Nelson B Bolyard wrote:
On 2009-07-30 19:04 PDT, Howard Chu wrote:
As far as I can see, CERT_VerifyCertName() is still vulnerable to the
embedded NUL hack that was recently published here
http://www.wired.com/threatlevel/2009/07/kaminsky/ and on slashdot. Yet
some comments in the discussion say
On 2009-07-30 19:46 PDT, Ian G wrote:
> On 31/7/09 04:29, Nelson B Bolyard wrote:
>> ... So, a name with a NULL in it will appear
>> as something like www.mybank.com\00*.badguy.org
>
>
> There must be something I am missing. Since when is a NULL a legal
> character in a domain?
Read the artic
On 31/7/09 04:29, Nelson B Bolyard wrote:
... So, a name with a NULL in it will appear
as something like www.mybank.com\00*.badguy.org
There must be something I am missing. Since when is a NULL a legal
character in a domain?
iang
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozi
On 2009-07-30 19:04 PDT, Howard Chu wrote:
> As far as I can see, CERT_VerifyCertName() is still vulnerable to the
> embedded NUL hack that was recently published here
> http://www.wired.com/threatlevel/2009/07/kaminsky/ and on slashdot. Yet
> some comments in the discussion say that Firefox 3.5 i
Wan-Teh Chang wrote:
The NSS 3.12.3.1 release is now available. The CVS tag is
NSS_3_12_3_1_RTM. You can download the source tarball
from
https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_12_3_1_RTM/src/
As far as I can see, CERT_VerifyCertName() is still vulnerable to the
On 2009-07-30 15:50 PDT, Drew wrote:
> Thank you both for your quick reply. I've gotten it working with a
> CNAME at the correct subdomain level.
>
> Out of curiosity, what's the CA and client support for SubjectAltName
> at this time?
All major desktop browsers have supported SANs for years, II
Thank you both for your quick reply. I've gotten it working with a
CNAME at the correct subdomain level.
Out of curiosity, what's the CA and client support for SubjectAltName
at this time?
On Jul 30, 2:02 pm, Eddy Nigg wrote:
> On 07/30/2009 10:22 PM, Drew:
>
> > I just upgraded to XULRunner 1
On 2009-07-30 14:21 PDT, Nelson B Bolyard wrote:
> On 2009-07-30 13:02 PDT, Eddy Nigg wrote:
>> On 07/30/2009 10:22 PM, Drew:
>>> I just upgraded to XULRunner 1.9.1, and my application is now no
>>> longer accepting my cert_override.txt. If I change my application.ini
>>> to use 1.9.0.11, it works
On 2009-07-30 13:02 PDT, Eddy Nigg wrote:
> On 07/30/2009 10:22 PM, Drew:
>> I just upgraded to XULRunner 1.9.1, and my application is now no
>> longer accepting my cert_override.txt. If I change my application.ini
>> to use 1.9.0.11, it works fine.
>>
>> I'm using a wildcard certificate (signed b
On 07/30/2009 10:22 PM, Drew:
I just upgraded to XULRunner 1.9.1, and my application is now no
longer accepting my cert_override.txt. If I change my application.ini
to use 1.9.0.11, it works fine.
I'm using a wildcard certificate (signed by GoDaddy) for *.domain.com,
but my server URL is dev.ba
The NSS 3.12.3.1 release is now available. The CVS tag is
NSS_3_12_3_1_RTM. You can download the source tarball
from
https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_12_3_1_RTM/src/
NSS 3.12.3.1 requires NSPR 4.7.4 or later.
NSS 3.12.3.1 fixes the following bugs in NSS 3.12.
On 2009-07-28 12:53 PDT, sudha panchag wrote:
>
> Hi I am trying to write a program to communicate to a smart card (Athena)
> when connected. The program must generate certificate requests and also
> generate key pair.
>
> I have been following the window.crypto functions and it is able to
> gene
On 2009-07-28 10:41 PDT, Grant Gayed wrote:
> (originally posted on the mozilla.dev.security group, was suggested to post
> here as well)
Yeah, this is the right place.
> I work on the SWT Browser, which embeds XULRunner. I've been stuck on a
> problem for a while now, and would really appreciat
13 matches
Mail list logo