On Aug 11, 2014, at 3:58 PM, br...@consultbruce.com wrote:

> On Monday, April 7, 2014 6:33:50 PM UTC-4, Kathleen Wilson wrote:
>> All,
>> 
>> 
>> 
>> We have been working on a new certificate verification library for 
>> 
>> Gecko, and would greatly appreciate it if you will test this new library 
>> 
>> and review the new code.
>> 
>> 
>> 
>> Background
>> 
>> 
>> 
>> NSS currently has two code paths for doing certificate verification. 
>> 
>> "Classic" verification has been used for verification of non-EV 
>> 
>> certificates, and libPKIX has been used for verification of EV 
>> 
>> certificates.
>> 
>> 
>> 
>> As many of you are aware, the NSS team has wanted to replace the 
>> 
>> "classic" verification with libPKIX for a long time. However, the 
>> 
>> current libPKIX code was auto-translated from Java to C, and has proven 
>> 
>> to be very difficult to maintain and use. Therefore, Mozilla has created 
>> 
>> a new certificate verification library called mozilla::pkix.
>> 
>> 
>> 
>> Request for Testing
>> 
>> 
>> 
>> Replacing the certificate verification library can only be done after 
>> 
>> gaining sufficient confidence in the new code by having as many people 
>> 
>> and organizations test it as possible.
>> 
>> 
>> 
>> We ask that all of you help us test this new library as described here:
>> 
>> https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Request_for_Testing
>> 
>> 
>> 
>> Testing Window: The mozilla::pkix certificate verification library is 
>> 
>> available for testing now in Nightly Firefox builds. We ask that you 
>> 
>> test as soon as possible, and that you complete your testing before 
>> 
>> Firefox 31 exits the Aurora branch in June.
>> 
>> (See https://wiki.mozilla.org/RapidRelease/Calendar)
>> 
>> 
>> 
>> Request for Code Review
>> 
>> 
>> 
>> The more people who code review the new code, the better. So we ask all 
>> 
>> of you C++ programmers out there to review the code and let us know if 
>> 
>> you see any potential issues.
>> 
>> https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Request_for_Code_Review
>> 
>> 
>> 
>> 
>> 
>> We look forward to your help in testing and reviewing this new 
>> 
>> certificate verification library.
>> 
>> 
>> 
>> Mozilla Security Engineering Team
> 
> Yup - having a problem. Novell ZENworks optionally uses an internal CA and 
> with FF 31 I can no longer connect to the management console or any of the 
> other web services. I'll try turning off the new CA checker to see if that 
> works. I like the idea of better security, but you just pissed off a lot of 
> my customers.

Hey Bruce,

It appears the Novell certs have run afoul of a couple of the new checks in 
mozilla::pkix.  It should be noted that this is because they are violating the 
X.509/PKIX specifications, e.g., by setting an invalid version number.

https://bugzilla.mozilla.org/show_bug.cgi?id=1042889
https://bugzilla.mozilla.org/show_bug.cgi?id=1047177
https://bugzilla.mozilla.org/show_bug.cgi?id=1045973

We're looking at how we should adapt the verification process to deal with 
these.  In the mean time, you can revert to classic validation by setting 
security.use_mozillapkix_verification to false.

--Richard

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to