Re: Signature Algorithm: sha1WithRSAEncryption in /etc/pki/tls/cert.pem

2020-04-13 Thread Ryan Sleevi
There’s a lot going on here. 1) The discussion about /etc/pki/tls/cert.pem and ca-certificates belongs with your distro 2) Assuming your distro ships the Mozilla Root Store, which few do correctly and successfully, the discussion about root certificates belongs with mozilla.dev.security.policy ins

Re: Accessing Firefox key store for signing

2019-05-24 Thread Ryan Sleevi
On Sat, May 25, 2019 at 2:03 AM Nisar Hassan wrote: > Dear Team, > > > > Is there any way we can digitally sign the transaction in a web app by > using > the certificate stored at Firefox's key store. > > Best Regards, > > Nisar Hassan > > Professional Service Engineer (PKI Department) > > Nation

Re: deactivate Web Cryptography API

2019-05-24 Thread Ryan Sleevi
On Sat, May 25, 2019 at 2:03 AM wrote: > Hello, > > we are using Firefox. But we want to deactivate the API "Web Cryptography > API". We are using an addon for this case -> "WEB API MANAGER". Our target > is to deactivate this setting without using an addon. > > Is there any possibility for our U

Re: Mozilla RSA-PSS policy

2017-11-21 Thread Ryan Sleevi
Hi Hubert, Did you mean this for https://groups.google.com/forum/#!forum/mozilla.dev.security.policy ? On Tue, Nov 21, 2017 at 9:26 AM, Hubert Kario wrote: > In response to comment made by Gervase Markham[1], pointing out that > Mozilla > doesn't have an official RSA-PSS usage policy. > > This

Re: Specifying allowed parameter encodings in Mozilla policy

2017-05-23 Thread ryan . sleevi
On Monday, May 22, 2017 at 3:58:21 AM UTC-4, Gervase Markham wrote: > On 19/05/17 17:02, Ryan Sleevi wrote: > > I support both of those requirements, so that we can avoid it on a > > 'problematic practices' side :) > > But you think this should be a policy

Re: Specifying allowed parameter encodings in Mozilla policy

2017-05-19 Thread Ryan Sleevi
I support both of those requirements, so that we can avoid it on a 'problematic practices' side :) There's a webcompat aspect for deprecation - but requiring RFC-compliant encoding (PKCS#1 v1.5) or 'not stupid' encoding (PSS) is a good thing for the Web :) On Fri, May 19, 2017 at 9:57 AM, Gervase

Re: Google's past discussions with Symantec

2017-04-27 Thread Ryan Sleevi
Apologies, autocompleted to the wrong list :) On Thu, Apr 27, 2017 at 10:51 AM, Ryan Sleevi wrote: > (Wearing a Google Hat, if only to share what has transpired) > > Symantec has recently shared in https://www.symantec.com/ > connect/blogs/symantec-ca-proposal , as wel

Google's past discussions with Symantec

2017-04-27 Thread Ryan Sleevi
(Wearing a Google Hat, if only to share what has transpired) Symantec has recently shared in https://www.symantec.com/connect/blogs/symantec-ca-proposal , as well as https://groups.google.com/d/msg/mozilla.dev.security.policy/LRvzF2ZPyeM/OpvBXviOAQAJ , a plan for what they believe is an appropriat

Re: SSL_BYPASS_PKCS11

2017-03-07 Thread Ryan Sleevi
On Tue, Mar 7, 2017 at 3:28 PM, Rob Crittenden wrote: > SSL_BYPASS_PKCS11 is marked as deprecated in ssl.h. What are the plans > on removing it? > > https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.28_release_notes https://bugzilla.mozilla.org/show_bug.cgi?id=1303224 -- dev-te

Re: RFC7512 PKCS#11 URI support

2016-04-05 Thread Ryan Sleevi
On Tuesday, April 5, 2016, Hubert Kario wrote: > On Monday 04 April 2016 12:17:08 Ryan Sleevi wrote: > > On Mon, Apr 4, 2016 at 11:32 AM, David Woodhouse > > wrote: > > > Do you even have a way for a nickname to be entered in text form, > > > such that you could

