Re: nss and mozilla database

2007-06-19 Thread cdolivei . bugzilla
On Jun 18, 3:41 am, Kaspar Brand <[EMAIL PROTECTED]> wrote: > [EMAIL PROTECTED] wrote: > > If I got that part right, then when I loaded the x509.cacert into my > > XUL application and tried to use signtool to sign an archieve, it was > > failing because I was trying to sign with a public key. > > O

Fwd: [ekmi] Week of OASIS Security Seminarys

2007-06-19 Thread Arshad Noor
FYI. --- Begin Message --- Please forward to all appropriate contacts and lists. They're all free. Thanks. Arshad Noor StrongAuth, Inc. Register now for the OASIS Series of SECURITY Standards Webinars! It's everything you always wanted to know about security standards--from the people who cre

Re: Proposal for improving the security of add-on updates

2007-06-19 Thread Dave Townsend
Benjamin Smedberg wrote: > Gervase Markham wrote: > >> This seems like the right solution to me. In fact, I had assumed it was >> already the case, and that we were trying to solve the other half of the >> problem. > > We already support hashes specified by the upate.rdf for the XPI, and AMO > us

Re: Enumerting all certs in FF using sunpkcs11

2007-06-19 Thread Wan-Teh Chang
On 6/19/07, Anders Rundgren <[EMAIL PROTECTED]> wrote: > Wan-Teh, > I got the impression from Nelson's reply that JSS would give me the desired > functionality (giving me all FF certificate stores as one). I will look on > crypto.signText because it should be faced with the similar issue, right?

Re: Proposal for improving the security of add-on updates

2007-06-19 Thread Nils Maier
Gervase Markham schrieb: > Nils Maier wrote: > [...] >> PS: the Link-Fingerprints "standard" says: >>> Clients are encouraged not to implement any hash algorithms other >>> than MD5 and SHA-256, until and unless SHA-256 is found to have flaws. >> MD5 is broken, you can find collisions in just hours

Re: Proposal for improving the security of add-on updates

2007-06-19 Thread Benjamin Smedberg
Gervase Markham wrote: > This seems like the right solution to me. In fact, I had assumed it was > already the case, and that we were trying to solve the other half of the > problem. We already support hashes specified by the upate.rdf for the XPI, and AMO uses this to serve the XPIs over http. H

Re: Proposal for improving the security of add-on updates

2007-06-19 Thread Gervase Markham
Nils Maier wrote: > Link-Fingerprints cannot solve the problem of update.rdf-over-HTTP as > update.rdf is likely to update often and you cannot compute hash(es) for > it in advance. I didn't suggest that it could. > If you're proposing that all extensions or at least their update.rdf > must be se

Re: Proposal for improving the security of add-on updates

2007-06-19 Thread Gervase Markham
Dave Townsend wrote: > Gervase Markham wrote: >> Dave Townsend wrote: >>> What I want is to be able to be able to establish some trust that the >>> update file retrieved is correct, and has not been tampered with, >>> intercepted and is as it was originally written by the add-on author. >> >> Lin

Re: Enumerting all certs in FF using sunpkcs11

2007-06-19 Thread Anders Rundgren
Wan-Teh, I got the impression from Nelson's reply that JSS would give me the desired functionality (giving me all FF certificate stores as one). I will look on crypto.signText because it should be faced with the similar issue, right? Anders - Original Message - From: "Wan-Teh Chang" <[EM