Re: Extracting and/or documenting Firefox's trusted root certs

2008-08-22 Thread Nelson B Bolyard
Kyle Hamilton wrote, On 2008-08-22 14:38: > My understanding is that they were not allowed to use the Firefox > brand because its terms of use conflicted with their packaging and > freedom rules. Any additional changes after they changed the brand to > IceWeasel might also affect the ability to us

Re: Extracting and/or documenting Firefox's trusted root certs

2008-08-22 Thread Kyle Hamilton
My understanding is that they were not allowed to use the Firefox brand because its terms of use conflicted with their packaging and freedom rules. Any additional changes after they changed the brand to IceWeasel might also affect the ability to use the Firefox brand, but that wasn't the reason th

Re: warning - can't find private key for this cert

2008-08-22 Thread jaszay
On aug. 22, 21:38, Nelson B Bolyard <[EMAIL PROTECTED]> wrote: > [EMAIL PROTECTED] wrote, On 2008-08-22 12:09: > > > On aug. 22, 19:43, Nelson B Bolyard <[EMAIL PROTECTED]> wrote: > >> What version of NSS are you using? > > > nss 3.11.4 > > nspr 4.6.4 > > >> If you run the signtool program without

Re: warning - can't find private key for this cert

2008-08-22 Thread Nelson B Bolyard
[EMAIL PROTECTED] wrote, On 2008-08-22 12:09: > On aug. 22, 19:43, Nelson B Bolyard <[EMAIL PROTECTED]> wrote: >> What version of NSS are you using? > > nss 3.11.4 > nspr 4.6.4 > >> If you run the signtool program without any command line options, it outputs >> a page of "usage" information. Th

Re: Certificate not approved for this operation

2008-08-22 Thread jaszay
On aug. 22, 19:59, Nelson B Bolyard <[EMAIL PROTECTED]> wrote: > giorgio <[EMAIL PROTECTED]> wrote on 2008-08-22 06:01 PDT: > > > When you create a test certificate with signtool it is valid only for > > 3 months. > > It's valid for YOUR testing (only) for some time.  It's not valid at any > time f

Re: Extracting and/or documenting Firefox's trusted root certs

2008-08-22 Thread Nelson B Bolyard
Wan-Teh Chang wrote, On 2008-08-22 10:02: > On Thu, Aug 21, 2008 at 10:43 AM, Daniel Stenberg <[EMAIL PROTECTED]> wrote: >> On Thu, 21 Aug 2008, Wan-Teh Chang wrote: >> >>> Did you get your Firefox release from www.mozilla.com or from your Linux >>> distribution? >> I did say NSS 3.12, Firefox 3.01

Re: warning - can't find private key for this cert

2008-08-22 Thread jaszay
On aug. 22, 19:43, Nelson B Bolyard <[EMAIL PROTECTED]> wrote: > [EMAIL PROTECTED] wrote, On 2008-08-22 05:51: > > > Hi, > > > I have a Verisign Digital ID Class 3 - Microsoft Software Validation > > v2 certificate, which I would like to use to sign my xpi. > > > I have followed the steps described

Re: Extracting and/or documenting Firefox's trusted root certs

2008-08-22 Thread Kaspar Brand
Wan-Teh Chang wrote: > I don't know how to get the exact version of certdata.txt in > Firefox 3.0.1/NSS 3.12 from mxr.mozilla.org. bonsai's cvsblame.cgi is somewhat better (though not perfect) for this - try e.g. http://bonsai.mozilla.org/cvsblame.cgi?file=mozilla/security/nss/lib/ckfw/builtins/c

Re: Dan Kaminsky's DNS talk discusses SSL

2008-08-22 Thread Eddy Nigg
Nelson B Bolyard: > Gervase Markham wrote, On 2008-08-22 02:17: >> Eddy Nigg wrote: >>> Well, I don't agree with the statements above. It really depends what >>> kind of DNS attack it is and how prepared the CA is and what the CA does >>> about it. >> Exactly my point. If the CA's DNS is secure, th

Re: Dan Kaminsky's DNS talk discusses SSL

2008-08-22 Thread Nelson B Bolyard
Gervase Markham wrote, On 2008-08-22 02:17: > Eddy Nigg wrote: >> Well, I don't agree with the statements above. It really depends what >> kind of DNS attack it is and how prepared the CA is and what the CA does >> about it. > > Exactly my point. If the CA's DNS is secure, the EV system is safe.

