Re: ComSign Root Inclusion Request

2009-03-26 Thread Kyle Hamilton
Thank you for your diligence, Eddy! -Kyle H On Thu, Mar 26, 2009 at 11:26 AM, Eddy Nigg wrote: > On 03/26/2009 03:53 PM, Eddy Nigg: >> >> During the last two weeks I tried to contact the relevant person at the >> registry for the Israeli Signature Law. Unfortunately I wasn't able to reach >> any

Re: ComSign Root Inclusion Request

2009-03-26 Thread Eddy Nigg
On 03/26/2009 03:53 PM, Eddy Nigg: During the last two weeks I tried to contact the relevant person at the registry for the Israeli Signature Law. Unfortunately I wasn't able to reach anybody neither by email nor phone. Luckily I was however able to have an interesting conversation with Ere

Re: ComSign Root Inclusion Request

2009-03-26 Thread Eddy Nigg
On 03/11/2009 05:51 PM, michal...@gmail.com: In Addition Comsign is being criticize by accountant that specialize in Information Security. And operate according the European Telecommunications Standards Institute (ETSI). Since I have the intention to deal with the Israel signature law myself

Re: ComSign Root Inclusion Request

2009-03-11 Thread Kyle Hamilton
Since Eddy's in Israel and thus most likely knows Hebrew (and if not, he knows someone who can translate it well enough for him -- and he has both a vested interest in ensuring he gets it right and a good track record with his contributions to the Mozilla CA vetting process), I propose holding acti

Re: ComSign Root Inclusion Request

2009-03-11 Thread Eddy Nigg
On 03/11/2009 05:51 PM, michal...@gmail.com: Hi Regarding you questions Comsign operate under the Israeli Electronic Signature Law. Here is link for all the regulation that derivative from the law. Unfortunately this link is in Hebrew (I hope you can translate it) http://www.justice.gov.il/MOJHeb

Re: ComSign Root Inclusion Request

2009-03-11 Thread michaldor
Hi Regarding you questions Comsign operate under the Israeli Electronic Signature Law. Here is link for all the regulation that derivative from the law. Unfortunately this link is in Hebrew (I hope you can translate it) http://www.justice.gov.il/MOJHeb/RashamGormimMashrim/HokVetakanot Comsign is

Re: ComSign Root Inclusion Request

2009-03-09 Thread kathleen95014
The summary of the action items resulting from this first public discussion is as follows. The criteria by which the CA was audited needs to be clarified. ComSign is requested to provide information about the audit criteria or the CA certificate practice requirements as published by the Ministry o

Re: ComSign Root Inclusion Request

2009-03-05 Thread Eddy Nigg
On 03/04/2009 06:17 PM, michal...@gmail.com: On Feb 28, 12:47 pm, Eddy Nigg wrote: Having studied the Israeli Electronic Signature Law on previous occasions, the law resembles in many aspects similar legislation's of the EC. We've seen at different opportunities the lack of its usefulness i

[Fwd: Re: ComSign Root Inclusion Request]

2009-03-04 Thread Eddy Nigg
Original Message Subject:Re: ComSign Root Inclusion Request Date: Wed, 4 Mar 2009 08:17:18 -0800 (PST) From: michal...@gmail.com To: Eddy Nigg I'm forwarding on behalf of Michal this email to the mailing list since she apparently replied to me directl

Re: ComSign Root Inclusion Request

2009-03-02 Thread stefan . claesson
On Feb 26, 5:49 pm, Kyle Hamilton wrote: > 2009/2/26 Eddy Nigg : > > > On 02/26/2009 04:18 PM, stefan.claes...@gmail.com: > > >> The CRL that you have problems with are generated manually trough > >> our offline CA. (RSA Certificate Manager) When generating manually you > >> just copy > >> the crl

Re: ComSign Root Inclusion Request

2009-02-28 Thread Eddy Nigg
On 02/24/2009 10:21 PM, Kathleen Wilson: This begins the one-week discussion period. After that week, I will provide a summary of issues noted and action items. If there are no outstanding issues, then this request can be approved for inclusion. If there are outstanding issues or action items, th

Re: ComSign Root Inclusion Request

2009-02-27 Thread Frank Hecker
Nelson B Bolyard wrote re hexadecimal error codes in Firefox/PSM: Can MoFo or MoCo PLEASE contribute some man-hours to fixing this? This requires no crypto expertise. It's a trivial GUI issue. NSS supplies all the error strings. There's no excuse left for FF displaying error codes in unsigned h

Re: ComSign Root Inclusion Request

2009-02-26 Thread Kyle Hamilton
On Thu, Feb 26, 2009 at 7:04 PM, Nelson B Bolyard wrote: > PEM's only real value is that it allows data to be copied and pasted > into and out of text documents.  The base64 content is no more > enlightening, and IMO is significantly less informative, than the > binary DER.  PEM encoding adds a MI