Re: RFC7512 PKCS#11 URI support

2016-04-04 Thread Ryan Sleevi
On Mon, Apr 4, 2016 at 4:09 PM, David Woodhouse wrote: > I'm perfectly happy to entertain the notion of adding new functions for > PK11_FindCertsFromURI() (et al.), but I was looking for *real* > information about whether it was actually necessary. Which you don't > seem to be able to provide with

Re: RFC7512 PKCS#11 URI support

2016-04-04 Thread Ryan Sleevi
On Mon, Apr 4, 2016 at 3:53 PM, David Woodhouse wrote: > Of course it's an API change. But as noted, it's an API *addition*, in > that it makes something work that didn't before. > > The criterion for such additions should be "if it isn't a *bad* thing > for that to start working". > > What's miss

Re: RFC7512 PKCS#11 URI support

2016-04-04 Thread Ryan Sleevi
On Mon, Apr 4, 2016 at 3:45 PM, David Woodhouse wrote: > That won't change. Unless you explicitly use a new function that > provides a URI instead of a nickname, of course. > > You will *only* get a URI from direct user input, in a situation where > a user could already feed you any kind of nonsen

Re: RFC7512 PKCS#11 URI support

2016-04-04 Thread Ryan Sleevi
On Mon, Apr 4, 2016 at 12:39 PM, David Woodhouse wrote: > > We usually reserve the term "breaks the API" for when something *used* > to work, and now doesn't. Not when a previously-failing call now > actually does something useful. No, sorry David, that's not how we've done stuff in NSS. When it

Re: RFC7512 PKCS#11 URI support

2016-04-04 Thread Ryan Sleevi
On Mon, Apr 4, 2016 at 11:32 AM, David Woodhouse wrote: > I don't see it. I still don't see *any* way for you to get a PKCS#11 > URI anywhere in the memory space of your application, unless you > specifically ask for one with a new API — or unless you take untrusted > input from the user or an edi

Re: RFC7512 PKCS#11 URI support

2016-04-04 Thread Ryan Sleevi
On Mon, Apr 4, 2016 at 11:32 AM, David Woodhouse wrote: > Do you even have a way for a nickname to be entered in text form, such > that you could "maliciously" be given a PKCS#11 URI instead of the > normal "token:nickname" form? Perhaps a user could edit a config file? > Or is it *all* selected v

Re: RFC7512 PKCS#11 URI support

2016-04-04 Thread Ryan Sleevi
On Monday, April 4, 2016, David Woodhouse wrote: > > I didn't call you a liar. I simply said that I can't see how the > statement you made could be anything but false. There are plenty of > reasons that could be the case — including my own ignorance — which > don't involve you telling a deliberat

Re: RFC7512 PKCS#11 URI support

2016-04-04 Thread Ryan Sleevi
On Apr 4, 2016 7:15 AM, "David Woodhouse" wrote: > > Ryan? > > Unless you are able to provide an explanation of how this would "break > Chrome's use of the API", I shall continue to assume that your > statement was false, and design accordingly. > > I certainly can't see how it could have any basi

Re: RFC7512 PKCS#11 URI support

2016-03-19 Thread Ryan Sleevi
On Thursday, March 17, 2016, John Dennis wrote: > On 03/17/2016 10:52 AM, Ryan Sleevi wrote: > >> On a technical front, Chrome and Firefox, as browsers, have been >> removing support for the notion of generic URIs, and investing in >> aligning on the URL spec - tha

Re: RFC7512 PKCS#11 URI support

2016-03-19 Thread Ryan Sleevi
On Thursday, March 17, 2016, David Woodhouse wrote: > > It is a fundamental part of all the major Linux desktop distributions, > and thus fairly much ubiquitous there. This is a loaded statement, but I still believe this is overstated. But I don't want to get into a "whose distro is better" pis

Re: SHA-1 with 'notAfter >= 2017-1-1'

2016-01-21 Thread Ryan Sleevi
On Tue, January 19, 2016 2:56 pm, s...@gmx.ch wrote: > Hi > > We're already having some discussions about SHA-1, but I'll split this > up into a new thread. > > The initial goal of bug 942515 was to mark certs as insecure, that are > valid 'notBefore >= 2016-01-01' (means issued to use in 2016

