Re: RFC 3820

2006-04-11 Thread Nelson B Bolyard
berle oliver wrote: > Does nss support RFC 3820 proxy certificates? No. /Nelson ___ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

RFC 3820

2006-04-11 Thread berle oliver
Does nss support RFC 3820 proxy certificates?Thanks,--Berle Yahoo! Messenger with Voice. PC-to-Phone calls for ridiculously low rates.___ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: certificate requirements for crypto.signText

2006-04-11 Thread Mikolaj Habryn
On Sun, 2006-04-09 at 22:08 -0700, Nelson B wrote: > Mikolaj Habryn wrote: > > > Should I take it upon myself to raise this in bugzilla? > > Yes. File a bug in bugzilla.mozilla.org. It may get resolved differently > than you hope, but that is the right way to push this to resolution. Having n

Re: How to add custom badCertHandler

2006-04-11 Thread Kate X
"Christian Biesinger" <[EMAIL PROTECTED]> wrote in message news:[EMAIL PROTECTED] > Kate X wrote: >> Would anybody give me a hint of how to add my custom badCertHandler, or >> anyother solution for this problem? > > You can either register a global badCertHandler by implementing > nsIBadCertLis

Algorithm. Was: certificate requirements for crypto.signText

2006-04-11 Thread Anders Rundgren
Here is an attempt based on RFC 3280. It seems that the designers of the EKU extension did not foresee any user-signatures except for e-mail. In a revised RFC 3280 I believe the "id-kp-emailProtection" text could be a bit more generalized. Adding a new OID would only make things worse. No KU or

Re: certificate requirements for crypto.signText

2006-04-11 Thread Jean-Marc Desperrier
Nelson B wrote: Jean-Marc Desperrier wrote: The trouble is that certUsageEmailSigner in it's current implementation does indeed look for other things than non-repudiation. It checks that the certificate is valid to sign mail, ie if it has an Extended key usage it must include id-kp-emailProtecti

Re: certificate requirements for crypto.signText

2006-04-11 Thread Nelson B. Bolyard
Kai Engert wrote: >> Bob sent his message to the dev-tech-crypto mailinglist that is >> supposed to mirror the newsgroup. > I intended to confirm, Bob's message did NOT arrive in the newsgroup. >> Nelson reported some problems with the mirroring a while ago, seems >> those problems are still in p

Re: Do I need java runtime?

2006-04-11 Thread Nelson B
Kate X wrote: > I have a question, does firefox need java installed, since I saw some jar > files in the package. NSS and PSM have no requirement for Java. > The reason I'm asking this now I need jar files in > chrome directory and jar50.dll. JAR files are structured zip files. Java is not

Re: certificate requirements for crypto.signText

2006-04-11 Thread Nelson B
Jean-Marc Desperrier wrote: > The trouble is that certUsageEmailSigner in it's current implementation > does indeed look for other things than non-repudiation. It checks that > the certificate is valid to sign mail, ie if it has an Extended key > usage it must include id-kp-emailProtection and the

Re: certificate requirements for crypto.signText

2006-04-11 Thread Nelson B
Kai Engert wrote: > Nelson reported some problems with the mirroring a while ago, seems > those problems are still in place. > > It seems, > newsgroup posting -> newsgroup -> works > newsgroup posting -> auto forward to mailing list -> works > mail -> mailing list -> list subscribers -> works > m

Do I need java runtime?

2006-04-11 Thread Kate X
Hi there, I have a question, does firefox need java installed, since I saw some jar files in the package. The reason I'm asking this now I need jar files in chrome directory and jar50.dll. since it writes secmod.db file when access ssl, and in secmod.db file I saw absolute path for loading nssc

PKCS #7

2006-04-11 Thread user
How can we import a PKCS #7 certificate in Firefox? It is easy with IE just click on it and accept the next OK up to FINISH!!! ___ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: certificate requirements for crypto.signText

2006-04-11 Thread Anders Rundgren
Jean-Marc Desperrier wrote: >The trouble is that certUsageEmailSigner in it's current implementation >does indeed look for other things than non-repudiation. It checks that >the certificate is valid to sign mail, ie if it has an Extended key >usage it must include id-kp-emailProtection and the

Re: certificate requirements for crypto.signText

2006-04-11 Thread Kai Engert
Kai Engert wrote: Jean-Marc Desperrier wrote: I don't know where Bob's message appeared originally. It's not on the newsserver, on google or my mail (might be the fault of the strong filtering on alussinan.org). Bob sent his message to the dev-tech-crypto mailinglist that is supposed to mirr

Re: certificate requirements for crypto.signText

2006-04-11 Thread Kai Engert
Jean-Marc Desperrier wrote: I don't know where Bob's message appeared originally. It's not on the newsserver, on google or my mail (might be the fault of the strong filtering on alussinan.org). Bob sent his message to the dev-tech-crypto mailinglist that is supposed to mirror the newsgroup.

Re: certificate requirements for crypto.signText

2006-04-11 Thread Jean-Marc Desperrier
Anders Rundgren wrote: > Quoting Bob Relyea : The assumption in NSS in the past has been that certUsageEmailSigner implied non-repudiation, while certUsageSSLClientAuth did not. I believe this is perfectly OK. It was just the name that caught my attention. It sounds like it looks for other thi

Add CaCert.org Root CA into FireFox "Authorities"

2006-04-11 Thread Oscar So
Hi, My PKCS#11 module is testing SSL Client Auth operation with CaCert.org. Since the Root CA cert of CaCert.org is not inside CaCert.org, during token login, I would like to have the Root CA cert to be inserted into the FireFox cert store under "Authorities". In other words, storing the certifica