Re: ECDHE ephemeral keys not really ephemeral?

2014-08-14 Thread Jean-Marc Desperrier
m...@joachim-bauch.de a écrit : the function "ssl3_CreateECDHEphemeralKeys" in "nss/lib/ssl/ssl3ecc.c" doesn't really create ephemeral keys, but caches the keys per curve for the whole lifetime of the application. This leads to the same keypair being used for all connections that use the same cur

Re: Chrome: From NSS to OpenSSL

2014-04-08 Thread Jean-Marc Desperrier
Ryan Sleevi a écrit : That was an interesting rant, thanks. reliance on PKCS#11 means that there are non-trivial overheads when doing something as "simple" as hashing with SHA-1. For something that is such a "simple" transformation, multiple locks must be acquired and the entire NSS internals m

Re: ECDSA support in Thunderbird

2013-03-07 Thread Jean-Marc Desperrier
Robert Relyea a écrit : - Original Message - On Tue, 2013-02-26 at 17:05 -0500, Robert Relyea wrote: >> http://pki.fedoraproject.org/wiki/ECC_Capable_NSS Isn't it about time Red Hat started shipping non-crippled versions? RFC 6090 is two years old now... It's never been a technical

Re: VISA drops the password and replaces it with - NOTHING

2012-08-02 Thread Jean-Marc Desperrier
Anders Rundgren a écrit : http://www.finextra.com/news/announcement.aspx?pressreleaseid=45624 Current platforms are useless for banking so what else could they do? What role does the password serve here, except forcing me to create an unrequired account by every merchant I decide to use ? --

Re: Google about to fix the CRL download mechanism in Chrome

2012-02-22 Thread Jean-Marc Desperrier
Erwann Abalea a écrit : Who will come with a "12-dan black" bar UI? That's a joke on the fact it goes full-cycle at 12-dan and we're back to a white belt, right ? But double-width, so you *can* tell the difference with the normal white bar ;-) -- dev-tech-crypto mailing list dev-tech-crypto@

Re: Google about to fix the CRL download mechanism in Chrome

2012-02-22 Thread Jean-Marc Desperrier
Erwann Abalea a écrit : if Google could come up with an efficient mechanism so that revocation is really checked, that's cool. The "less than 100k" is a challenge, I'd like to see how it will be solved The more since all those random serial numbers can't be compressed. I wonder if he wasn't mi

Google about to fix the CRL download mechanism in Chrome

2012-02-08 Thread Jean-Marc Desperrier
Hi, Google just published the changes they are about to do in the revocation checking in Chrome : http://www.imperialviolet.org/2012/02/05/crlsets.html In my opinion, maybe somewhat opposite to the way they describe it, fundamentally they are not *at* *all* changing the standard PKI method o

Re: What exactly are the benefits of libpkix over the old certificate path validation library?

2012-01-05 Thread Jean-Marc Desperrier
Robert Relyea a écrit : On 01/04/2012 05:56 PM, Brian Smith wrote: > Robert Relyea wrote: >> On 01/04/2012 04:18 PM, Brian Smith wrote: >> In the cases where you fetch the intermediates, the old code will not >> work! [...] I'm talking about fetching intermediates themselves because they

Re: What exactly are the benefits of libpkix over the old certificate path validation library?

2012-01-05 Thread Jean-Marc Desperrier
Brian Smith a écrit : 3. libpkix can enforce certificate policies (e.g. requiring EV policy OIDs). Can the non-libpkix validation? EV policy have been defined in a way that means they could be supported by a code that handles an extremely tiny part of all what's possible with RFC5280 certific

Re: What exactly are the benefits of libpkix over the old certificate path validation library?

2012-01-05 Thread Jean-Marc Desperrier
Robert Relyea a écrit : 7. libpkix can actually fetch CRL's on the fly. The old code can only use CRL's that have been manually downloaded. We have hacks in PSM to periodically load CRL's, which work for certain enterprises, but not with the internet. PSM's periodic CRL download's certainly qui

Re: HTML KEYGEN element not working with ECC keys

2011-11-29 Thread Jean-Marc Desperrier
Scott Thomas a écrit : but the keys are not generated. i have checked that ECC support from mozilla was removed, can any body confirm it or tell the way how to enable it, ? https://bugzilla.mozilla.org/show_bug.cgi?id=367577 Ideas / thoughts ?? Well as you've seen in the bug, it's all about l

Re: Unable to generate ECC signature keys with crypto.generateCRMFRequest

2011-07-20 Thread Jean-Marc Desperrier
Brian Smith wrote: https://bugzilla.mozilla.org/show_bug.cgi?id=367577 You need a custom build of NSS, with NSS_ECC_MORE_THAN_SUITE_B=1 e.g.: The beef of the bug is the following in Nelson's comment : "Based on http://www.ietf.org/ietf/IPR/certicom-ipr-rfc-3446.pdf, some of the contributors h