[ANNOUNCE] NSS 3.19.2 Release

2015-06-19 Thread Ryan Sleevi
The NSS Development Team announces the release of NSS 3.19.2 Network Security Services (NSS) is a patch release for NSS 3.19. No new functionality is introduced in this release. This release addresses a backwards compatibility issue with the NSS 3.19.1 release. Notable Changes: * In NSS 3.19.1,

Re: PKCS#11 platform integration

2015-05-12 Thread Ryan Sleevi
On Tue, May 12, 2015 9:44 am, Peter Bowen wrote: > How about an even simpler solution? Don't have p11-kit load the > PKCS#11 modules, just provide a list of paths and let the application > pass those to NSS. That way the application can choose to > transparently load modules without user int

Re: PKCS#11 platform integration

2015-05-11 Thread Ryan Sleevi
On Mon, May 11, 2015 4:09 am, David Woodhouse wrote: > I completely agree that Chrome should only ever load the modules which > are configured to be loaded into Chrome. I'm surprised you feel the > need to mention that. Because you still don't understand, despite how many ways I'm trying to say

Re: PKCS#11 platform integration

2015-05-10 Thread Ryan Sleevi
On Sun, May 10, 2015 12:57 pm, David Woodhouse wrote: > On Sun, 2015-05-10 at 12:47 -0700, Ryan Sleevi wrote: > > If the user requests NSS to load a module. It should load that module. > > And that module only. Period. > > The canonical per-user way to request an applicatio

Re: PKCS#11 platform integration

2015-05-10 Thread Ryan Sleevi
On Sun, May 10, 2015 12:31 pm, David Woodhouse wrote: > > You don't need to expose it to the sandbox to use PKCS#11 in the web > > browser. That's not how modern sandboxed browsers work. > > That sounds like a bit of a failure of the sandboxing to me. Just so I > understand what you're saying...

Re: PKCS#11 platform integration

2015-05-10 Thread Ryan Sleevi
On Sat, May 9, 2015 3:30 pm, David Woodhouse wrote: > > No, you should be able to do it w/o patching NSS. > > OK... how? > > If the Shared System Database wasn't such an utter failure, not even > being used by Firefox itself, then just installing it there would have > been a nice idea. But *not

Re: PKCS#11 platform integration

2015-05-10 Thread Ryan Sleevi
On Sat, May 9, 2015 3:30 pm, David Woodhouse wrote: > On Fri, 2015-05-08 at 15:07 -0700, Ryan Sleevi wrote: > > Yes, it should. You'll introduce your users to a host of security issues > > if you ignore them (especially for situations like Chrome). For example, > > if y

Re: PKCS#11 platform integration

2015-05-08 Thread Ryan Sleevi
On Fri, May 8, 2015 5:38 am, David Woodhouse wrote: > These days it does. Modern systems ship with p11-kit², which exists > precisely to fill that gap and provide "a standard discoverable > configuration for installed PKCS#11 modules." Your citation ( http://p11-glue.freedesktop.org/p11-kit.ht

Re: [bulk] PKCS#11 platform integration

2015-05-08 Thread Ryan Sleevi
On Fri, May 8, 2015 6:09 am, David Woodhouse wrote: > On Linux distributions it *is* the platform's > mechanism of choice for configuring PKCS#11 tokens. NSS needs to > support it if it wants to integrate with the platform properly. I'm sorry to continually push back on this, but you continue t

Re: NSS support for RFC7512 PKCS#11 URIs

2015-05-05 Thread Ryan Sleevi
On Tue, May 5, 2015 8:55 am, David Woodhouse wrote: > I'm talking about the serial numbers of the certs issued *by* the two > "My CA"s. Good to have that clarification :) Different CAs (in as much as different public keys), but with the same DER-encoded subject name (not necessarily the same DE

Re: NSS support for RFC7512 PKCS#11 URIs

2015-05-04 Thread Ryan Sleevi
On Mon, May 4, 2015 1:25 pm, David Woodhouse wrote: > Surely that's not unique? Using the above example, surely the first > certificate issued by the 2010 instance of 'My CA', and the first > certificate issued by the 2015 instance, are both going to have > identical CKA_ISSUER and CKA_SERIAL_N

