Root Certificate Authorities will soon stop issuing certificates to non 
official TLD's https://www.digicert.com/internal-names.htm at least they will 
no longer sign them with their widely known PKI keys. We have lots of internal 
domains with multiple CA's. Some are signed by various commercial CA's some are 
signed by our own CA's.

Rather than update each users personal key store with certutil.exe -A -d 
%appdata%\mozilla\firefox\profiles\godknowswhatname.default -t C,, -i 
\\someserver\share\cert.x509.der for each private CA, we thought it would 
be nice to just add our CA's to the nssckbi.dll 

On a windows 7 64 bit machine, I followed info found here: 
https://mxr.mozilla.org/mozilla/source/security/nss/lib/ckfw/builtins/README 
and here: 
https://developer.mozilla.org/en-US/docs/Mozilla/Developer_guide/Build_Instructions/Windows_Prerequisites
 
to download the source that matches the version of firefox we are running. 

mdkir /c/mozilla-source 
cd /c/mozilla-source 
hg clone https://hg.mozilla.org/releases/mozilla-esr24/ 
hg clone https://hg.mozilla.org/projects/nspr/ 
mv /c/mozilla-source/nspr /c/mozilla-source/mozilla-esr24/security/ 
set OS_TARGET=WINNT 
cd /c/mozilla-source/mozilla-esr24/security/nss 
make nss_build_all 
cp /c/mozilla-source/mozilla-esr24/security/dist/WIN954.0_DBG.OBJ/lib/*.dll 
/c/mozilla-source/mozilla-esr24/security/dist/WIN954.0_DBG.OBJ/bin 
/c/mozilla-source/mozilla-esr24/security/dist/WIN954.0_DBG.OBJ/bin/addbuiltin 
-n "Our CA!" -t C,C,C < /c/temp/cert.x509.der >> 
/c/mozilla-source/mozilla-esr24/security/nss/lib/ckfw/builtins/certdata.txt 
make nss_build_all 
cp 
 /c/mozilla-source/mozilla-esr24/security/dist/WIN954.0_DBG.OBJ/lib/freebl3.chk 
/c/tmp/ 
cp 
 /c/mozilla-source/mozilla-esr24/security/dist/WIN954.0_DBG.OBJ/lib/freebl3.dll 
/c/tmp/ 
cp 
 /c/mozilla-source/mozilla-esr24/security/dist/WIN954.0_DBG.OBJ/lib/nssckbi.dll 
/c/tmp/ 

We then distributed these three files to the machines that have ESR 24.2.0 
on them. 

1. Is this a recommended practice?
2. What happens during an upgrade say to ESR 38.0, will the dll be overwritten?
3. Was it necessary to download the whole ESR release or could we have just 
fetched NSS and NSPR?
4.Do the versions need to match between the ESR and NSS?
5. Why didnt nssckbi.dll work alone, why did I have to copy freebl3.dll and chk 
too?
6. Are there plans for a NSS system certificate store that supplements 
nssckbi.dll? Like a system c:\program files (x86)\mozilla firefox\key3.db and 
cert8/9.db? Maybe thats already a feature?
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to