Re: DOMCrypt API developments

2011-06-20 Thread Jean-Marc Desperrier
Anders Rundgren wrote: The webcrypto-api proposal is oriented around certificate/X509/smartcard > PKI, I end up with the feeling the two proposal lives in different realms. http://html5.creation.net/webcrypto-api Thanx J-M, I wasn't aware of this one. H**y c**p! Somebody is actually doing s

Re: DOMCrypt API developments

2011-06-17 Thread Jean-Marc Desperrier
David Dahl wrote: I find this API effort very interesting, however I'm left with the > feeling you wish to leave out the use of PKI elements. > A really neutral API would work both with and without PKI. Public Key crypto is actually the main use case of this API. I meant more certificate/X50

Re: DOMCrypt API developments

2011-06-14 Thread Jean-Marc Desperrier
David Dahl wrote: From: "L. David Baron" On Monday 2011-06-13 15:31 -0700, David Dahl wrote: In trying to get the word out about a browser crypto API I am championing (see: https://wiki.mozilla.org/Privacy/Features/DOMCryptAPISpec/Latest ), I wanted to post here for feedback and criticism.

Re: Announcing an experimental public S/MIME keyserver

2011-06-10 Thread Jean-Marc Desperrier
Kai Engert wrote: I'm thinking the following could solve the problem Please help me: which problem is it, that you want to solve, that isn't yet solved by the current implementation? Ease of use, understandability of the process for the average user. Average users fills a form, and that's al

Re: Announcing an experimental public S/MIME keyserver

2011-06-08 Thread Jean-Marc Desperrier
Kai Engert wrote: > Another short note: The problem with solely distributing the S/MIME > certs is that a MUA does not have the S/MIME capabilities of the cert > owner's MUA. So the sender MUA might choose a weak symmetric cipher. > ... > So the safest way is still to send a signed e-mail fo

Re: Announcing an experimental public S/MIME keyserver

2011-06-08 Thread Jean-Marc Desperrier
Kai Engert wrote: - the keyserver will extract the cert from the email, and will store both email and cert locally Is the script smart enough to identify and extract the encryption certificate in the mail when the sender uses separate signature and encryption certificates ? (and of course

Re: Mixed HTTPS/non-HTTPS content in IE9 and Chrome 13 dev

2011-05-27 Thread Jean-Marc Desperrier
On 18/05/2011 19:25, Brian Smith wrote: No, he meant dev.security I could have been more explicit. and he cross-posted and set the follow-up header on his message to point to that newsgroup. I agree that if there's any discussion, it can/should happen there. But my message ended up with an

Re: Mixed HTTPS/non-HTTPS content in IE9 and Chrome 13 dev

2011-05-18 Thread Jean-Marc Desperrier
Brian Smith wrote: See https://twitter.com/#!/scarybeasts/status/69138114794360832: "Chrome 13 dev channel now blocks certain types of mixed content by default (script, CSS, plug-ins). Let me know of any significant breakages." See https://ie.microsoft.com/testdrive/browser/mixedcontent/assets/w

Re: Policy Update Discussion: Third-Party SubCAs

2011-04-28 Thread Jean-Marc Desperrier
Robert Relyea wrote: One interesting historical note is the final solution was based on a suggestion of one Jean-Marc Desperrier;). Well, when rereading that bug to check it all, I mistakenly thought that NSS 3.9 was the first version with libpkix and that the change only applied to libpkix

Re: Policy Update Discussion: Third-Party SubCAs

2011-04-27 Thread Jean-Marc Desperrier
Jean-Marc Desperrier wrote: Johan Sys wrote: [...] We did some tests with name constraints with positive results: SubCA with name constraint as follows : Permitted [1]Subtrees (0..Max): DNS Name=.goodcompany.globalsign Excluded=None Issued cert www.goodcompany.globalsign passes. Anything else

Re: Certificate Problem in FF 4

2011-04-11 Thread Jean-Marc Desperrier
Dad wrote: This reply from the user: - As for the solution this is still a bug as i shouldnt need to import any sort of "temp fix" for it to work. It is not a server misconfiguration and t

Re: Certificate Problem in FF 4

2011-04-09 Thread Jean-Marc Desperrier
On 08/04/2011 19:31, Jay Garcia wrote: Now let's see what turns up. At this point, I can not reproduce the problem. https://www.ausnetservers.net.au/webmail (as well as the others) forwards to vps-serv-1.ausnetservers.net.au that times out. However this happens after I've added the exceptio