Re: Remove Legacy TLS Ciphersuites from Initial Handshake by Default

2015-03-16 Thread Ryan Sleevi
On Mon, March 16, 2015 1:06 pm, Erwann Abalea wrote: > > Phase RSA1024 out? I vote for it. Where's the ballot? :) This is a browser-side change. No ballot required (the only issue *should* be non-BR compliant certificates issued before the BR effective date) https://code.google.com/p/chromium/is

Re: Remove Legacy TLS Ciphersuites from Initial Handshake by Default

2015-03-16 Thread Ryan Sleevi
On Mon, March 16, 2015 10:24 am, Erwann Abalea wrote: > Le lundi 16 mars 2015 10:29:08 UTC+1, Kurt Roeckx a écrit : > > On 2015-03-14 01:23, kim@safe-mail.net wrote: > > > Is there an agreed timeline for deprecation of the technologies listed > > in the initial posting? We should be proactive

Re: Separating Firefox crypto code into removable parts

2015-03-08 Thread Ryan Sleevi
On Sat, March 7, 2015 12:20 pm, kim.da...@safe-mail.net wrote: > Looking for comments about feasibility of breaking-up Firefox > TLS/SSL-handling code into easily-removable sections. > > I want to fully separate NSS code from code that handles: > > 1) MD5 signature handling > > 2) SHA1 signatu

Re: Interested in reviving PSS support in NSS

2015-02-15 Thread Ryan Sleevi
On Sun, February 15, 2015 3:07 pm, Hanno Böck wrote: > Unfortunately the code never got fully merged. Right now the state is > that code for the basic functions exists in freebl, but all upper layer > code is not merged. I think if I remember correctly the code currently > in freebl will also

Re: Reducing NSS's allocation rate

2014-11-11 Thread Ryan Sleevi
On Tue, November 11, 2014 10:26 am, Nicholas Nethercote wrote: > On Mon, Nov 10, 2014 at 7:06 PM, Ryan Sleevi > wrote: > > > > Not to be a pain and discourage someone from hacking on NSS > > My patches are in the following bugs: > > https://bugzilla.mozil

Re: Reducing NSS's allocation rate

2014-11-10 Thread Ryan Sleevi
On Mon, November 10, 2014 6:51 pm, Nicholas Nethercote wrote: > Hi, > > I've been doing some heap allocation profiling and found that during > basic usage NSS accounts for 1/3 of all of Firefox's cumulative (*not* > live) heap allocations. We're talking gigabytes of allocations in > short brow

Re: Mozilla's position on HPKP-RO storage

2014-08-29 Thread Ryan Sleevi
On Fri, August 29, 2014 8:43 am, Gervase Markham wrote: > On 28/08/14 17:20, Camilo Viecco wrote: > > 1. The PKP-RO header is not really useful, it might help on initial > > deployment of PKP but it cannot really be tested when it really matters > > most when you are actually changing certificates

Re: SSLKEYLOGFILE always enabled

2014-07-17 Thread Ryan Sleevi
On Wed, July 16, 2014 11:42 pm, Falcon Darkstar Momot wrote: > When it comes to key material, it's an outstanding idea to err on the > side of caution. > > Does anyone actually require this feature in a non-debug build? If not, > then it's completely unreasonable to leave it in such builds, ev

Re: SSLKEYLOGFILE always enabled

2014-07-15 Thread Ryan Sleevi
On Tue, July 15, 2014 1:11 pm, Tom Ritter wrote: > Is having it in by default useful enough to outweigh the risk? > > When the Dual_EC_DRBG news stories were blowing it, it was revealed > that you could switch to it by just changing the Windows Registry. > It's a Windows-supported backdoor - no

Re: SSLKEYLOGFILE always enabled

2014-07-15 Thread Ryan Sleevi
On Tue, July 15, 2014 1:11 pm, Tom Ritter wrote: > Is having it in by default useful enough to outweigh the risk? > > When the Dual_EC_DRBG news stories were blowing it, it was revealed > that you could switch to it by just changing the Windows Registry. > It's a Windows-supported backdoor - no