Re: ComSign Root Inclusion Request

2009-02-26 Thread Nelson B Bolyard
After quoting a passage from ITU document X.690, whose title is: ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) on 2009-02-26 01:40 PST, Kyle Hamilton wrote, > I have not received a specific a

Re: ComSign Root Inclusion Request

2009-02-26 Thread Kyle Hamilton
ugh. I have to rely on external utilities to form a pipeline into an NSS utility that it'll actually use -- and then, not be able to use the metadata discarded by grep -v to verify that what was decoded was what was actually expected? -Kyle H 2009/2/26 Nelson B Bolyard : > Kyle Hamilton wrote, O

Re: ComSign Root Inclusion Request

2009-02-26 Thread Nelson B Bolyard
Kyle Hamilton wrote, On 2009-02-26 07:49: > I am not sure how NSS's crlutil handles PEM, It doesn't. It requires DER. > or which tool would be used to de-PEM the target. grep -v "X509 CRL" crl.pem | atob -o crl.der Uses the "atob" utility which is one of NSS's utilities. -- dev-tech-crypt

Re: ComSign Root Inclusion Request

2009-02-26 Thread kathleen95014
> There's a potential problematic practice here, which is "long time > period between CRL issuance". My understanding is that the update frequency of the CRLs is important in regards to the end-entity certificates, not necessarily at the CA level. These URLs are the CRLs at the CA level, and thei

Re: ComSign Root Inclusion Request

2009-02-26 Thread David E. Ross
On 2/26/2009 1:48 AM, Kyle Hamilton wrote [in part]: > There's a potential problematic practice here, which is "long time > period between CRL issuance". I'm seeing issuance dates of October 6, > 2008, with the next updates to be expected at April 4, 2009. I expect > this is 180 days, though I d

Re: ComSign Root Inclusion Request

2009-02-26 Thread Kyle Hamilton
2009/2/26 Eddy Nigg : > On 02/26/2009 04:18 PM, stefan.claes...@gmail.com: >> >> The CRL that you have problems with are generated manually trough >> our offline CA. (RSA Certificate Manager) When generating manually you >> just copy >> the crl into notepad and save it as crl. >> > > It's very easy

Re: ComSign Root Inclusion Request

2009-02-26 Thread Eddy Nigg
On 02/26/2009 04:18 PM, stefan.claes...@gmail.com: The CRL that you have problems with are generated manually trough our offline CA. (RSA Certificate Manager) When generating manually you just copy the crl into notepad and save it as crl. It's very easy to convert them to DER afterward. You ca

Re: ComSign Root Inclusion Request

2009-02-26 Thread stefan . claesson
On Feb 26, 3:55 pm, Eddy Nigg wrote: > On 02/26/2009 06:18 AM, Eddy Nigg: > > > > > > > On 02/26/2009 05:24 AM, David E. Ross: > > >> In the case of secure browsing at authenticated Web sites, I want to be > >> conservative in what I accept. If a CA is generating certificates that > >> do not comp

Re: ComSign Root Inclusion Request

2009-02-26 Thread Eddy Nigg
On 02/26/2009 06:18 AM, Eddy Nigg: On 02/26/2009 05:24 AM, David E. Ross: In the case of secure browsing at authenticated Web sites, I want to be conservative in what I accept. If a CA is generating certificates that do not comply with accepted RFCs, what else is that CA doing wrong? In other w

Re: ComSign Root Inclusion Request

2009-02-26 Thread Ian G
On 25/2/09 23:28, Nelson B Bolyard wrote: Kyle Hamilton wrote, On 2009-02-25 14:04: Postel's first rule of interoperability: be liberal in what you accept, be conservative in what you send. Yeah. Lots of nasty Internet vulnerabilities have results from applying that to crypto protocols and fo

Re: ComSign Root Inclusion Request

2009-02-26 Thread Jean-Marc Desperrier
Jean-Marc Desperrier wrote: [...] With FF 3.2a1pre latest nightly the result of dropping the URL http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl on a browser window is : "The application cannot import the Certificate Revocation List (CRL). Error Importing CRL to local Database. Error Code:ff

Re: ComSign Root Inclusion Request

2009-02-26 Thread Jean-Marc Desperrier
Nelson B Bolyard wrote: Kathleen Wilson wrote, On 2009-02-24 12:21: * CRL issue: Current CRLs result in the e009 error code when downloading into Firefox. ComSign has removed the critical flag from the CRL, and the new CRLs will be generated in April. Was that with FF 2? FF 3 should not

Re: ComSign Root Inclusion Request

2009-02-26 Thread Jean-Marc Desperrier
Kyle Hamilton wrote: [...] this CA in question is not generating improper certificates. It is generating proper CRLs, and it is simply encoding and transmitting them as PEM-encoded DER-encoded CRL structures when RFC5280 (which, by the way, I've been repeatedly told that NSS does *NOT* comply w