Re: Certificate Problem in FF 4

2011-04-08 Thread Jean-Marc Desperrier
This should be on crypto, not security, transferring. I have an hard time testing it fully because of time-outs on vps-serv-1.ausnetservers.net But the problem seems to be : - With Firefox 4, adding an exception for a cert on domain X prevents from continuing to accept this cert as valid on dom

Re: TLS-SRP (was Re: J-PAKE in NSS)

2011-03-09 Thread Jean-Marc Desperrier
Brian Smith wrote: An augmented PAKE user authentication protocol might be very useful for some things, but TLS-SRP seems very troublesome. IIRC, there are at least four deal-breaking problems with TLS-SRP as a substitute for PKI: I don't see it as a substitute for PKI, only as a substitute for

Re: J-PAKE in NSS

2011-03-07 Thread Jean-Marc Desperrier
Brian Smith wrote: "Jean-Marc Desperrier" wrote: [...] (I'd expect it instead to leave the AES256 key inside NSS and just get back the handle to it to encrypt what it needs later. [...]). > The kind of improvement you described above will be made to resolve > Bug 443

Re: J-PAKE in NSS

2011-03-01 Thread Jean-Marc Desperrier
Robert Relyea wrote: > So the end result : I see that J-PAKE code got included inside NSS > https://bugzilla.mozilla.org/show_bug.cgi?id=609076 with a layer to > access it from js (bug 601645). This was not announced here, and even > if it looked like Sync Would keep J-PAKE, I did not imagin

Re: Freezing and making available to js the mp_int bignum package API

2011-03-01 Thread Jean-Marc Desperrier
Robert Relyea wrote: About the only use I could reasonable see for it would be to support PKCS #11 modules. The other use would be as an optimized base for a big num implementation, and that's what the original distribution says : "ANSI C code library that performs arbitrary precision integer

Freezing and making available to js the mp_int bignum package API

2011-02-28 Thread Jean-Marc Desperrier
Hi, There was some talk last october about accessing the mp_int API from javascript, and so freezing it in order to make it available as a frozen API. Nelson concluded that the one difficult point would be to freeze the mpdigit structure, since it currently has machine/processor-version dep

J-PAKE in NSS

2011-02-28 Thread Jean-Marc Desperrier
For context, from a message I wrote in last October : Given the number of protocols that include SRP (SSL/TLS, EAP, SAML), given that there's already a proposed patch for NSS (bug 405155, bug 356855), a proposed patch for openssl ( http://rt.openssl.org/Ticket/Display.html?id=1794&user=guest&pass

Re: NSS in Summer of Code?

2011-02-25 Thread Jean-Marc Desperrier
Gervase Markham wrote: Are any of you interested in submitting a proposal for a Summer of Code project for Bugzilla this year, and mentoring it? https://wiki.mozilla.org/Community:SummerOfCode11:Brainstorming NSS has done several projects in the past (recently, RSA-PSS signatures and some TLS im

Re: Thunderbird crashing when C_SignInit returns other than CKR_OK

2010-12-20 Thread Jean-Marc Desperrier
On 19/12/2010 09:56, Marsh Ray wrote: Can you build it against the compiler's CRT if you want to? Yes, it's an option in the build process. But you must not mix with anything that was built with the other value, for example extensions with binary components. -- dev-tech-crypto mailing list d

Re: A dedicated SSL MITM box on the market

2010-11-22 Thread Jean-Marc Desperrier
Jean-Marc Desperrier wrote: Especially the certlock Firefox extension they propose, which builds upon Kaie's Conspiracy, but does something more sophisticated. > Unfortunately it seems it has not been made publicly available until now. Coming back on that old message to say I just

Re: Plan B for J-PAKE in Fennec B3 / Firefox B9 -- exposing MPI to Firefox for one beta cycle

2010-11-19 Thread Jean-Marc Desperrier
Robert Relyea wrote: We do not support a binary compatible big num library interface, and that's what adding the symbols to freebl is saying. One month ago Nelson said he wasn't in principle against doing that, taking into account making it cleanly definitively requires more work and thinking

Re: Moderator note: Happy Day - newsgroup moderation has begun

2010-11-15 Thread Jean-Marc Desperrier
On 11/11/2010 07:24, Nelson B wrote: Today, there's no doubt. Moderation is really in effect. Great to see that as I'm coming back online after a two weeks break. [...] Finally I can be confident that readers of this list will not be receiving spam through it ... (I think) And the people

Re: Usage of FreeBL and FreeBL/mpi through JavaScript in Firefox 4 Sync

2010-10-28 Thread Jean-Marc Desperrier
Nelson B Bolyard wrote: [...] It because none of them: J-PAKE, SPEKE, SRP, or for that matter, good old CRAM-MD5 address the NUMBER ONE problem with passwords. > PHISHING. They are a very significant progress with regard to that actually. What do JPAKE, SPEK