Re: Certificate not approved for this operation

2008-08-22 Thread Nelson B Bolyard
giorgio <[EMAIL PROTECTED]> wrote on 2008-08-22 06:01 PDT: > When you create a test certificate with signtool it is valid only for > 3 months. It's valid for YOUR testing (only) for some time. It's not valid at any time for generating signatures that will be verifiable by other users, because it

Re: warning - can't find private key for this cert

2008-08-22 Thread Nelson B Bolyard
[EMAIL PROTECTED] wrote, On 2008-08-22 05:51: > Hi, > > I have a Verisign Digital ID Class 3 - Microsoft Software Validation > v2 certificate, which I would like to use to sign my xpi. > > I have followed the steps described on this page > http://oyoy.eu/huh/firefox-extension-code-signed-with-spc

Re: Extracting and/or documenting Firefox's trusted root certs

2008-08-22 Thread Wan-Teh Chang
On Thu, Aug 21, 2008 at 10:43 AM, Daniel Stenberg <[EMAIL PROTECTED]> wrote: > On Thu, 21 Aug 2008, Wan-Teh Chang wrote: > >> Did you get your Firefox release from www.mozilla.com or from your Linux >> distribution? > > I did say NSS 3.12, Firefox 3.01 and Debian Linux. If you get your NSS 3.12 fr

Re: Dan Kaminsky's DNS talk discusses SSL

2008-08-22 Thread Nelson B Bolyard
Gervase Markham wrote, On 2008-08-22 02:17: > I don't think we'd go as far as Subject matching. The point about EV is > that the owner of the cert is a known legal "physical" entity somewhere. AND that an identifier of that legal entity is easily available to the user so that the user can make us

Re: Certificate not approved for this operation

2008-08-22 Thread Arshad Noor
What are the key-usage and extended key-usage extension values in the certificate issued by MS signtool? Once a certificate has been issued, it cannot be changed. You have to reissue the certificate (as a new one) if you want any changes in it. You should be able to generate a certificate of wha

Certificate not approved for this operation

2008-08-22 Thread jaszay
Hi, When you create a test certificate with signtool it is valid only for 3 months. I would like to know whether it is possible to convert a microsoft test certificate and use it with Firefox for object signing. This is what I try to do: 1., I have a test.pfx created with microsoft signtool valid

warning - can't find private key for this cert

2008-08-22 Thread jaszay
Hi, I have a Verisign Digital ID Class 3 - Microsoft Software Validation v2 certificate, which I would like to use to sign my xpi. I have followed the steps described on this page http://oyoy.eu/huh/firefox-extension-code-signed-with-spc-pvk/ Briefly 1., I use pvkimport to convert spc and pvk to

Re: Dan Kaminsky's DNS talk discusses SSL

2008-08-22 Thread Eddy Nigg
Gervase Markham: > Eddy Nigg wrote: >> Even though I'm in favor of not mixing EV and other content, I think >> this argument is moot. Chances that such an attack on a CA is successful >> is most likely less than having you encounter such an attack yourself. > > What makes you think that's true? >

Re: Dan Kaminsky's DNS talk discusses SSL

2008-08-22 Thread Eddy Nigg
Gervase Markham: > > Exactly my point. If the CA's DNS is secure, the EV system is safe. If > it's not, it's not. So the two are linked, and they shouldn't be. I think you meant DV, not EV here... > > Note I wasn't specifically talking about this attack, which the CAs may > well have patched agai

Re: Dan Kaminsky's DNS talk discusses SSL

2008-08-22 Thread Gervase Markham
Kyle Hamilton wrote: > Even in the case where you require all-EV content, if you try to > perform any additional matching of the Subject (which is what needs to > be matched anyway) you're going to break third-party data feeds and > services. For example, in the aforementioned case, even if Google

Re: Dan Kaminsky's DNS talk discusses SSL

2008-08-22 Thread Eddy Nigg
Nelson B Bolyard: > Yeah, it's just not clear to me what legitimate role third party feeds > have in an EV web page. In an http page, sure. In an EV https page? > When the site is trying to say "You can be really sure you're dealing > with me here", what role do third parties have in that? I don

Re: Dan Kaminsky's DNS talk discusses SSL

2008-08-22 Thread Gervase Markham
Eddy Nigg wrote: > Even though I'm in favor of not mixing EV and other content, I think > this argument is moot. Chances that such an attack on a CA is successful > is most likely less than having you encounter such an attack yourself. What makes you think that's true? Attacking a CA's DNS server

Re: Dan Kaminsky's DNS talk discusses SSL

2008-08-22 Thread Gervase Markham
Eddy Nigg wrote: > Well, I don't agree with the statements above. It really depends what > kind of DNS attack it is and how prepared the CA is and what the CA does > about it. Exactly my point. If the CA's DNS is secure, the EV system is safe. If it's not, it's not. So the two are linked, and the

Re: Dan Kaminsky's DNS talk discusses SSL

2008-08-22 Thread Eddy Nigg
Heikki Toivonen: > > That is not good enough. As long as it is possible to spoof DNS, it is > possible to get DV certificate for any domain. > Even though I'm in favor of not mixing EV and other content, I think this argument is moot. Chances that such an attack on a CA is successful is most lik

Re: Dan Kaminsky's DNS talk discusses SSL

2008-08-22 Thread Heikki Toivonen
Kyle Hamilton wrote: > On Thu, Aug 21, 2008 at 10:24 AM, Nelson B Bolyard <[EMAIL PROTECTED]> wrote: >> I was informed privately that it means that Firefox shows EV chrome >> indicators, even for pages that contain some DV content. > > Er, if this didn't happen, PayPal wouldn't be able to show chr