Re: RFC/Spec for certificate checking

2014-07-02 Thread Ryan Sleevi
On Wed, July 2, 2014 6:09 am, Bernhard Thalmayr wrote: > Hi experts, is there a specification which NSS follows when performing > certificate check during the SSL handshake (especially with regards to > handling SubjectAltName extensions)? > > TIA, > Bernhard > > P.S. Unfortunately my search

Re: Chrome: From NSS to OpenSSL

2014-02-03 Thread Ryan Sleevi
On Mon, February 3, 2014 4:30 am, David Woodhouse wrote: > On Mon, 2014-02-03 at 12:13 +, Alan Braggins wrote: > > > > Having support for PKCS#11 tokens at all is a pro, even if one > > irrelevant to the vast majority of users. > > That gets less true as we start to use PKCS#11 a little more.

Re: Chrome: From NSS to OpenSSL

2014-01-31 Thread Ryan Sleevi
On Fri, January 31, 2014 9:18 am, Alan Braggins wrote: > On 31/01/14 10:24, Julien Pierre wrote: > > > > On 1/27/2014 10:28, Kathleen Wilson wrote: > >> Draft Design Doc posted by Ryan Sleevi regarding Chrome migrating from > >> NSS to OpenSSL: > >&g

Re: [Ach] Proposal to Remove legacy TLS Ciphersuits Offered by Firefox

2014-01-02 Thread Ryan Sleevi
On Thu, January 2, 2014 1:25 pm, Julien Vehent wrote: > Hi Aaron, > > On 2014-01-02 16:10, Aaron Zauner wrote: > > Hi Kurt, > > > > On 02 Jan 2014, at 21:51, Kurt Roeckx wrote: > > > >> On Thu, Jan 02, 2014 at 09:33:24PM +0100, Aaron Zauner wrote: > I *think* they want to prefer CAMELLIA to

Re: Firefox's confusing saga in HTTPS warnings

2013-11-25 Thread Ryan Sleevi
On Mon, November 25, 2013 12:06 am, ianG wrote: > For some reason, news.google.com has been captured by *.opendns.com and > turned into a site warning. OK, so I imagine there is a story about > this somewhere, maybe it's just my ISP... > > > > But, imagine my surprise when I tried it on chrome

Re: oddball, old cipher suite in firefox client hello

2013-11-01 Thread Ryan Sleevi
On Fri, November 1, 2013 5:30 pm, Wan-Teh Chang wrote: > On Fri, Nov 1, 2013 at 1:28 AM, Jeff Hodges > wrote: > > > > I dug through the NSS codebase and found where it was defined in > > lib/ssl/sslproto.h as: > > > > /* New non-experimental openly spec'ed versions of those cipher > > suites.

Re: Removind dead code from NSS

2013-10-07 Thread Ryan Sleevi
On Mon, October 7, 2013 11:07 am, Robert Relyea wrote: > On 10/04/2013 06:52 PM, Ludovic Hirlimann wrote: > > Hi, > > > > AFAIK NSS still contains code for SSL2 , but no product uses it. SSL2 > > has been turned off at least 2 years ago. By removing SSL2 code we get : > > > > Smaller librarie

Re: Removal of generateCRMFRequest

2013-09-27 Thread Ryan Sleevi
On Fri, September 27, 2013 5:51 pm, Robert Relyea wrote: > > > On 09/27/2013 05:01 PM, Ryan Sleevi wrote: > > On Fri, September 27, 2013 4:09 pm, Eddy Nigg wrote: > >> On 09/28/2013 01:59 AM, From Ryan Sleevi: > >>> If your site requires a client cer

Re: Removal of generateCRMFRequest

2013-09-27 Thread Ryan Sleevi
On Fri, September 27, 2013 4:09 pm, Eddy Nigg wrote: > On 09/28/2013 01:59 AM, From Ryan Sleevi: > > If your site requires a client certificate, and you know that a client > > certificate is stored in a smart card, then you also know that when > > using > > Firefox, an

Re: Removal of generateCRMFRequest

2013-09-27 Thread Ryan Sleevi
On Fri, September 27, 2013 4:09 pm, Eddy Nigg wrote: > On 09/28/2013 01:59 AM, From Ryan Sleevi: > > If your site requires a client certificate, and you know that a client > > certificate is stored in a smart card, then you also know that when > > using > > Firefox, an