Re: Invalide certificate encoding crashing certutil [Re: Thunderbird: "Could not verify this certificate for unknown reasons"]

2010-10-28 Thread Jean-Marc Desperrier
Nelson B Bolyard wrote: Please don't file a bug without a stack trace showing the crash is in NSS. [...] If the back trace shows the crash is not in NSS, but in some other library, please direct the bug report accordingly. The report is that the crashs is inside NSS's certutil, Nelson. As Thun

Re: Invalide certificate encoding crashing certutil [Re: Thunderbird: "Could not verify this certificate for unknown reasons"]

2010-10-26 Thread Jean-Marc Desperrier
Matej Kurpel wrote: However, how does a printable string differ from utf8string (and other strings, particularly ia5string) when there are no non-ascii characters? Do you think it's a bug in NSS...? printable string basically allows only the alphabet and numeric characters. ia5string allows al

Invalide certificate encoding crashing certutil [Re: Thunderbird: "Could not verify this certificate for unknown reasons"]

2010-10-26 Thread Jean-Marc Desperrier
Matej Kurpel wrote: In the Type field for S:, O:, OU: and CN: I always provided 0x0c which is utf-8 string, but in the certificate there was 0x13 - printable string. After I changed it - voila, it's working in Thunderbird, and certutil doesn't crash anymore. It sounds like a serious bug. Could

Re: J-PAKE (was Re: Usage of FreeBL and FreeBL/mpi through JavaScript in Firefox 4 Sync)

2010-10-25 Thread Jean-Marc Desperrier
Brian Smith wrote: A balanced scheme is actually better for Sync because we are asking the user to read a code from the screen of device 1 and type it into device 2. Both devices need the same psssword/PIN. The augmented scheme of SRP can be degraded to a balanced scheme if you need. It's triv

Re: Usage of FreeBL and FreeBL/mpi through JavaScript in Firefox 4 Sync

2010-10-25 Thread Jean-Marc Desperrier
Brian Smith wrote: Nelson B Bolyard wrote: [...] I'm talking about putting JBAKE (or whatever it is) into the base product. [...] Is there something specific about J-PAKE that you think is bad or worse than some alternative? Are you objecting to J-PAKE because you do not trust the proof

Re: Usage of FreeBL and FreeBL/mpi through JavaScript in Firefox 4 Sync

2010-10-24 Thread Jean-Marc Desperrier
On 22/10/2010 19:07, Brian Smith wrote: > Speaking only for myself, I have no objection to offering the mp_int > bignum API as a "public" API out of freebl3. If people are open to having the J-PAKE building blocks in FreeBL, then we wouldn't need MPI to be part of the public API. The main conc

Re: J-PAKE (was Re: Usage of FreeBL and FreeBL/mpi through JavaScript in Firefox 4 Sync)

2010-10-23 Thread Jean-Marc Desperrier
Brian Smith wrote: "Jean-Marc Desperrier" wrote: Why are you choosing J-PAKE instead of SRP ? > The J-PAKE authors claim they developed J-PAKE to avoid patents that cover other algorithms, and they claim they won't patent it. I don't know if either claim is true or not.

Re: Usage of FreeBL and FreeBL/mpi through JavaScript in Firefox 4 Sync

2010-10-22 Thread Jean-Marc Desperrier
Philipp von Weitershausen wrote: Not sure how generic the signature of the zero knowledge proof we use in J-PAKE is. Compatibility with the implementation found in OpenSSL is important for us right now Hi, Why are you choosing J-PAKE instead of SRP ? Looking for an assessment of J-PAKE agains

Re: Support for SSL False Start in Firefox

2010-10-08 Thread Jean-Marc Desperrier
Stephen Shankland wrote: I've now located the blacklist file, which at present has 661 sites blacklisted, so I suspect you guys are right on that basis, too. The way it was written on Langley's blog, one could easily think they had used the method of calculation that gave a better looking perc

Re: Signature with a privatekey doesn't works in JSS

2010-10-08 Thread Jean-Marc Desperrier
Felix Alejandro Prieto Carratala wrote: I also try this: [...] //pk is a org.​mozilla.​jss.​crypto.PrivateKey that i get with //CryptoManager.findPrivKeyByCert(cryptoManager.findCertByNickname(nickName)); Why is that line commented out ? Do you test you get a valid pk handle out of findPrivKey

Support for SSL False Start in Firefox

2010-10-05 Thread Jean-Marc Desperrier
Hi, Google is currently communicating about how they will use SSL False Start to "accelerate the web", even if it means breaking a small fraction of incompatible site (they will use a black list that should mitigate most of the problem). See http://news.cnet.com/8301-30685_3-20018437-264.html

Re: ReferenceTable overflow (max=512)

