Re: RSA Keygen problem

2009-01-30 Thread Nelson B Bolyard
Jean-Daniel wrote, On 2009-01-22 14:06: > Everything is green. > > The new asm file does not try to determine at runtime if SSE2 is > present, but it does it at compile time. > By default the Apple GCC version define __SSE2__, so the default is to > use it on Mac. > And as mention before, all sup

Re: Policy: revoke on private key exposure

2009-01-30 Thread Nelson B Bolyard
Jean-Marc Desperrier wrote, On 2009-01-30 03:25: > Paul Hoffman wrote: >> [...] >> That feels insufficient to me. I also disagree that there are >> "practical problems of revoking a very large number of certificates". >> The worst problem is that the CRL will grow; that's no big deal, it >> is supp

Re: Policy: revoke on private key exposure

2009-01-30 Thread Kyle Hamilton
The PKIX standard can deal with problems of this extent. If an implementation of the standard cannot, then the implementation is nonconforming, and cannot be expected to interoperate. in other words, it's the implementation's fault, not the standard's. (Yes, a standard has the responsibility to m

Re: X509 per machine (not per user) - or equivalent needed

2009-01-30 Thread Kyle Hamilton
This is very much akin to needing to authenticate that a machine used to perform the transaction submission was, indeed, configured by the information technology staff. This is a very important concept that cannot be discounted or ignored. Essentially, what you need is a two-stage authentication

Re: X509 per machine (not per user) - or equivalent needed

2009-01-30 Thread Michael Ströder
Denis McCarthy wrote: > On Fri, Jan 30, 2009 at 2:15 PM, Michael Ströder wrote: >> Ian G wrote: >>> X.509 is a user concept, not a transaction concept. >> Hmm, X.509 certs are simply a strong binding between a name of an entity >> and a public key. Machines can be entities too like with server cer

Re: JSS Diffie Hellman

2009-01-30 Thread Wan-Teh Chang
On Fri, Jan 30, 2009 at 9:32 AM, Glen Beasley wrote: > > For recommend ciphersuites, how about: > > TLS_RSA_WITH_AES_128_CBC_SHA > TLS_DHE_RSA_WITH_AES_128_CBC_SHA I concur. Note that TLS_RSA_WITH_AES_128_CBC_SHA is the mandatory cipher suite in TLS 1.2 (http://www.ietf.org/rfc/rfc5246.txt, Sect

Re: X509 per machine (not per user) - or equivalent needed

2009-01-30 Thread Anders Rundgren
+1 This is primarily an architecture question. /anders - Original Message - From: "Ian G" To: "mozilla's crypto code discussion list" Sent: Friday, January 30, 2009 18:28 Subject: Re: X509 per machine (not per user) - or equivalent needed On 30/1/09 17:07, Denis McCarthy wrote: >>

Re: JSS Diffie Hellman

2009-01-30 Thread Glen Beasley
Nelson B Bolyard wrote: Sreedhar Kamishetti wrote on 2009-01-29 16:28 PST: I just started to use JSS/NSS. So, if hope some one will reply to this post. We use SSL_DH_anon_WITH_3DES_EDE_CBC_SHA” as cipher suite for communication between SSL Peers. Client is in Java and Server is in C (uses

Re: X509 per machine (not per user) - or equivalent needed

2009-01-30 Thread Ian G
On 30/1/09 17:07, Denis McCarthy wrote: Is there a reason why you want certificates involved? Why can't the machine's website just have a drop-down or cookie or something that says what store it is in? The reason why we want certificates involved is because in general we don't trust the user

Re: X509 per machine (not per user) - or equivalent needed

2009-01-30 Thread Arshad Noor
After reading the other postings on this thread, I think I see what you're getting at. You need a combination of two items and a 2-phase authentication process to get the assurance you're seeking: 1) A token-based credential per user, using a smartcard and a digital certificate for Client-Aut

Re: X509 per machine (not per user) - or equivalent needed

2009-01-30 Thread Anders Rundgren
A better solution would be to authenticate the user as well as is possible. After successful authentication through a web ID portal (which would identify itself through an non-personal) org-cert the user would be redirected to the actual app using SAML. If the user has a personal certificate it

Re: Policy: revoke on private key exposure

2009-01-30 Thread Paul Hoffman
It is kind of sad that this discussion has become "CAs should not revoke certificates when the private keys are exposed because Java cannot handle CRLs reliably". That says more about the failures of Java than it does failures in PKIX. --Paul Hoffman -- dev-tech-crypto mailing list dev-tech-cry

Re: X509 per machine (not per user) - or equivalent needed

2009-01-30 Thread Denis McCarthy
> > Getting back to your question. You want the server to also collect the > browser's machine location ... Presumably you have already looked at all > the browser headers and decided that the IP address isn't good enough. > The problem with the IP address is that it does not necessarily identify

Re: X509 per machine (not per user) - or equivalent needed

2009-01-30 Thread Ian G
On 30/1/09 15:07, Denis McCarthy wrote: One thing we are investigating is the possibility of writing an ActiveX component to access the computer account to pull the certificate information from there for a browser (we'd probably need to glue the ActiveX component together with some sort of Firefo

