Re: revocation of roots

2008-10-17 Thread Eddy Nigg
Frank Hecker: Yes, but as I understand it what is being discussed here is a more elaborate scheme whereby, for example, we (Mozilla) might run an actual CA just for the purpose of cross certifying the roots that we accept. Like Nelson, I can't remember who exactly was advocating this and what

Re: revocation of roots

2008-10-17 Thread Kyle Hamilton
My understanding is that when one revokes a certificate, it breaks the binding of the information in the certificate from the public key contained in the certificate. The trust of the public key as a trust anchor is a separate concept from the binding of the information in the certificate. Even i

Re: revocation of roots

2008-10-17 Thread Frank Hecker
Eddy Nigg wrote: Paul Hoffman: Having a trusted service that manages trust anchors for users can be very helpful. NSS itself is a trust anchor, the CA certificates are signed into certdata.txt upon the request of Frank. Yes, but as I understand it what is being discussed here is a more e

Re: revocation of roots

2008-10-17 Thread Eddy Nigg
Frank Hecker: Eddy Nigg wrote: b. Is there a way in the root list (code) to signal that a root is revoked (other than by a self-signed CRL of self)? E.g., by a flag or something? Not that I'm aware of. I don't know if this is what Ian was referring to, but in theory we can leave the root

Re: revocation of roots

2008-10-17 Thread Frank Hecker
Eddy Nigg wrote: b. Is there a way in the root list (code) to signal that a root is revoked (other than by a self-signed CRL of self)? E.g., by a flag or something? Not that I'm aware of. I don't know if this is what Ian was referring to, but in theory we can leave the root certificate in

Re: revocation of roots

2008-10-17 Thread Eddy Nigg
Paul Hoffman: At 11:13 AM -0700 10 I can speak up for it, but I am loathe to say it is "better" than suicide notes. I like the phrase "suicide note"that what it really is :-) Having a trusted service that manages trust anchors for users can be very helpful. NSS itself is a trust anch

Re: revocation of roots

2008-10-17 Thread Eddy Nigg
Ian G: b. Once so revoked, are all following CRLs also "revoked"? The CRL would have to be valid until the expiration time of the root. c. Or, are all certificates revoked? They are revoked due to the fact that the root is revokedRevoking recursive could also be an option. a.

Re: revocation of roots

2008-10-17 Thread Paul Hoffman
At 11:13 AM -0700 10/17/08, Nelson B Bolyard wrote: >A root that revokes itself invokes the liar's paradox. >NSS wishes to avoid the fate of the android Norman. :) Sorry, but that's a bit too glib. A "suicide note" is one valid method of trust anchor management. It does not invoke t

Re: revocation of roots

2008-10-17 Thread Ian G
Having read and mused on this "chicken and egg" problem, I see a bunch of questions here. I doubt they will all be answered, but food for thought: 1. If a root is compromised, how is it revoked and/or replaced? 2. If it is done by signing a revocation over self in CRL form, then: a. Is NSS

Re: revocation of roots

2008-10-17 Thread Nelson B Bolyard
Ian G wrote, On 2008-10-17 03:28: > Nelson Bolyard wrote: >> NSS will never check a self-issued cert for OCSP revocation. To clarify, the PRESENT RELEASE of NSS will never check a self-issued cert for OCSP revocation. Future releases may do different things. > Ah, ok, excellent, that helps with

Re: revocation of roots

2008-10-17 Thread Eddy Nigg
Frank Hecker: I'm not sure what you mean by "repeating the process". How would such revocation work in practice (assuming a PKI library that did CRL checking for roots)? Would the root just sign a CRL with its own certificate's serial number on it? Presumably at that point any application re

Re: Microtec CA inclusion request

2008-10-17 Thread Frank Hecker
Nelson B Bolyard wrote: One final question: Does anyone know what Thunderbird 3 will be doing in terms of OCSP checks? Will this problem affect end entity certificates issued by Microsec for S/MIME use? I would expect it to be identical to FF3. They use the same PSM and NSS. Thanks for the

Re: chrome://pippki/content/certManager.xul requirements

2008-10-17 Thread Nelson B Bolyard
[EMAIL PROTECTED] wrote, On 2008-10-16 23:09: > Hi Again, > I've still been working on getting all the PKI functionality working > inside my XulRunner 1.8 based browser in Eclipse. I came across the > Chrome url: chrome://pippki/content/certManager.xul which is exactly > what I wanted to manage the

Re: Partitioned CRLs

2008-10-17 Thread Nelson B Bolyard
Nuno Ponte wrote, On 2008-10-15 04:20 PDT: > We are running a CA that has thousands of revoked certificates > which leads to CRLs of several MBytes. > > On the next nenewal of the CA, we are thinking of partitioning the > CRLs at each X number of issued certificates. The issued certificat

Re: Microtec CA inclusion request

2008-10-17 Thread Nelson B Bolyard
Frank Hecker wrote, On 2008-10-17 06:57: > Please refresh my memory here: As I understand it, the basic problem was > that if the Microsec root were included in Firefox (or other products) > and a user surfed to an SSL/TLS-enabled site with an end entity > certificate issued by Microsec (a cert

Re: Microtec CA inclusion request

2008-10-17 Thread Frank Hecker
Nelson Bolyard wrote: Frank Hecker wrote: * OCSP. My understanding is that the Microsec practice of having a separate root for OCSP is very problematic, particularly given the inclusion of AIA extensions with OCSP URLs in end entity certificates. As I understand it, Microsec is removing AIA exte

Re: revocation of roots

2008-10-17 Thread Frank Hecker
Eddy Nigg wrote: Now IMO as the root certificate signs itself, with the same authority it should be able to revoke itself. This would result obviously in repeating the process until the root is removed and not used anymore, but it would mark the root and all certificates signed by it revoked.

Re: revocation of roots

2008-10-17 Thread Eddy Nigg
Ian G: Ah, ok, excellent, that helps with the big question: Can we conclude from this that roots cannot be revoked by means of the OCSP/CRL channel? No, because it depends on the application and library implementing it I think. Apparently it's correct for NSS. Now IMO as the root certifica

Re: NSS implementation of TLS-PSK/ RFC 4279

2008-10-17 Thread Steffen Schulz
On 081014 at 23:45, Ian G wrote: > > No. There are no plans to include any PSK cipher suites in NSS. > > Because of the enormous potential for PSK cipher suites to be misused by > > application developers, there is strong resistance to incorporating them > > into NSS. > > Nelson, I'm fascinated b

revocation of roots

2008-10-17 Thread Ian G
Nelson Bolyard wrote: > Frank Hecker wrote: >> However there still appears to be an open question as to whether having an >> AIA extension with OCSP URL in the Microsec root certificate will cause a >> problem with NSS. (Nelson wrote that he was going to investigate this, but I >> don't recall seei

Re: Microtec CA inclusion request

2008-10-17 Thread Rob Stradling
On Wednesday 15 October 2008 15:14:10 István Zsolt BERTA wrote: > > Just a thought... > > If Nelson's investigation does find that the OCSP AIA extension in your > > Root Certificate is a problem for NSS, is there really anything to stop > > you from issuing a new Root Certificate? This new Root C