IMO, this is not an NSS issue, it is rather a *NIX issue.  All other
operating systems (that I'm aware of NB...) including *NIX-derivates
like Android, already have a system-wide cryptographic architecture.

Most (if not all) of these builds on services rather than libraries.

Anders

On 2012-07-24 15:07, David Woodhouse wrote:
> Is the NSS "shared system database" actually going to be used for real?
> I note Firefox *still* isn't using it, four years after bug 449498 was
> opened.
> 
> If even Mozilla products aren't using NSS "properly", do we really
> expect anyone *else* to?
> 
> And what does "properly" mean, anyway? As far as I can tell, the only
> way an application can *tell* whether the shared database is set up on
> the system is to open /etc/pki/nssdb/pkcs11.txt and search for
> 'library=libnsssysinit.so' in it. Based on the result of that search,
> the application then opens sql:/etc/pki/nssdb or sql:$HOME/.pki/nssdb.
> Which is just evil.
> 
> It seems that the shared system database isn't really complete, and
> isn't particularly well-thought-out. Is there scope for changing it?
> 
> For example, is there a reason that things weren't done the other way
> round? Why couldn't the softokn module just automatically load the
> contents of /etc/pki/nssdb as an extra read-only slot, regardless of
> which directory the application gave as its primary store? Surely that
> would have been easier?
> 
> I've also been looking at how to consolidate the trust database with
> other SSL libraries, such as OpenSSL and GnuTLS. GnuTLS can load the NSS
> softokn as a PKCS#11 module, and access *one* database, although there's
> a bit of work to be done on understanding the trust assertions. But I
> can't see how to get the softokn module loaded from p11-kit with *both*
> slots available. Is that possible?
> 
> Again, if we switch things around so that you just load
> sql:/$HOME/.pki/nssdb and the additional slot is automatically loaded
> from /etc/pki/nssdb *if* a database exists there, this may all "just
> work"... is that something we can consider? 
> 
> 
> 

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to