Thanks Bob,

You can find the certs at 
https://powhatan.iiie.disa.mil/pki-pke/interoperability/downloads/unclass-dod_approved_xternal_pkis_v2-4.zip
under Treasury_SSP OCIO certs.

The crlutil throws following error:

Importing OCIO_CA2.crl into cert8.db

crlutil: unable to import CRL: The CRL for the certificate's issuer has an 
invalid signature.

Any suggestions?

Thanks

S

On Thursday, February 28, 2013 1:59:37 PM UTC-5, Robert Relyea wrote:
> On 02/27/2013 06:26 AM, marathi...@gmail.com wrote:
> 
> > On Monday, February 25, 2013 1:44:15 PM UTC-5, Robert Relyea wrote:
> 
> >> ----- Original Message -----
> 
> >>
> 
> >>> Hello,
> 
> >>> I am using NSS 3.12.6. I am trying to add different certs (with
> 
> >>> slightly) different nickname in my db using certutil. However I
> 
> >>> found, that certutil adds them with the same nick name. I have about
> 
> >>> 130 certificates in database and it is happening on at least 5
> 
> >>> different certificates. What I am doing wrong?
> 
> >>
> 
> >>
> 
> >> Probably nothing. NSS, for better or worse, does not map nicknames to 
> >> certs, but nicknames to subjects. All certs with the same subject will 
> >> have the same nickname. If you are using the old database (dbm), that 
> >> semantic is built into the database format. If you are using sqlite, it 
> >> maybe be possible to trick NSS into setting a different nickname on the 
> >> certificate, but even so, NSS will then reference both certs with both 
> >> nicknames.
> 
> >>
> 
> >>
> 
> >>
> 
> >> The theory was certs with the same nickname mapped to the same 
> >> personality. NSS would use the cert that was most appropriate for the 
> >> operation (auth certs for SSL client auth, signing certs for object 
> >> signing, etc). In practice applications typically 'know' which cert to 
> >> use, so the semantic can get in the way, but it's already built in:(.
> 
> >>
> 
> >>
> 
> >>
> 
> >> bob
> 
> >>
> 
> >>
> 
> >>
> 
> >>
> 
> >>
> 
> >>> certutil -d<PATH TO DB>  -A -i 1-OCIO_0x46EACCEC.cer -n
> 
> >>> '1-OCIO_0x46EACCEC' -t "c,c,c"
> 
> >>> Enter Password or Pin for "NSS FIPS 140-2 Certificate DB":
> 
> >>> -bash-3.2$ certutil -L -d<PATH TO DB>  | grep -i OCIO
> 
> >>> 1-OCIO_0x46EACCEC                                            c,c,c
> 
> >>> -bash-3.2$ certutil -d<PATH TO DB>  -A -i 1-OCIO_0x4A61D147.cer -n
> 
> >>> '1-OCIO_0x4A61D147' -t "c,c,c"
> 
> >>> Enter Password or Pin for "NSS FIPS 140-2 Certificate DB":
> 
> >>> -bash-3.2$ certutil -L -d<PATH TO DB>  | grep -i OCIO
> 
> >>> 1-OCIO_0x46EACCEC                                            c,c,c
> 
> >>> 1-OCIO_0x46EACCEC                                            c,c,c
> 
> >>> --
> 
> >>> dev-tech-crypto mailing list
> 
> >>> dev-tech-crypto@lists.mozilla.org
> 
> >>> https://lists.mozilla.org/listinfo/dev-tech-crypto
> 
> > Thanks Bob,
> 
> >
> 
> > This makes perfect sense. Unfortunately, we had few intermediate certs 
> > which have the same subject name, and are lumped into one. We are still 
> > using the old dbm database. So here are few questions:
> 
> >
> 
> > 1) I know with one nickname for multiple auth certs, we run into crl issues 
> > (crlutil)
> 
> What kind of issues? CRL's themselves are tied to Subject name of the 
> 
> CA. If you have 2 intermediate CA certs with the same subject, they will 
> 
> have the same CRL (If the Intermediates have separate keys, then there 
> 
> is a key authority identifier that that can be used to distinguish 
> 
> between the two. Is this your case. It may be a problem with NSS CRL 
> 
> handling rather than a single nickname). If they intermediates of the 
> 
> same key, you need to issue a single combined CRL since certs issued by 
> 
> one intermediate is indisiguishable from certs issued by the other.
> 
> 
> 
> If you are taking about end user certs with the same nickname, this 
> 
> doesn't seem to make sense since CRL's work on issuer/SN and the 
> 
> individual auth certs may have the same subject, but the will have 
> 
> different serial numbers.
> 
> > 2) Will this affect actual authentication or hintlist?
> 
> I'm not sure I understand the question.
> 
> > 3) Is there a easy way to migrate to sqlite (we are using 3.12.6 due to 
> > FIPS compliance). or is there any end of life cycle planned for dbm?
> 
> That migration should be a problem. Simply refer to your NSS database as 
> 
> sql:{path} instead of {path}. For NSS tools, you can do that with the -d 
> 
> option (certutil -L -d sql:./mydatabase rather then certutil -L -d 
> 
> ./mydatabase). You can upgrade an old DB to sqlite with certutil -K -X 
> 
> -d sql:{path to old db}). Unfortunately, that is unlikely to help you 
> 
> since NSS at the higher level still enforces the nickname->subject 
> 
> mapping (you just wind up with 2 nicknames mapping to the the same subject).
> 
> 
> 
> bob
> 
> >
> 
> > Appreciate your help
> 
> >
> 
> > M
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to