On Fri, 2012-07-27 at 12:07 -0700, Robert Relyea wrote:
>  The news to me is that applications care, which means I need to
> figure out an api to give the application that information. 

The applications actively don't *want* to care, but the existing
interface by which they use the shared system database is *making* them
care, because they have to give the right dbpath to NSS_Init().

So rather than "give the application that information", making it
possible for the application *not* to care would be much preferable.

> If you are opening softoken from some other module, you presumable know=20
> the softoken "magic" to specify the database. softoken can be told to=20
> open more than one database from that string. 

OK, I'll play with that. Thanks for the pointer.

> In short softoken can do it, but the normal PKCS #11 spec is silent on=20
> how to do this. Non-NSS users of softoken would have to learn the=20
> softoken protocol to use this feature.

Yes, that much is clear.

If we want to have a consistent set of trusted CAs across all
applications¹ whether they use NSS, GnuTLS, OpenSSL or something else,
our options are fairly much:

1. Try to build something based on Debian's update-ca-certificates which
   keeps an NSS database in sync with the flat PEM file.
2. Make everything else use the NSS databases.
3. Make NSS use some external databases.

#1 doesn't provide any way for the user to have their *own* database,
overlaid on top of the system one. And that would be something we'd have
to implement from scratch in #3 too. The NSS databases exist, they
work², and hence #2 seems to be the sanest avenue to pursue first.

-- 
dwmw2

¹ modulo the fact that CAs can be trusted for different purposes, of course.
² modulo my complaints about how hard it is to use them 'properly'.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to