Re: Creating secmod, cert8, and key3

2008-06-23 Thread Nelson B Bolyard
Larry Melton wrote, On 2008-06-23 15:29: > We would like our java application to create a mozilla cert store if one > doesn't already exist, similar to the way firefox does. We currently > install firefox and create a new profile specifically for our application. > It seems that some IE types s

Re: NSS 3.12 is released

2008-06-23 Thread Gen Kanai
On Jun 24, 2008, at 9:41 AM, Wan-Teh Chang wrote: > On Thu, Jun 19, 2008 at 2:11 AM, Jean-Marc Desperrier > <[EMAIL PROTECTED]> wrote: >> >> But Firefox 3.0 does not make use of the SQLite support, right ? >> Quite a pity ... > > You're right. I added a note to the NSS 3.12 Release Notes > to cl

Re: NSS 3.12 is released

2008-06-23 Thread Wan-Teh Chang
On Thu, Jun 19, 2008 at 2:11 AM, Jean-Marc Desperrier <[EMAIL PROTECTED]> wrote: > > But Firefox 3.0 does not make use of the SQLite support, right ? > Quite a pity ... You're right. I added a note to the NSS 3.12 Release Notes to clarify this point: http://www.mozilla.org/projects/security/pki/n

Re: certutil or PKI for NSS 3.11.9

2008-06-23 Thread Arshad Noor
Nelson, I think you may want to qualify your message in this paragraph, so as to not mislead people who don't understand PKI very well. As I'm sure most people on this list know, every Root CA certificate is a self-signed certificate. There is nothing inherently insecure about such certificates,

Creating secmod, cert8, and key3

2008-06-23 Thread Larry Melton
We would like our java application to create a mozilla cert store if one doesn't already exist, similar to the way firefox does. We currently install firefox and create a new profile specifically for our application. It seems that some IE types start convulsing on the floor if you suggest that

Re: certutil or PKI for NSS 3.11.9

2008-06-23 Thread Nelson B Bolyard
Dennis Darch wrote, On 2008-06-23 13:05: > I am extending our application software to function as an LDAP/SSL client > for login authentication. To do this, I have built the Mozilla LDAP C > SDK 6.0.4 with NSS 3.11.9 and NSPR 4.7. > > Obviously, our customers have to set up cert8.db and key3.db

Where are the binaries for nss 3.12 and nspr 4.7.1?

2008-06-23 Thread Larry Melton
Maybe I'm missing something obvious here, but where are the binaries for nss 3.12 and nspr 4.7.1? The most recent ones I can find are for nss 3.11 and nspr 4.6.4. We do everything in java here, so I've always used the binaries. Thanks, Larry ___

Re: Importing exporting JKS key to NSS db

2008-06-23 Thread Nelson B Bolyard
Yevgeniy Gubenko wrote, On 2008-06-23 12:47: > I don't know how to extract specificly public key after I > used the following command: > > certutil -G -n srv -k rsa -g 1024 -z seed -f pwdfile.txt -d . > > which should have created me public/private key pair. > The second problem is: after I have

certutil or PKI for NSS 3.11.9

2008-06-23 Thread Dennis Darch
I am extending our application software to function as an LDAP/SSL client for login authentication. To do this, I have built the Mozilla LDAP C SDK 6.0.4 with NSS 3.11.9 and NSPR 4.7. Obviously, our customers have to set up cert8.db and key3.db files that will trust the certificate of the LDAP

RE: Importing exporting JKS key to NSS db

2008-06-23 Thread Yevgeniy Gubenko
Thanks Michael for your reply First of all, I don't know how to extract specificly public key after I used the following command: certutil -G -n srv -k rsa -g 1024 -z seed -f pwdfile.txt -d . which should have created me public/private key pair. The second problem is: after I have created JKS publ

Re: Update on DigiNotar and Entrust

2008-06-23 Thread Robert Relyea
Frank Hecker wrote: 3. Find some other way to get NSS not to recognize DigiNotar certs for email, perhaps in combination with some action by Entrust and/or DigiNotar. For example, one idea is to have end users of DigiNotar certs reconfigure their email clients to have cert chains that termina

Re: Debian Weak Key Problem

2008-06-23 Thread Eddy Nigg
Gervase Markham: > Rob Stradling wrote: >> That is now old news. I'm pleased to announce that... > > > > > Gerv StartCom has concluded today the revocation of all vulnerable keys which were signed by any of our roots, respectively intermediate CA certificates. Several notifications were sent

Re: New SSL warning

2008-06-23 Thread Eddy Nigg
Jan Schejbal: > I did (now completely), but most of it seems to be a discussion about > CAs (not) revoking keys. As I understand it, if the CA does use only a > normal CRL (and not OCSP), firefox won't care. At least the > proof-of-concept attack on the akamai key still worked. Yes, as indicated C

https flow

2008-06-23 Thread Pawel P
Hello, I want to overwrite default mozilla 1.9 behavior in https flow. I want to be informed about certificates (especially bad). I'll show my own "certificate dialogs" to user and user will decide if accept certificate or not. In mozilla 1.8 I used nsIBadCertListener interface to do above. In mo

Re: New SSL warning

2008-06-23 Thread Jan Schejbal
Hi, >Please read the thread about Debian keys first: I did (now completely), but most of it seems to be a discussion about CAs (not) revoking keys. As I understand it, if the CA does use only a normal CRL (and not OCSP), firefox won't care. At least the proof-of-concept attack on the akamai key

Re: Importing exporting JKS key to NSS db

2008-06-23 Thread Michael Ströder
Yevgeniy Gubenko wrote: > > 1.export public key from Solaris to Windows in JKS format > > 2.import public key from Windows to Solaris into NSS database I would export as PKCS#12 format and import that to NSS cert DB. Ciao, Michael. ___ dev-tech-crypto