Re: Removal of generateCRMFRequest

2013-09-27 Thread Ryan Sleevi
On Fri, September 27, 2013 3:46 pm, Eddy Nigg wrote: > On 09/28/2013 12:45 AM, From Ryan Sleevi: > > NSS already performs checking that the given smart card used to > > authenticate is present whenever encrypting or decrypting data. This > > includes cached session resumpt

Re: Removal of generateCRMFRequest

2013-09-27 Thread Ryan Sleevi
On Fri, September 27, 2013 2:22 pm, Eddy Nigg wrote: > On 09/27/2013 11:52 PM, From Ryan Sleevi: > > Let me try it differently: What actions do you take on this information? > > Terminating a current session or triggering authentication to a new > session. When you define se

Re: Removal of generateCRMFRequest

2013-09-27 Thread Ryan Sleevi
On Fri, September 27, 2013 1:35 pm, Eddy Nigg wrote: > On 09/27/2013 08:52 PM, From Ryan Sleevi: > > > > How do you deal with this in other browsers? > > Well, I don't...so far :-) > > However I'm aware of similar capabilities with IE. > > >

Re: Removal of generateCRMFRequest

2013-09-27 Thread Ryan Sleevi
On Fri, September 27, 2013 10:29 am, Eddy Nigg wrote: > On 09/27/2013 08:12 PM, From Brian Smith: > > My question is not so much "Is anybody using this functionality" but > > rather "What really terrible things, if any, would happen if we > > removed them?" > > We might have to look for alternati

[ANNOUNCE] NSS 3.15.2 Release

2013-09-26 Thread Ryan Sleevi
The NSS team has released Network Security Services (NSS) 3.15.2, which is a minor release. The HG tag is NSS_3_15_2_RTM. NSS 3.15.2 requires NSPR 4.10 or newer. Detailed release notes are available at https://developer.mozilla.org/en-US/docs/NSS/NSS_3.15.2_release_notes and reproduced below. Th

Re: Proposal to Change the Default TLS Ciphersuites Offered by Browsers

2013-08-16 Thread Ryan Sleevi
On Fri, August 16, 2013 6:36 am, Rob Stradling wrote: > On 15/08/13 18:15, Chris Richardson wrote: > > I believe this plan would have poor side effects. For example, if Apple > > ships clients with a broken ECDSA implementation [0], a server cannot > > detect detect if a connecting client is an A

Re: Where is NSS used?

2013-07-10 Thread Ryan Sleevi
On Mon, July 8, 2013 12:00 pm, Rick Andrews wrote: > I need to remove some 1024-bit roots from Firefox’s trust store, but I > realize that these trusted roots are part of the NSS library, and that the > NSS library is used by lots of other software, not just Firefox. Removing > these roots may

Re: nickname for imported PKCS 12 from Firefox is called 'Imported Certificate'

2013-05-30 Thread Ryan Sleevi
On Wed, May 29, 2013 9:11 pm, Yoshi Huang wrote: > On 05/28/2013 05:20 PM, Yoshi Huang wrote: > > Hi, > > Given that my PKCS 12 file doesn't contain any 'friendlyName' > > attribute in it, > > nor my certificate DB doesn't have any certificate which has the same > > subject name with my PKCS12. >

[ANNOUNCE] NSS 3.14.3 Release

2013-02-20 Thread Ryan Sleevi
The NSS Development Team is pleased to announce the release of NSS 3.14.3. The official release notes are available at https://developer.mozilla.org/en-US/docs/NSS/NSS_3.14.3_release_notes , and are reproduced at the end of this message. This release includes mitigations for recently discussed "L

Re: Web Crypto API(s) and what Mozilla wants / needs

2013-02-14 Thread Ryan Sleevi
On Thu, February 14, 2013 11:55 am, John Dennis wrote: > On 02/14/2013 02:34 PM, Ryan Sleevi wrote: > > On Thu, February 14, 2013 10:43 am, Robert Relyea wrote: > >> On 02/14/2013 07:54 AM, David Dahl wrote: > >>> - Original Message - > >>>&g

