Is the NSS "shared system database" actually going to be used for real?
I note Firefox *still* isn't using it, four years after bug 449498 was
opened.

If even Mozilla products aren't using NSS "properly", do we really
expect anyone *else* to?

And what does "properly" mean, anyway? As far as I can tell, the only
way an application can *tell* whether the shared database is set up on
the system is to open /etc/pki/nssdb/pkcs11.txt and search for
'library=libnsssysinit.so' in it. Based on the result of that search,
the application then opens sql:/etc/pki/nssdb or sql:$HOME/.pki/nssdb.
Which is just evil.

It seems that the shared system database isn't really complete, and
isn't particularly well-thought-out. Is there scope for changing it?

For example, is there a reason that things weren't done the other way
round? Why couldn't the softokn module just automatically load the
contents of /etc/pki/nssdb as an extra read-only slot, regardless of
which directory the application gave as its primary store? Surely that
would have been easier?

I've also been looking at how to consolidate the trust database with
other SSL libraries, such as OpenSSL and GnuTLS. GnuTLS can load the NSS
softokn as a PKCS#11 module, and access *one* database, although there's
a bit of work to be done on understanding the trust assertions. But I
can't see how to get the softokn module loaded from p11-kit with *both*
slots available. Is that possible?

Again, if we switch things around so that you just load
sql:/$HOME/.pki/nssdb and the additional slot is automatically loaded
from /etc/pki/nssdb *if* a database exists there, this may all "just
work"... is that something we can consider? 

-- 
David Woodhouse                            Open Source Technology Centre
david.woodho...@intel.com                              Intel Corporation

Attachment: smime.p7s
Description: S/MIME cryptographic signature

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to