Re: ocsp check problem: sec_error_bad_database

2010-03-16 Thread Nelson Bolyard
On 2010-03-16 22:04 PST, Kyle Hamilton wrote: > Your profile's certificate and trust database appears to be corrupted, > and therefore it can't check to see if the OCSP responder's > certificate is okay. > > You'll need to quit Firefox, move the current key*.db, cert*.db, and > secmod.db files out

Re: ocsp check problem: sec_error_bad_database

2010-03-16 Thread Kyle Hamilton
Your profile's certificate and trust database appears to be corrupted, and therefore it can't check to see if the OCSP responder's certificate is okay. You'll need to quit Firefox, move the current key*.db, cert*.db, and secmod.db files out of the profile directory (to a backup location), and then

popChallengeResponse unimplemented?

2010-03-16 Thread Emmanuel Dreyfus
Emmanuel Dreyfus wrote: > popChallengeResponse seems do do what I need: > https://developer.mozilla.org/en/PopChallengeResponse > > But there is not a lot of information about that function. Is there any > sample code using it? I found the usage example I was looking for in security/nss/cmd/crm

Re: Improving SSL client auth and bad certificate reporting in non-browser applications

2010-03-16 Thread Wan-Teh Chang
Kai, Is your proposal or Aza Raskin's proposal similar to the proposal that Henry Story of the "foaf" project has been advocating? Wan-Teh -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: Improving SSL client auth and bad certificate reporting in non-browser applications

2010-03-16 Thread Eddy Nigg
On 03/17/2010 01:12 AM, Kai Engert: I'd like to announce two design documents. The primary intention is to improve the functionality of SSL client authentication in Mozilla software. In short, we'd like to stop the current prompts and implement a better user interface. Excellent effort! I

TS Request in php. TSA - Time Stamping

2010-03-16 Thread Antonio Sejas
I need to generate a "Time Stamp Request" in PHP and send it to a TSA . This is posible ? Thank you very much. -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Improving SSL client auth and bad certificate reporting in non-browser applications

2010-03-16 Thread Kai Engert
I'd like to announce two design documents. The primary intention is to improve the functionality of SSL client authentication in Mozilla software. In short, we'd like to stop the current prompts and implement a better user interface. The basic idea is to show an indicator in chrome whenever a

Re: TLS logout in Firefox

2010-03-16 Thread Robert Relyea
On 03/16/2010 03:48 AM, Jean-Marc Desperrier wrote: > Robert Relyea wrote: >>> The crypto object offers a logout method that does it. >>> > >>> http://mxr.mozilla.org/security/source/security/manager/ssl/src/nsCrypto.cpp#2875 >>> >>> > >> This will get Anders what he needs right now. (side effect,

Re: TLS logout in Firefox

2010-03-16 Thread Anders Rundgren
Jean-Marc Desperrier wrote: Robert Relyea wrote: The crypto object offers a logout method that does it. > http://mxr.mozilla.org/security/source/security/manager/ssl/src/nsCrypto.cpp#2875 > This will get Anders what he needs right now. (side effect, everything is logged out). This also m

Re: Idea for SoC-Project implementing PSS in NSS

2010-03-16 Thread Wan-Teh Chang
On Tue, Mar 16, 2010 at 10:26 AM, Jean-Marc Desperrier wrote: > > Another good SoC project might be to add support for TLS 1.2 and SHA256 > based TLS crypto suites, no ? Yes, I had the same idea :-) Following Nelson's suggestion, I noted that TLS 1.1 should be implemented first. Wan-Teh -- dev

Re: Idea for SoC-Project implementing PSS in NSS

2010-03-16 Thread Jean-Marc Desperrier
Wan-Teh Chang wrote: Implementing RSA-PSS should be a good SoC project. If it turns out to be too little work, you can always implement the related RSA-OAEP encryption. Another good SoC project might be to add support for TLS 1.2 and SHA256 based TLS crypto suites, no ? Updating the PRF to

Re: Idea for SoC-Project implementing PSS in NSS

2010-03-16 Thread Wan-Teh Chang
On Mon, Mar 15, 2010 at 11:47 AM, Wan-Teh Chang wrote: > > None of us has signed up to be a SoC mentor.  I don't know if the > deadline has passed. I just added an "NSS (Network Security Services" section to https://wiki.mozilla.org/Community:SummerOfCode10:Brainstorming I put myself as the ment

Re: TLS logout in Firefox

2010-03-16 Thread Jean-Marc Desperrier
Robert Relyea wrote: The crypto object offers a logout method that does it. > http://mxr.mozilla.org/security/source/security/manager/ssl/src/nsCrypto.cpp#2875 > This will get Anders what he needs right now. (side effect, everything is logged out). This also means that crypto.logout() is rea

Re: Replacing - A really bad idea

2010-03-16 Thread Anders Rundgren
Jean-Marc Desperrier wrote: Robert Relyea wrote: I would certainly be happy to look at proposals that would advance the state of technology here. A device certificate based solution could be nice. Maybe also end-to-end symetric key solutions. Finally even a standard that request a secure env

Re: TLS logout in Firefox

2010-03-16 Thread Jean-Marc Desperrier
Robert Relyea wrote: The crypto object offers a logout method that does it. > http://mxr.mozilla.org/security/source/security/manager/ssl/src/nsCrypto.cpp#2875 > This will get Anders what he needs right now. (side effect, everything is logged out). Robert, I see now that I somehow missed yes

Re: Idea for SoC-Project implementing PSS in NSS

2010-03-16 Thread Gervase Markham
On 15/03/10 18:47, Wan-Teh Chang wrote: None of us has signed up to be a SoC mentor. I don't know if the deadline has passed. No relevant deadlines have passed :-) If someone in this group wants to offer to be Hanno's mentor, then Hanno can put that information in his application and we will

Re: Replacing - A really bad idea

2010-03-16 Thread Jean-Marc Desperrier
Robert Relyea wrote: I would certainly be happy to look at proposals that would advance the state of technology here. A device certificate based solution could be nice. Maybe also end-to-end symetric key solutions. Finally even a standard that request a secure environment is useful. Standar

Re: Cipher not picked/enabled in a TLS session

2010-03-16 Thread Jean-Marc Desperrier
Gregory BELLIER wrote: As I said I would do, I looked every where in the code where the word "camellia" appears and my code is very much alike. I really don't know. Did you have a look at a Wireshark capture of it ? -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists