Re: Looking for Certificate Database management cues...

2008-02-06 Thread Nelson Bolyard
Arshad Noor wrote, On 2008-02-06 06:38: > The issue isn't with certificates; it is with private keys. Arshad, I think e.kabarie is concerned with attacks that would inject bogus CA certs into the client's cert DB and mark them as trusted. E.Kabarie: The difficulty with your problem statement is

Re: Looking for Certificate Database management cues...

2008-02-06 Thread D3|\||\|!$
> The issue isn't with certificates; it is with private keys. I disagree with you...What if somebody deleted the private key from key3.db and its associated certificate entry in cert8.db??? Then added his own thing and went around playing with it...??? > You are right that private keys stored in

Re: Netscape PKCS #11 Test Suite

2008-02-06 Thread Glen Beasley
Erez wrote: > Ho can I download Netscape PKCS #11 Test Suite source code? > no. there is a status summary explaining why on the netscape PKCS#11 test suite page. http://www.mozilla.org/projects/security/pki/pkcs11/netscape/ * Tools: The tools regress, reporter, and replacer have yet to

Re: Looking for Certificate Database management cues...

2008-02-06 Thread Arshad Noor
The issue isn't with certificates; it is with private keys. You are right that private keys stored in files and protected by passwords can be attacked with dictionary attacks, rainbow tables, guessing, etc. The traditional counter-measure is to store the private-key in a FIPS 140-2 Level 2/3 cert

Looking for Certificate Database management cues...

2008-02-06 Thread D3|\||\|!$
Hi all!!! I'm developing a client-server application in which I wish to make the certificate database on the client side discreetI'm skeptical of leaving the cert8.db, secmod.db, and key3.db accessible to all & sundryMakes it vulnerable to getting hacked... I fully understand that the file