On Mon, 2014-12-08 at 13:56 -0800, Robert Relyea wrote:
> On 12/08/2014 08:59 AM, David Woodhouse wrote:
> > I still maintain that the path to sanity involves killing 
> > /etc/pki/nssdb entirely, and then you can look at applying *correct* 
> > fixes to whatever's still not behaving correctly.
> 
> The whole point of /etc/pki/nssdb is so you have one place to install 
> stuff.

Well, kind of. Except that for system-trusted CAs, there is *already*
"one place" to install stuff. That's libnssckbi.so. And with the native
NSS version of that library dropped, and a symlink in place to
p11-kit-trust.so, we have this working *properly* in line with the
sysadmin's choices for which CAs to trust.

As you reminded me, applications choose to open libnssckbi.so *if* they
want the system trust. So it's important that we have "one place" for
it. The Shared System Database approach, with *some* CAs in
libnssckbi.so and *some* installed by the sysadmin into
sql:/etc/pki/nssdb means that the application's *choice* of whether to
load the trusted CAs is confused. If they choose *not* to load
libnssckbi.so they might get *some* trusted CAs from sql:/etc/pki/nssdb
anyway.


And for additional PKCS#11 modules there's *already* "one place" for
those too. If I install the OpenSC package, it'll automatically drop a
file into /usr/share/p11-kit/modules/ and well-behaved applications will
automatically see it. We just need to make NSS applications behave well
— and yes, adding p11-kit-proxy.so to /etc/pki/nssdb/pkcs11.txt *might*
be part of the approach there. Although you don't want the trust modules
in that case, since *those* come through the libnssckbi.so symlink to
p11-kit-trust.so.

>  It's the default for anything that I've had a say in and will 
> continue to be the default.

That's OK. We just need to work out how to make it *work* :)

-- 
dwmw2

Attachment: smime.p7s
Description: S/MIME cryptographic signature

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to