Re: Web Crypto API(s) and what Mozilla wants / needs

2013-02-14 Thread Ryan Sleevi
On Thu, February 14, 2013 10:43 am, Robert Relyea wrote: > On 02/14/2013 07:54 AM, David Dahl wrote: > > - Original Message - > >> From: "Gervase Markham" > >> To: mozilla-dev-tech-cry...@lists.mozilla.org > >> Cc: "Eric Rescorla", "Brian > >> Smith", "Brendan Eich", "Ben > >> Adida", "Bri

Re: Proposing: Interactive Domain Verification Approval

2012-12-31 Thread Ryan Sleevi
On Mon, December 31, 2012 10:23 am, Kai Engert wrote: > On Mon, 2012-12-31 at 16:26 +0100, Kai Engert wrote: > > I propose to more actively involve users into the process of accepting > > certificates for domains. > > I propose the following in addition: > > Each CA certificate shall have a sing

NSS 3.14.1 release notes

2012-12-18 Thread Ryan Sleevi
The NSS Team is pleased to announce the NSS 3.14.1 release. Please read the NSS 3.14.1 release notes at: https://developer.mozilla.org/en-US/docs/NSS/NSS_3.14.1_release_notes Cheers, Ryan -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-te

Re: duplicate SSL record in different TCP packets from a Google Drive client

2012-11-06 Thread Ryan Sleevi
On Mon, November 5, 2012 10:12 am, Peter Djalaliev wrote: > Hello, > > There seems to be a possible problem with the SSL implementation used in > Google Drive on MacOS 10.8.2. I seems that this SSL implementation is NSS > - please let me know if you know that Google Drive uses a different SSL

Re: NSS 3.13.x ... releasenotes?

2012-10-29 Thread Ryan Sleevi
oup for the release notifications, 3.13.2 was paired with an NSPR 4.9 release. Which version of NSPR are you using? > > > Am 10/29/12 4:45 PM, schrieb Ryan Sleevi: > > On Mon, October 29, 2012 8:32 am, Bernhard Thalmayr wrote: > >> Hi all, > >> > >>

Re: NSS 3.13.x ... releasenotes?

2012-10-29 Thread Ryan Sleevi
On Mon, October 29, 2012 8:32 am, Bernhard Thalmayr wrote: > Hi all, > > sorry for this post, but I was not able to find the releasenotes for NSS > version 3.13.x neither using Google nor querying the archive > > > http://www.mozilla.org/projects/security/pki/nss/release_notes.html > > does no

Re: libnss x86 DRNG

2012-10-01 Thread Ryan Sleevi
On Mon, October 1, 2012 3:08 pm, Michael Demeter wrote: > Hello, > > I work in the Open Source Technology group at Intel in the security group. > > I have been tasked with contacting the maintainer of libnss to start > discussions about the possibility of Intel submitting patches to enable > t

Re: Building and running NSS for Android.

2012-07-10 Thread Ryan Sleevi
On Tue, July 10, 2012 12:32 pm, Robert Relyea wrote: > On 07/09/2012 02:03 PM, Anders Rundgren wrote: > > Ian, > > Pardon me if I was a bit terse in my response. > > > > What I meant was simple that Operating Systems manage > > critical resources but only occasionally keys. That is, > > access to

Re: libpkix maintenance plan (was Re: What exactly are the benefits of libpkix over the old certificate path validation library?)

2012-01-25 Thread Ryan Sleevi
Sean, The "Path Building" logic/requirements/concerned you described is best described within RFC 4158, which has been mentioned previously. As Brian mentioned in the past, this was 'lumped in' with the description of RFC 5280, but it's really its own thing. libpkix reflects the union of RFC 415

Re: libpkix maintenance plan (was Re: What exactly are the benefits of libpkix over the old certificate path validation library?)

2012-01-13 Thread Ryan Sleevi
> On 13/01/12 00:01, Brian Smith wrote: > > Ryan seems to be a great addition to the team. Welcome, Ryan! > > Ryan - could you take a moment to introduce yourself? (Apologies if I > missed an earlier introduction.) Sure Gerv. Don't worry, there were no missed introductions, though I have been l

Re: What exactly are the benefits of libpkix over the old certificate path validation library?