2010-08-22 Thread Jean-Marc Desperrier
On 19/08/2010 22:44, Nelson B Bolyard wrote: Support for NSS on device OSes (such as cell phone OSes) is provided by various teams that are adapting Firefox to run on those devices. Mozilla has a team that does that and I suspect they could help you Maybe they couldn't. That's a JSS problem, a

Re: Odp: Re: JSS in Firefox - loading applets over mutual SSL stopped working since the v. 3.6.x

2010-07-13 Thread Jean-Marc Desperrier
waldemar.ko...@max.com.pl wrote: Unfortunately i don't :( and it's out of http://releases.mozilla.org/pub/mozilla.org/firefox/releases/. Could you provide me with the link if it exists elsewhere ? It's here : ftp://ftp.mozilla.org/pub/mozilla.org/firefox/releases/ But the fact http://ftp.mozi

Re: Thunderbird problem with the search for certificates in the S-TRUST trust list service

2010-06-10 Thread Jean-Marc Desperrier
Nelson B Bolyard wrote: Fame and Glory await.:-) Which means a mention in http://www.mozilla.org/credits/ or about:credits : We would like to thank our contributors, whose efforts make this software what it is. [...] Any such contributors who wish to be added to the list should send mail

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-19 Thread Jean-Marc Desperrier
Marsh Ray wrote: What do you propose other than not letting the user bypass the cert error page at all? Investing some serious time enhancing those errors. Or investing some serious time evangelising the SSL site owners into using a real certificate. But the statu quo doesn't work. Anothe

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-19 Thread Jean-Marc Desperrier
Eddy Nigg wrote: Isn't this actually a sign that the technology works? I mean, 100% false positives means literally 100% success. Shit no ! The higher the false positive rate, the more acute the failure. People will trust and respect the warning *only* if there's a very low rate of false pos

Re: multiple certificate selection dailogs

2010-05-19 Thread Jean-Marc Desperrier
Šandor Feldi wrote: I do get multiple certificate selection dialogs in sequence at SSL session start...so I have to reselect the same cert, say twice... I enter the https of the target site, I get asked about the cert - I select it, then the site displays my info and offers me an>enter site< bu

Re: Can I add more than one e-mail addresses as subjAltName extionsion in X.509 cert

2010-05-17 Thread Jean-Marc Desperrier
Eddy Nigg wrote: - Do other applications (like thunderbird and other mail), would make sure that they search through all the e-mail addresses to look for a match? Yes, this appears to be the case. IIRC, they do but they are some place where only one adresse will be printed, the first of the

Re: Alerts on TLS Renegotiation

2010-04-12 Thread Jean-Marc Desperrier
On 12/04/2010 15:29, Eddy Nigg wrote: updated servers need updates clients and break older ones, whereas old servers will not allow new clients. I haven't seen one yet, that doesn't have a flag to accept older clients. If you set that flag, *and* disable renegotiation at least for older clien

Re: S/MIME interop issue with Outlook 2010 beta

2010-04-10 Thread Jean-Marc Desperrier
On 31/03/2010 17:11, Kaspar Brand wrote: On 31.03.2010 07:49, Michael Ströder wrote: It seems it's a CMS structure and recipientInfos contains subject key ids instead of issuerAndSerialNumber. It seems Seamonkey 2.0.x does not support that. Is it supported by the underlying libs? I believe so,

Re: Domain-validated name-constrained CA certificates?

2010-04-07 Thread Jean-Marc Desperrier
Matt McCutchen wrote: On Apr 6, 5:54 am, Jean-Marc Desperrier wrote: > Matt McCutchen wrote: > > An extended key usage of "TLS Web Server Authentication" on the > > intermediate CA would constrain all sub-certificates, no? > > You are here talkin

Re: Domain-validated name-constrained CA certificates?

2010-04-06 Thread Jean-Marc Desperrier
Matt McCutchen wrote: A name-constrained intermediate certificate could be quite convenient for the large organizations that are presently demanding their users to trust private CAs for the whole Web (see bug 501697). Ah ! The direction of restricting people who currently use sub-CA for their

Re: Domain-validated name-constrained CA certificates?

2010-04-06 Thread Jean-Marc Desperrier
Matt McCutchen wrote: An extended key usage of "TLS Web Server Authentication" on the intermediate CA would constrain all sub-certificates, no? You are here talking about a proprietary Microsoft extension of the X509 security model. -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozill

Re: Domain-validated name-constrained CA certificates?

