Is the NSS "shared system database" actually going to be used for real? I note Firefox *still* isn't using it, four years after bug 449498 was opened.
If even Mozilla products aren't using NSS "properly", do we really expect anyone *else* to? And what does "properly" mean, anyway? As far as I can tell, the only way an application can *tell* whether the shared database is set up on the system is to open /etc/pki/nssdb/pkcs11.txt and search for 'library=libnsssysinit.so' in it. Based on the result of that search, the application then opens sql:/etc/pki/nssdb or sql:$HOME/.pki/nssdb. Which is just evil. It seems that the shared system database isn't really complete, and isn't particularly well-thought-out. Is there scope for changing it? For example, is there a reason that things weren't done the other way round? Why couldn't the softokn module just automatically load the contents of /etc/pki/nssdb as an extra read-only slot, regardless of which directory the application gave as its primary store? Surely that would have been easier? I've also been looking at how to consolidate the trust database with other SSL libraries, such as OpenSSL and GnuTLS. GnuTLS can load the NSS softokn as a PKCS#11 module, and access *one* database, although there's a bit of work to be done on understanding the trust assertions. But I can't see how to get the softokn module loaded from p11-kit with *both* slots available. Is that possible? Again, if we switch things around so that you just load sql:/$HOME/.pki/nssdb and the additional slot is automatically loaded from /etc/pki/nssdb *if* a database exists there, this may all "just work"... is that something we can consider? -- David Woodhouse Open Source Technology Centre david.woodho...@intel.com Intel Corporation
smime.p7s
Description: S/MIME cryptographic signature
-- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto