.
>
> In the current version of certdata.txt, these attributes may have only
> three possible values:
> - CKT_NSS_TRUSTED_DELEGATOR: this means the CA is trusted for that purpose.
> - CKT_NSS_TRUST_UNKNOWN: this means the CA is not trusted for that
> purpose, but is trusted for some other purpose.
> - CKT_NSS_NOT_TRUSTED: this means the certificate (which may not be a
> CA) is explicitly distrusted.
>
> Note: I recommend that the scripts assert that these attributes only
> have these three values, so that it can detect when this assumption is
> no longer true.
>
> The scripts must exclude the certificates whose trust objects contain
> CKT_NSS_NOT_TRUSTED in any of the CKA_TRUST_SERVER_AUTH,
> CKA_TRUST_EMAIL_PROTECTION, and CKA_TRUST_CODE_SIGNING attributes.
I agree this should be the minimum processing these scripts do. Ideally
these scripts should also look at the trust fields they are interested
in, for instance CKA_TRUST_SERVER_AUTH. Not all uses have this level of
granularity, so it's not a requirement.

Scripts should also have a way to output the NSS trust values, or an
appropriate mapping thereof for So users of the output of these scripts
can see them...

At some point the users of these cert trust values will need to find
some way to encode explicitly revoked certs as well. That is starting to
get far afield from the original issue, so I think it's more of a 'throw
away' communication to them. Not really a solution to the bug.

bob
> Wan-Teh Chang


-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to