Re: X509 per machine (not per user) - or equivalent needed

2009-01-30 Thread Denis McCarthy
Hi Michael, While I agree that it would make sense for us to not be swimming upstream regarding our usage of X.509 certs, alas we are not in a position to change the fundamental model, as this is the way our customer does its business. Denis On Fri, Jan 30, 2009 at 2:15 PM, Michael Ströder wrote

Re: X509 per machine (not per user) - or equivalent needed

2009-01-30 Thread Michael Ströder
Ian G wrote: > X.509 is a user concept, not a transaction concept. Hmm, X.509 certs are simply a strong binding between a name of an entity and a public key. Machines can be entities too like with server certs. Still I'd agree that the original poster should rethink his concept. I'd probably pref

Re: X509 per machine (not per user) - or equivalent needed

2009-01-30 Thread Denis McCarthy
One thing we are investigating is the possibility of writing an ActiveX component to access the computer account to pull the certificate information from there for a browser (we'd probably need to glue the ActiveX component together with some sort of Firefox plugin to get this to work in Firefox, b

Re: X509 per machine (not per user) - or equivalent needed

2009-01-30 Thread Eddy Nigg
On 01/30/2009 02:31 PM, Denis McCarthy: Actually, one other thing. While I agree with you on the thin clients issue, many of our applications use their own PC's to run our application (they have other applications they use on their PC besides ours) Typically server certificates are issued to s

Re: Policy: revoke on private key exposure

2009-01-30 Thread Michael Ströder
Florian Weimer wrote: > * Michael Ströder: > >> Florian Weimer wrote: >>> What about requiring that all certificates must be published by the CA >>> (including sub-CAs)? >> No, this might lead to also revealing internal DNS names never meant to >> be public. > > Huh? Typical CA policies Whateve

Re: Policy: revoke on private key exposure

2009-01-30 Thread Eddy Nigg
On 01/30/2009 01:25 PM, Jean-Marc Desperrier: Paul Hoffman wrote: [...] That feels insufficient to me. I also disagree that there are "practical problems of revoking a very large number of certificates". The worst problem is that the CRL will grow; that's no big deal, it is supposed to grow. Y

Re: Policy: revoke on private key exposure

2009-01-30 Thread David Stutzman
Jean-Marc Desperrier wrote: You *obviously* never had to handle this CRL : http://onsitecrl.certplus.com/DIRECTIONGENERALEDESIMPOTSDIRECTIONGENERALEDESIMPOTSUSAGER/LatestCRL Java programs just can't take it up. And J2EE is by far the most popular application server architecture nowadays. 64 bi

Re: SSL problem diagnosis tool

2009-01-30 Thread Ian G
On 30/1/09 13:25, Jean-Marc Desperrier wrote: Ian G wrote: Ian G wrote, On 2009-01-29 10:01: [...] when firefox trips over a cert, it could show something like that. | There is a problem with this cert! | | ==> *The cert was not issued by a known CA*<== | The cert has expired or is not yet v

Re: X509 per machine (not per user) - or equivalent needed

2009-01-30 Thread Ian G
On 30/1/09 13:24, Denis McCarthy wrote: Hi Anders, I think this gets to the nub of the point at issue. Our customers often have several stores. We do not want our X509 certificates to be 'per user' because what is critical for us is in which *store* the transaction Oh, I see! You have an a

Re: X509 per machine (not per user) - or equivalent needed

2009-01-30 Thread Denis McCarthy
Actually, one other thing. While I agree with you on the thin clients issue, many of our applications use their own PC's to run our application (they have other applications they use on their PC besides ours) On Fri, Jan 30, 2009 at 12:24 PM, Denis McCarthy wrote: > Hi Anders, > Good question. >

Re: SSL problem diagnosis tool

2009-01-30 Thread Jean-Marc Desperrier
Ian G wrote: On 29/1/09 19:24, Nelson B Bolyard wrote: Ian G wrote, On 2009-01-29 10:01: [...] when firefox trips over a cert, it could show something like that. | There is a problem with this cert! | | ==> *The cert was not issued by a known CA*<== | The cert has expired or is not yet vali

Re: X509 per machine (not per user) - or equivalent needed

2009-01-30 Thread Denis McCarthy
Hi Anders, Good question. > If the computers OTOH are just ordinary but shared office computers, > critical data should be server-based and protected by user access control. > Thin clients is the most common solution to this fairly standard > problem. Then it would be X.509 per user rather. > I t

Re: Policy: revoke on private key exposure

2009-01-30 Thread Jean-Marc Desperrier
Paul Hoffman wrote: [...] That feels insufficient to me. I also disagree that there are "practical problems of revoking a very large number of certificates". The worst problem is that the CRL will grow; that's no big deal, it is supposed to grow. You *obviously* never had to handle this CRL : h

Re: X509 per machine (not per user) - or equivalent needed

2009-01-30 Thread Anders Rundgren
I guess what's puzzling some people like me, is what the security concept behind this arrangement really brings to the table. Authenticating machines connecting to the network is indeed useful but in general only has the function to prove that the device has been accepted and possibly configured by

Re: X509 per machine (not per user) - or equivalent needed

2009-01-30 Thread Denis McCarthy
Hello Arshad, Thanks for the email. I suppose the one thing I'd like to stress again is that we wish to authenticate a machine, not a user. Many users may log in to a certain machine (via a username and password that we would issue). What we need to do on our system is to ensure that the user loggi