Re: revocation of roots

2008-10-22 Thread Ian G
Kyle Hamilton wrote: > 2008/10/22 Ian G <[EMAIL PROTECTED]>: Quite right. The flip side of this is that if *anyone* other than the person who generated the key pair has they public key, they *should* sign the suicide note and distribute it because if they have it, a bad actor co

Re: Unable to decode an encrypted messave

2008-10-22 Thread Nelson B Bolyard
Paul Kinzelman wrote, On 2008-10-22 18:39: > I originally posted this issue on moz.sup.tbird and somebody > suggested posting it here. The suggestion I got over there was > to try https://nic-nac-project.de/~kaosmos/p7mHandler-en.html That should be https://nic-nac-project.org/~kaosmos/p7mHandler-

Re: Unable to decode an encrypted message

2008-10-22 Thread Arshad Noor
If your friend is encrypting the message, whose digital certificate is he using to encrypt it with? Yours? Do you have a digital certificate with an associated Private Key in your Tbird keystore? If so, are you trying to read the encrypted e-mail from the same machine where you have your Private

Unable to decode an encrypted messave

2008-10-22 Thread Paul Kinzelman
I originally posted this issue on moz.sup.tbird and somebody suggested posting it here. The suggestion I got over there was to try https://nic-nac-project.de/~kaosmos/p7mHandler-en.html but that didn't change anything. I'm using Tbird 2.0.0.17 (20080914) When a friend uses an Apple to digitally s

Re: revocation of roots

2008-10-22 Thread Kyle Hamilton
2008/10/22 Ian G <[EMAIL PROTECTED]>: >>> Quite right. The flip side of this is that if *anyone* other than the >>> person who generated the key pair has they public key, they *should* >>> sign the suicide note and distribute it because if they have it, a bad >>> actor could have it as well. > > >

Re: revocation of roots

2008-10-22 Thread Ian G
Julien R Pierre - Sun Microsystems wrote: > Paul Hoffman wrote: >> At 4:39 PM +0100 10/22/08, Gervase Markham wrote: >>> Julien R Pierre - Sun Microsystems wrote: If the root could "revoke itself", in the case of root cert key compromise, ie. the root cert's private key becoming public, a

Re: revocation of roots

2008-10-22 Thread Eddy Nigg
On 10/23/2008 12:34 AM, Julien R Pierre - Sun Microsystems: However, in this particular case, for all NSS-based software - a manual solution exists for older applications : simply mark the root as untrusted. If they happen to hear about it. Or if they happen to use an updated NSS library. How

Re: Partitioned CRLs

2008-10-22 Thread Julien R Pierre - Sun Microsystems
Nuno, nponte wrote: Hi Julien, Thanks for your reply. Is there any ticket filed in bugzilla where I can track developments on this issue? Regards, Nuno Yes. See bugzilla 133191 . Also 321755 is related. ___ dev-tech-cr

Re: revocation of roots

2008-10-22 Thread Julien R Pierre - Sun Microsystems
Eddy, Eddy Nigg wrote: Updating software with a new root module is a lot simpler. Of course that process has its own set of security issues as well. Besides that, one of the problems is, how to reach each and every software (including older or non-updated or smaller ones). I think general

Re: revocation of roots

2008-10-22 Thread Julien R Pierre - Sun Microsystems
Paul, Paul Hoffman wrote: Updating software with a new root module is a lot simpler. Of course that process has its own set of security issues as well. It also doesn't work for users who are using a different root module. "Barely traceable management action" != "open message protocol". Tru

Re: Partitioned CRLs

2008-10-22 Thread nponte
Hi Julien, Thanks for your reply. Is there any ticket filed in bugzilla where I can track developments on this issue? Regards, Nuno On Oct 20, 8:22 pm, Julien R Pierre - Sun Microsystems <[EMAIL PROTECTED]> wrote: > Ni Nuno, > > > > nponte wrote: > >     Hi, > > >

Re: revocation of roots

2008-10-22 Thread Eddy Nigg
On 10/22/2008 09:46 PM, Julien R Pierre - Sun Microsystems: Yes, they should ... But the big question is how do they actually do that and get software to take notice of that suicide note ? I don't think that can really be done without standards. I think that's the key to solve the problem of

Re: revocation of roots

2008-10-22 Thread Eddy Nigg
On 10/22/2008 10:14 PM, Paul Hoffman: Yes, they should ... But the big question is how do they actually do that and get software to take notice of that suicide note ? I don't think that can really be done without standards. Of course. I'm not saying we don't need a standard, just that the lack

Re: revocation of roots

2008-10-22 Thread Paul Hoffman
>Yes, they should ... But the big question is how do they actually do that and >get software to take notice of that suicide note ? >I don't think that can really be done without standards. Of course. I'm not saying we don't need a standard, just that the lack of a standard *today* should not pre

Re: revocation of roots

2008-10-22 Thread Julien R Pierre - Sun Microsystems
Paul Hoffman wrote: At 4:39 PM +0100 10/22/08, Gervase Markham wrote: Julien R Pierre - Sun Microsystems wrote: If the root could "revoke itself", in the case of root cert key compromise, ie. the root cert's private key becoming public, anybody could then sign revocation information for that ro

Re: revocation of roots

2008-10-22 Thread Julien R Pierre - Sun Microsystems
Gervase, Gervase Markham wrote: Julien R Pierre - Sun Microsystems wrote: If the root could "revoke itself", in the case of root cert key compromise, ie. the root cert's private key becoming public, anybody could then sign revocation information for that root CA - whether to mark it revoked or

Re: revocation of roots

2008-10-22 Thread Paul Hoffman
At 4:39 PM +0100 10/22/08, Gervase Markham wrote: >Julien R Pierre - Sun Microsystems wrote: >> If the root could "revoke itself", in the case of root cert key >> compromise, ie. the root cert's private key becoming public, anybody >> could then sign revocation information for that root CA - whethe

Re: revocation of roots

2008-10-22 Thread Gervase Markham
Julien R Pierre - Sun Microsystems wrote: > If the root could "revoke itself", in the case of root cert key > compromise, ie. the root cert's private key becoming public, anybody > could then sign revocation information for that root CA - whether to > mark it revoked or unrevoked. Leaving aside th