2012-01-05 Thread Ryan Sleevi
> On 01/04/2012 03:51 PM, Brian Smith wrote: > > Ryan Sleevi wrote: > >> IIRC, libpkix is an RFC 3280 and RFC 4158 conforming implementation, > >> while non-libpkix is not. That isn't to say the primitives don't exist > >> - > >> they do

Re: What exactly are the benefits of libpkix over the old certificate path validation library?

2012-01-05 Thread Ryan Sleevi
(resending from the correct address) > On 01/04/2012 03:51 PM, Brian Smith wrote: > > Ryan Sleevi wrote: > >> IIRC, libpkix is an RFC 3280 and RFC 4158 conforming implementation, > >> while non-libpkix is not. That isn't to say the primitives don't exist

Re: What exactly are the benefits of libpkix over the old certificate path validation library?

2012-01-05 Thread Ryan Sleevi
> Brian Smith a écrit : > > 3. libpkix can enforce certificate policies (e.g. requiring EV policy > > OIDs). Can the non-libpkix validation? > > EV policy have been defined in a way that means they could be supported > by a code that handles an extremely tiny part of all what's possible > with

Re: What exactly are the benefits of libpkix over the old certificate path validation library?

2012-01-03 Thread Ryan Sleevi
> Are there any other benefits? IIRC, libpkix is an RFC 3280 and RFC 4158 conforming implementation, while non-libpkix is not. That isn't to say the primitives don't exist - they do, and libpkix uses them - but that the non-libpkix path doesn't use them presently, and some may be non-trivial wor

RE: Question about pathlen extension checked

2011-09-20 Thread Ryan Sleevi
My reading of RFC 3280/5280 and from implementation experience with NSS, CryptoAPI, OpenSSL, and other implementations is that no, that is not correct. CA:TRUE with a pathlen:0 is conformant to RFCs 3280/5280. The most common cause for this would be for a CA certifying an intermediate, but that in

RE: Question about pathlen extension checked

2011-09-19 Thread Ryan Sleevi
> > On 09/18/2011 03:15 AM, Ralph Holz (TUM) wrote: > > Hi, > > > > does NSS check the pathlength extension in an issuing certificate? > yes. > > I am particularly wondering if pathlen:0 is honoured. > According to the spec, which means no limit. NSS limits the size of the > total chain to preve

RE: Certificate login in Firefox - how does it work?

2010-11-28 Thread Ryan Sleevi
> -Original Message- > From: dev-tech-crypto-bounces+ryan- > mozdevtechcrypto=sleevi@lists.mozilla.org [mailto:dev-tech-crypto- > bounces+ryan-mozdevtechcrypto=sleevi@lists.mozilla.org] On Behalf > Of Matej Kurpel > Sent: Sunday, November 28, 2010 11:24 AM > To: mozilla's crypto cod

RE: Certificate login in Firefox - how does it work?

2010-11-27 Thread Ryan Sleevi
> On 2010-11-26 13:20 PDT, ryan-mozdevtechcry...@sleevi.com wrote: > [snip] > > And to save you a bit of trouble/pain: for CryptoAPI, you cannot > > simply sign raw data - you can only sign previously hashed data. I > > understand this to mean that you cannot write a pure PKCS#11 -> > > CryptoAPI m

RE: Fwd: Hi, I have three questions about embed bank CA cert in Firefox

2010-07-21 Thread Ryan Sleevi
> -Original Message- > From: dev-tech-crypto-bounces+ryan- > mozdevtechcrypto=sleevi@lists.mozilla.org [mailto:dev-tech-crypto- > bounces+ryan-mozdevtechcrypto=sleevi@lists.mozilla.org] On Behalf > Of Gervase Markham > Sent: Wednesday, July 21, 2010 1:22 PM > To: dev-tech-crypto@lis

RE: Restricting SSL cert issuance within specified domain

2010-06-02 Thread Ryan Sleevi
> That's great news! Is there a corresponding bug number or other way I > can track the progress to see which version of NSS it gets into? https://bugzilla.mozilla.org/show_bug.cgi?id=394919 -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-