Re: Go Daddy "6-in1" certs and NSS?

2006-08-04 Thread Kyle Hamilton
I think that a part of Mozilla's acceptance policy should be the CA providing copies of certificates for technical validation, as well as the more political validation method which we've dealt with up to this point. -Kyle H On 8/4/06, Frank Hecker <[EMAIL PROTECTED]> wrote: Frank Hecker wrote:

Mario Levert/HelpCaster is out of the office.

2006-08-04 Thread Mario Levert
I will be out of the office starting 08/04/2006 and will not return until 08/15/2006. I will be out of the office from August 4th and will return on August 15th. Regards, Mario ___ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://

Re: Go Daddy "6-in1" certs and NSS?

2006-08-04 Thread Frank Hecker
Frank Hecker wrote: Nelson B wrote: Frank Hecker wrote: In looking at Geotrust's request to add more root CA certs (bug 294916) I happened to notice that Geotrust offers a somewhat similar service, [snip] From the product description it appears that one domain goes in the CN attribute and th

Issue regarding Power Server ID certificates

2006-08-04 Thread Frank Hecker
Chris, Below is comment from Nelson Bolyard of the NSS team regarding Geotrust's Power Server ID certificates. Could you clarify how Geotrust is implementing these certificates (i.e., in terms of using CN vs. SubjectAltName)? You may in fact be doing the conformant thing, and I've misinterpre

Re: Go Daddy "6-in1" certs and NSS?

2006-08-04 Thread Frank Hecker
Nelson B wrote: Frank Hecker wrote: In looking at Geotrust's request to add more root CA certs (bug 294916) I happened to notice that Geotrust offers a somewhat similar service, [snip] From the product description it appears that one domain goes in the CN attribute and the rest in SubjectAltN

Re: Enterprise Key Management Infrastructure (EKMI) software

2006-08-04 Thread Wan-Teh Chang
Arshad Noor wrote: Yes, we chose not to use JSS directly for a couple of reasons: 1) The JSS interface does not map closely to the JCE in J2SE5 and required us to write JSS-specific code. This was something we wanted to avoid, to keep our focus above the abstraction layer provided by

Re: Go Daddy "6-in1" certs and NSS?

2006-08-04 Thread Nelson B
Frank Hecker wrote: > In looking at Geotrust's request to add more root CA certs (bug 294916) > I happened to notice that Geotrust offers a somewhat similar service, > [snip] > From the product description it appears that one domain > goes in the CN attribute and the rest in SubjectAltName. Th

Re: Enterprise Key Management Infrastructure (EKMI) software

2006-08-04 Thread Nelson B
Arshad Noor wrote: > StrongAuth, Inc., the company I am affiliated with, has just announced > the availability of StrongKey(tm), a software product that can be used > to centrally manage symmetric keys for an enterprise. > The reason for my posting this message in this forum is that StrongKey >

Geotrust request to add more roots

2006-08-04 Thread Frank Hecker
As I noted in an earlier message, Geotrust has applied to have three more root CA certificates added; this is basically to support a multi-year migration away from their current Equifax root certs. See bug 294916 for details: http://bugzilla.mozilla.org/show_bug.cgi?id=294916 This is a strai

Re: Go Daddy "6-in1" certs and NSS?

2006-08-04 Thread Frank Hecker
Frank Hecker wrote: Someone brought to my attention today that Go Daddy is now offering a "6-in-1" SSL certificate where they allow you to associate multiple domain names from different TLDs with a single certificate: https://www.godaddy.com/gdshop/whatsnew/landing.asp?se=%2B&app%5Fhdr=&ci=463

Re: PK11_ImportCert bug?

2006-08-04 Thread Wan-Teh Chang
Wan-Teh Chang wrote: This bug seems to have been introduced in NSS 3.4. (The core of the NSS certificate handling code was rewritten in NSS 3.4.) In NSS 3.3.2, PK11_ImportCert has the following code: if(includeTrust && PK11_IsInternal(slot)) { attrs++; certUsage = (SECCert

Re: PK11_ImportCert bug?

2006-08-04 Thread Wan-Teh Chang
David Stutzman wrote: PK11_ImportCert has the following signature: SECStatus PK11_ImportCert(PK11SlotInfo *slot, CERTCertificate *cert, CK_OBJECT_HANDLE key, char *nickname, PRBool includeTrust) Looking at the implementation in nss-3.11.2/mozilla/security/nss/lib/pk11wrap/pk11cert.c, line 7

PK11_ImportCert bug?

2006-08-04 Thread David Stutzman
PK11_ImportCert has the following signature: SECStatus PK11_ImportCert(PK11SlotInfo *slot, CERTCertificate *cert, CK_OBJECT_HANDLE key, char *nickname, PRBool includeTrust) Looking at the implementation in nss-3.11.2/mozilla/security/nss/lib/pk11wrap/pk11cert.c, line 790, I don't see "i