2010-04-04 Thread Jean-Marc Desperrier
On 04/04/2010 08:32, Matt McCutchen wrote: [...] It would be great if a Mozilla-recognized CA would be willing to give me, as the registrant of mattmccutchen.net, an intermediate CA certificate with a critical name constraint limiting it to mattmccutchen.net. I don't believe this taking a hamme

Re: Alerts on TLS Renegotiation

2010-04-03 Thread Jean-Marc Desperrier
On 02/04/2010 18:25, johnjbarton wrote: The appropriate way to address this security problem starts by contacting the major providers of server software There's no need to contact them, they are well aware of the problem. AFAIK they have all already issued the necessary updates. It's the sites

Re: Improper SSL certificate issuing by CAs

2010-04-02 Thread Jean-Marc Desperrier
Kurt Seifried wrote: Is this another 1st of April joke? At least your timing is a bit > questionable;-) No this is not an April fools joke. The PDF at Linux Magazine is what will be in the print copy (due out in 3 weeks I believe) Kurt, the best group for sending this and also to continue the

Re: Alerts on TLS Renegotiation

2010-04-02 Thread Jean-Marc Desperrier
johnjbarton wrote: Closely related to bug 554594 is https://bugzilla.mozilla.org/show_bug.cgi?id=535649 Web developers using Firefox Error Console or tools like Firebug that use nsIConsoleService are now bombarded with pointless messages like: services.addons.mozilla.org : potentially vulnerabl

Re: Using of HTML keygen element

2010-03-30 Thread Jean-Marc Desperrier
Eddy Nigg wrote: On 03/30/2010 01:23 PM, Jean-Marc Desperrier: And making more obvious that keygen is not a good long term solution is a very good thing. Only in case the alternative will be supported by all or most browsers. The original message shows that the fact keygen imposes a text of

Re: Using of HTML keygen element

2010-03-30 Thread Jean-Marc Desperrier
The most adequate group for this discussion would be mozilla.dev.tech.crypto I agree than enhancing generateCRMFRequest to let it generate a more usual format instead of only CRMF would be a big step forward. And making more obvious that keygen is not a good long term solution is a very good

Re: A dedicated SSL MITM box on the market

2010-03-29 Thread Jean-Marc Desperrier
Jean-Marc Desperrier wrote: Article on Wired here : http://www.wired.com/threatlevel/2010/03/packet-forensics/ The original article is well worth reading also : http://files.cloudprivacy.net/ssl-mitm.pdf Especially the certlock Firefox extension they propose, which builds upon Kaie&#

Re: no release tarball for 3.12.6

2010-03-29 Thread Jean-Marc Desperrier
Hanno Böck wrote: [...] Firefox release source bundles nss, but it's good linux distribution policy to avoid bundled libraries, so this shouldn't happen. Maybe in general, but in this case what you really want is the NSS version that's used by Firefox. I think what the process guarantees is

Re: no release tarball for 3.12.6

2010-03-27 Thread Jean-Marc Desperrier
On 27/03/2010 11:59, Hanno Böck wrote: I'm not sure if you're aware of that issue, but as firefox 3.6.2 needs nss 3.12.6 and there's no release tarball yet You are two days late : https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_12_6_RTM/src/ Dated from the 25 of march. --

Re: SHA256 certificate support in Firefox.

2010-03-21 Thread Jean-Marc Desperrier
On 20/03/2010 03:01, Mountie Lee wrote: the CertificateVerify step of SSL handshaking procedure does not support SHA256 in current firefox. right? As Wan-Teh said a little above, supporting this requires TLS1.2, which is not implemented today in NSS, the cryptographic library used by Firefox.

Re: Cipher not picked/enabled in a TLS session

2010-03-19 Thread Jean-Marc Desperrier
Gregory BELLIER wrote: Jean-Marc Desperrier a écrit : Wan-Teh Chang wrote: You can use the NSS command-line tool 'ssltap' to inspect the SSL handshake messages:http://www.mozilla.org/projects/security/pki/nss/tools/ssltap.html It's significantly easier to do it with Wireshark.

Re: Cipher not picked/enabled in a TLS session

2010-03-17 Thread Jean-Marc Desperrier
Wan-Teh Chang wrote: You can use the NSS command-line tool 'ssltap' to inspect the SSL handshake messages:http://www.mozilla.org/projects/security/pki/nss/tools/ssltap.html It's significantly easier to do it with Wireshark. -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org http

Re: Idea for SoC-Project implementing PSS in NSS

2010-03-17 Thread Jean-Marc Desperrier
Wan-Teh Chang wrote: Please use the official page instead: https://wiki.mozilla.org/Community:SummerOfCode10 But only when a mentor can be immediately identified ! I have another idea, but I don't believe any sponsor/mentor can be found. The S/MIME code in Thunderbird was written before an S/

Re: popChallengeResponse unimplemented?

