Re: Problem with loading security module in firefox..

2008-06-06 Thread Subrata Mazumdar
Hi Akkshayaa, I have a suggestion - it may may or may not work. Try to put the PKCS#11 DLL in a directory that is not name 'components'. The 'components' directory is for add-on related files. Browser will automatically load any DLL in that directory. My guess is that the DLL is loaded before

Re: Modulus length (was Re: Draft CA information checklist)

2008-06-06 Thread Paul Hoffman
At 12:54 PM -0700 6/6/08, Nelson B Bolyard wrote: >I recall a long discussion on this list in which certain people observed >(or opined) that the cert path validation algorithm defined in RFC 3280 >has the characteristics you describe above. That is, the claim was made >that RFC 3280's algorithm d

Re: Entrust EV request

2008-06-06 Thread Eddy Nigg (StartCom Ltd.)
Bruce: You are correct, if the WHOIS records do not match then the process is stopped. In the case of a private domain registration as per your Domains by Proxy example, we would confirm via another method such as 1) through the registar (Domains by Proxy provides this service), 2) have domain in

Re: Entrust EV request

2008-06-06 Thread Bruce
On Jun 6, 9:34 am, "Eddy Nigg (StartCom Ltd.)" <[EMAIL PROTECTED]> wrote: > Hi Bruce, > > Bruce: > > > > > All Organization Validated SSL certificates are issued using a three > > part process. The applicant's business name is validated against a > > third party database (e.g. D&B or government reg

Re: Debian Weak Key Problem

2008-06-06 Thread Andrews, Rick
> Andrews, Rick wrote, On 2008-06-04 15:24: > >> It seems that CAs are not bothering to contact their customers with > >> weak keys[1], although they are of course revoking the keys of > >> customers who ask, and reissuing certificates. > > > > Gerv, > > > > I just wanted to mention that we've b

Re: Modulus length (was Re: Draft CA information checklist)

2008-06-06 Thread Nelson B Bolyard
Kyle Hamilton wrote, On 2008-06-05 07:46: > I must also point out something: > > NSS (at least up until 2004 -- I don't know if this has been changed, > but the MoFo position espoused by I believe Nelson and Frank was that > it wouldn't change) doesn't rely on any of the X.509v3 certificate > fie

Re: Debian Weak Key Problem

2008-06-06 Thread Nelson B Bolyard
Andrews, Rick wrote, On 2008-06-04 15:24: >> It seems that CAs are not bothering to contact their customers with >> weak keys[1], although they are of course revoking the keys of >> customers who ask, and reissuing certificates. > > Gerv, > > I just wanted to mention that we've been working fev

Re: Modulus length (was Re: Draft CA information checklist)

2008-06-06 Thread Paul Hoffman
At 2:20 AM -0700 6/6/08, Kyle Hamilton wrote: >The NIST date and EV date are the dates when they should no longer be >used, not 'no longer admitted for use', unless I'm completely >misreading the table on page 66 of the NIST SP800-57. You are not misreading the table. That's a "do not use after" d

Re: Entrust EV request

2008-06-06 Thread Eddy Nigg (StartCom Ltd.)
Hi Bruce, Bruce: All Organization Validated SSL certificates are issued using a three part process. The applicant's business name is validated against a third party database (e.g. D&B or government registry). Domain names are validated via a WHOIS lookup to ensure that the domain is registered

Re: Modulus length (was Re: Draft CA information checklist)

2008-06-06 Thread Kyle Hamilton
I wholeheartedly believe that placing an arbitrary policy limitation in general-purpose software is ill-advised at best and reason for the product to be dismissed out of consideration for any usage at worst. -Kyle H 2008/6/6 Eddy Nigg (StartCom Ltd.) <[EMAIL PROTECTED]>: > Rob Stradling: > > Anot

Re: Entrust EV request

2008-06-06 Thread Bruce
On Jun 5, 6:40 pm, "Eddy Nigg (StartCom Ltd.)" <[EMAIL PROTECTED]> wrote: > Frank Hecker: > > > > > > > This language and other language in section 3.1.8 seem pretty standard > > to me; I've seen language like it in lots of CPSs. As I read it, RAs get > > various identity-related documents from app

Re: Modulus length (was Re: Draft CA information checklist)

2008-06-06 Thread Eddy Nigg (StartCom Ltd.)
Rob Stradling: Another option would be to make a (small? :-) modification to NSS to allow us to store an expiry date which overrode the one in the certificate. Good idea. That would be much less hassle (compared to my proposal) for both the CAs and Mozilla. Yes, that's perhaps a go

Re: Modulus length (was Re: Draft CA information checklist)

2008-06-06 Thread Rob Stradling
On Friday 06 June 2008 10:07:20 Gervase Markham wrote: > Nelson B Bolyard wrote: > > Rob, in the past, any time that we have suggested that a CA issue a new > > root CA cert for any reason, even if only to change something minor, > > we've received much feedback saying that doing so represents a hu

Re: Modulus length (was Re: Draft CA information checklist)

2008-06-06 Thread Eddy Nigg (StartCom Ltd.)
Gervase Markham: Rob Stradling wrote: FYI, Microsoft already require a minimum 2048-bit RSA key size for new Root Certificate submissions. Then we might want to implement the same policy, with an exception (for compatibility reasons) for roots which already have a signficant degree o

Re: Modulus length (was Re: Draft CA information checklist)

2008-06-06 Thread Kyle Hamilton
The NIST date and EV date are the dates when they should no longer be used, not 'no longer admitted for use', unless I'm completely misreading the table on page 66 of the NIST SP800-57. I'm all for much more immediate cessation of adding new roots into the browser of 1024 bits, simply because as a

Re: Debian Weak Key Problem

2008-06-06 Thread Gervase Markham
Andrews, Rick wrote: > I just wanted to mention that we've been working feverishly to automate > checking of all valid certs in our databases. It's taking time because > it's a huge task - we have hundreds of thousands of certs to check - but > we intend to notify any customer who is using a weak k

Re: Modulus length (was Re: Draft CA information checklist)

2008-06-06 Thread Gervase Markham
Rob Stradling wrote: > FYI, Microsoft already require a minimum 2048-bit RSA key size for new Root > Certificate submissions. Then we might want to implement the same policy, with an exception (for compatibility reasons) for roots which already have a signficant degree of deployment but which, fo

Re: Modulus length (was Re: Draft CA information checklist)

2008-06-06 Thread Gervase Markham
Kyle Hamilton wrote: > There has been evidence of Microsoft, at the least, following this > group and acting on good ideas that started here. We do talk to each other, you know :-) > January 1 2009 particularly because it provides slightly less than 2 > quarters of notice. Indeed. Which does

Re: Modulus length (was Re: Draft CA information checklist)

2008-06-06 Thread Gervase Markham
Nelson B Bolyard wrote: > Rob, in the past, any time that we have suggested that a CA issue a new > root CA cert for any reason, even if only to change something minor, > we've received much feedback saying that doing so represents a huge > challenge and investment for the CAs, necessitating modifi