On Wed, Apr 4, 2012 at 12:47 PM, Anders Rundgren
<anders.rundg...@telia.com> wrote:
>
> Mozilla should IMO rather hook into the
> other vendors cryptographic solution, possibly at the expense of NSS.
>
> According to a [colleage] of mine Chrome even use the platform's SSL
> implementation!  Well, not in *NIX since there is no such thing...

Yes, early versions of Chrome used the platform's SSL implementation.
That strategy became restrictive when we needed the server name
indication extension support but it isn't available by the SChannel
library on Windows XP.  Today Chrome uses the SSL implementation from
NSS, but still uses the platform's certificate and key store and the
platform's certificate verification function.

On Linux Chrome uses the NSS sqlite certificate and key databases in
$HOME/.pki/nssdb, as proposed in
https://wiki.mozilla.org/NSS_Shared_DB_And_LINUX.

Using the platform's certificate and key store has worked well in
general.  There are some minor problems due to uneven support of
features across versions of the platform.  For example, ECC
certificates are not supported on Windows XP, and SHA-256 certificate
support on Windows XP requires service pack 3.

As for hooking into other vendors cryptographic solution -- in my
biased opinion, although some OS vendors cryptographic solutions are
indeed better than NSS, NSS is still better than others.  My current
recommendation is to only use the platform certificate and key store
(and the trusted root certificate list, if appropriate for your
product). This may require using the OS vendors cryptographic library
for private key operations because private keys cannot be extracted
from the platform key store in general.

Wan-Teh
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to