2010-03-17 Thread Jean-Marc Desperrier
Emmanuel Dreyfus wrote: So as I understand, it is not implemented yet. This is a quite disapointing, since the documentation does suggests it is fully supported. This should be updated. Just get a login on MDC :-) Now that I wrote the code in C for producing a base64 encoded popChallengeRespo

Re: Idea for SoC-Project implementing PSS in NSS

2010-03-16 Thread Jean-Marc Desperrier
Wan-Teh Chang wrote: Implementing RSA-PSS should be a good SoC project. If it turns out to be too little work, you can always implement the related RSA-OAEP encryption. Another good SoC project might be to add support for TLS 1.2 and SHA256 based TLS crypto suites, no ? Updating the PRF to

Re: TLS logout in Firefox

2010-03-16 Thread Jean-Marc Desperrier
Robert Relyea wrote: The crypto object offers a logout method that does it. > http://mxr.mozilla.org/security/source/security/manager/ssl/src/nsCrypto.cpp#2875 > This will get Anders what he needs right now. (side effect, everything is logged out). This also means that crypto.logout() is rea

Re: TLS logout in Firefox

2010-03-16 Thread Jean-Marc Desperrier
Robert Relyea wrote: The crypto object offers a logout method that does it. > http://mxr.mozilla.org/security/source/security/manager/ssl/src/nsCrypto.cpp#2875 > This will get Anders what he needs right now. (side effect, everything is logged out). Robert, I see now that I somehow missed yes

Re: Replacing - A really bad idea

2010-03-16 Thread Jean-Marc Desperrier
Robert Relyea wrote: I would certainly be happy to look at proposals that would advance the state of technology here. A device certificate based solution could be nice. Maybe also end-to-end symetric key solutions. Finally even a standard that request a secure environment is useful. Standar

Re: Cipher not picked/enabled in a TLS session

2010-03-16 Thread Jean-Marc Desperrier
Gregory BELLIER wrote: As I said I would do, I looked every where in the code where the word "camellia" appears and my code is very much alike. I really don't know. Did you have a look at a Wireshark capture of it ? -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists

Re: TLS logout in Firefox

2010-03-15 Thread Jean-Marc Desperrier
Nelson B Bolyard wrote: When the user says "I want to clear my current session", which of those SSL sessions does he mean? The server whose name appear in his URL bar. > Anyway if PSM does not expose a jave script method for accessing the > clear cache command, I'm sure kai or myself would be

Re: Another protection layer for the current trust model

2010-03-04 Thread Jean-Marc Desperrier
Nelson B Bolyard wrote: it has exposed an unrelenting amount of accusation without evidence. Show us a single falsified certificate. Anything less is unworthy of this forum. A large amount of that. But not necessarily exclusively. There is in what has been reported one fact that has merit to

Re: Problems importing PKCS #12 client certs

2010-03-04 Thread Jean-Marc Desperrier
Chris Hills wrote: Perhaps there is place for a fork of firefox (perhaps an "enterprise" version) that uses the windows certificate store and dispenses with the local certificate store. I understand that support for MSI installation is already being worked on. I think it would make much, much m

Re: S/MIME in Thunderbird

2010-03-03 Thread Jean-Marc Desperrier
Gregory BELLIER wrote: Ok, so it's still sha1 by default for S/Mime ? Is it also sha1 by default for TLS ? TLS depends on the cipher-suites, and fortunately it's not hard-coded. Unfortunately, the first cipher suites using SHA256 are the one defined in TLS1.2 (RFC5246), and I believe the supp

Re: Does anyone make Mozilla JSS 4.3.1/NSS 3.12.4 work at Android ?

2010-02-22 Thread Jean-Marc Desperrier
Wan-Teh Chang wrote: But Michael Wu of Mozilla just started porting NSPR to Android. So I expect NSS will be ported to Android soon. Sorry if that's slightly off-topic, but what crypto layer does the Androïd browser use then ? -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org

Re: Fix for the TLS renegotiation bug

2010-02-20 Thread Jean-Marc Desperrier
On 20/02/2010 03:25, Eddy Nigg wrote: Apache performs a renegotiation when none is needed when configuring client authentication at a particular location, is there a logical explanation for that? Or even considered correct implementation? Yes, there's a logical explanation and Apache is doing n

Re: Fix for the TLS renegotiation bug

2010-02-19 Thread Jean-Marc Desperrier
Eddy Nigg wrote: Trying the different sub domain trick doesn't work on the same server but different host and IP. I assume that's because the server reuses the cached SSL session and initiates a renegotiation upon certificate authentication. Does that make sense so far? I just tried configuring

Re: List/remove cached S/MIME capabilities

2010-02-19 Thread Jean-Marc Desperrier
Michael Ströder wrote: This is because some influential people consider: > * S/MIME caps are just a part of "mail security protocol" Which is IMO complete non-sense. Yes, and I don't believe this is the major reason why it's not possible in Seamonkey/Thunderbird. The main reason is that

Re: Fix for the TLS renegotiation bug

2010-02-19 Thread Jean-Marc Desperrier
Eddy Nigg wrote: Trying the different sub domain trick doesn't work on the same server but different host and IP. Let me phrase this explicitly : - You use only one Apache instance - You configured two virtual hosts inside that instance - Then : - either each virtual host listens on

Re: Fix for the TLS renegotiation bug

2010-02-17 Thread Jean-Marc Desperrier
Eddy Nigg wrote: On 02/14/2010 07:28 PM, Daniel Veditz: [...] Firefox settings are currently extremely permissive, [...] it's breaking the client certificate authentication of a couple of ten thousands of active user accounts at StartSSL. I take it as a reward for being the only CA protecting

MDC : NSS_cryptographic_module : No doc on NSC_ModuleDBFunc

2010-02-08 Thread Jean-Marc Desperrier
Hi, On https://developer.mozilla.org/en/NSS_reference/NSS_cryptographic_module page, there's a link for NSC_ModuleDBFunc but it points nowhere. Was the doc never written, or did it get lost in some reorganization of the site ? -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.or

Re: My new role in 2010

2010-01-19 Thread Jean-Marc Desperrier
Nelson B Bolyard wrote: For over 13 years now I've been employed to work full time as a developer of NSS and NSPR, but beginning in January 2010, I shall have a new job where NSS is not part of my job description. Good luck in that, Nelson. -- dev-tech-crypto mailing list dev-tech-crypto@lists.

Re: S/MIME with SHA-256

2009-12-09 Thread Jean-Marc Desperrier
Michael Ströder wrote: Against which component? Product: MailNews Core Component: Security: S/MIME A smart thing to do would be to test also Trustedbird http://www.trustedbird.org and open a bug on their bug system if it fails. They are much more likely to fix this than anyone else. And por

Re: S/MIME with SHA-256

2009-12-08 Thread Jean-Marc Desperrier
Michael Ströder wrote: I switched back to use SHA-1 and the very same e-mails are now correctly validated in Seamonkey 1.1.18 and 2.0. So they were not before ? So you already know the answer ? And should open a bug :-) -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https:

Re: cert extension: authority key identifier (AKI)

2009-11-24 Thread Jean-Marc Desperrier
Ian G wrote: E.g., if you have an MD5 problem, you are facing an entire recreation. What do you call an MD5 problem ? In fact, as your trust in the root CA doesn't rely on it's signature it's not truly a problem if it's signed using MD5. And the sub-CAs can be resigned using SHA-1, keeping

Re: Building NSS for OpenCSW (Solaris)

2009-11-24 Thread Jean-Marc Desperrier
Maciej Bliziński wrote: I'd like to pass the -L and -R flags via environment variables For anyone else, CSW packages use this to tell the builds to use /opt/csw/lib to locate their dependencies. What's the best way to make the NSS build read LDFLAGS and LD_OPTIONS? That's a very valid que

Re: cert extension: authority key identifier (AKI)

2009-11-24 Thread Jean-Marc Desperrier
Nelson B Bolyard wrote: CAs that make this mistake typically have to abandon and completely replace their entire PKI (entire tree of issued certificates) when a CA cert expires and its serial number appears in the AKI of other subordinate certs. More than once I've seen entire corporate PKIs hav

Re: cert extension: authority key identifier (AKI)

2009-11-24 Thread Jean-Marc Desperrier
Eddy Nigg wrote: Interestingly I /think/ NSS is the only library which really has a problem with it, to all of my knowledge (and I might be wrong with that) You might. Openssl (therefore mod_ssl, etc.) also has a problem when it doesn't match. I think most other library also have a problem wit

Re: Default {cert8, key3} db internals: lg_GetPublicKey()->nsslowkey_ConvertToPublicKey()

2009-11-16 Thread Jean-Marc Desperrier
Robert Relyea wrote: Seriously, these issues, are design issues with the database format itself. The fix is the new database format. Perhaps I was not aggressive enough in forcing applications to move away from the old database Open a bug, as well as a thread inside mozilla.dev.apps.firefox say

Re: OCSP responder key/certificate thoughts

2009-10-16 Thread Jean-Marc Desperrier
Kyle Hamilton wrote: I'm trying to figure out how much of the OCSP slowness and server underpowering is due to the sizes of the keys used, or limitations of the HSMs (and drivers) that these systems are using. I think little, but I might be wrong. If there's really a problem at this level, I w

Re: why client certs

2009-10-08 Thread Jean-Marc Desperrier
Ian G wrote: Thing is, client certs is one of the few bright spots in security, looking forward. They remove the passwords from the equation. This forces that phisher-attacker into the "real-time MITM" space instead of the "lazy-time MITM space". No, you're wrong Ian, it's much stronger than

  1   2   3   >