Re: ComSign Root Inclusion Request

2009-02-26 Thread Kyle Hamilton
2009/2/25 Eddy Nigg : > > Or in other words - and lets put it a bit more mildly - they certainly never > tested their CRLs, at least not with the software this group cares about. > > But didn't Kyle say the CRLs are empty anyway (no revocations)? I couldn't > find any records either. This doesn't

Re: ComSign Root Inclusion Request

2009-02-26 Thread Kyle Hamilton
This is mostly off-topic, and relates primarily to one of my pet peeves regarding everything cryptography-oriented on the Internet today. I also know that this is not the correct venue to try to make any reforms. However, since Mr. Ross has stated his view on the topic, I feel that I must state m

Re: ComSign Root Inclusion Request

2009-02-25 Thread Eddy Nigg
On 02/26/2009 05:24 AM, David E. Ross: In the case of secure browsing at authenticated Web sites, I want to be conservative in what I accept. If a CA is generating certificates that do not comply with accepted RFCs, what else is that CA doing wrong? In other words, if a CA sends CRLs that are

Re: ComSign Root Inclusion Request

2009-02-25 Thread David E. Ross
On 2/25/2009 2:04 PM, Kyle Hamilton wrote: > Postel's first rule of interoperability: be liberal in what you > accept, be conservative in what you send. > > Which RFC requires which? (I had read somewhere, for example, that > wildcard certificates must be handled by HTTP over TLS servers in a > p

Re: ComSign Root Inclusion Request

2009-02-25 Thread Kyle Hamilton
Theoretically, x- types are only to be used until an official MIME type assignment has been made. Realistically, older clients don't have any idea what the new MIME type assignment will be. What do you get in the Accept: header for the requests for your CRLs? (I'm actually curious, since I've nev

Re: ComSign Root Inclusion Request

2009-02-25 Thread Eddy Nigg
On 02/26/2009 12:28 AM, Nelson B Bolyard: [RFC2585]. HTTP server implementations accessed via the URI SHOULD specify the media type application/pkix-crl in the content-type header field of the response. Would the header application/x-pkcs7-crl be potentially wrong? It's what we've

Re: ComSign Root Inclusion Request

2009-02-25 Thread Nelson B Bolyard
Kyle Hamilton wrote, On 2009-02-25 14:04: > Postel's first rule of interoperability: be liberal in what you > accept, be conservative in what you send. Yeah. Lots of nasty Internet vulnerabilities have results from applying that to crypto protocols and formats. I know, I've had to fix 'em! > Wh

Re: ComSign Root Inclusion Request

2009-02-25 Thread Nelson B Bolyard
Kyle Hamilton wrote, On 2009-02-25 13:51: > It is, indeed, showing me the e009 error code (with hexadecimal > numbers) when I go to those CRL distribution points in FF 3.0.6. (At > least the text is selectable and copiable:) > > The application cannot import the Certificate Revocation List (C

Re: ComSign Root Inclusion Request

2009-02-25 Thread Kyle Hamilton
Postel's first rule of interoperability: be liberal in what you accept, be conservative in what you send. Which RFC requires which? (I had read somewhere, for example, that wildcard certificates must be handled by HTTP over TLS servers in a particular way -- it turns out that it wasn't part of PK

Re: ComSign Root Inclusion Request

2009-02-25 Thread Nelson B Bolyard
Kyle Hamilton wrote, On 2009-02-25 13:56: > This is going to sound rather stupid of me, but I'm going to ask this anyway: > Why is Firefox insisting on a specific encoding of the data, rather > than being flexible to alternate, unconfusable, common encodings? The RFCs require conforming CAs to se

Re: ComSign Root Inclusion Request

2009-02-25 Thread Nelson B Bolyard
kathleen95...@yahoo.com wrote, On 2009-02-25 10:39: > In regards to the CRLS > http://fedir.comsign.co.il/crl/ComSignCA.crl > http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl > > I have just tried the two CRL’s again, and see that the error is > indeed e009 which corresponds to error code

Re: ComSign Root Inclusion Request

2009-02-25 Thread Kyle Hamilton
This is going to sound rather stupid of me, but I'm going to ask this anyway: is there any possible potential DER-encoded message which will begin with the string "-BEGIN X509 CRL-"? If there isn't, might I possibly suggest that requiring DER in this location and manner will do absolutely

Re: ComSign Root Inclusion Request

2009-02-25 Thread Kyle Hamilton
It is, indeed, showing me the e009 error code (with hexadecimal numbers) when I go to those CRL distribution points in FF 3.0.6. (At least the text is selectable and copiable:) The application cannot import the Certificate Revocation List (CRL). Error Importing CRL to local Database. Error Co

Re: ComSign Root Inclusion Request

2009-02-25 Thread Nelson B Bolyard
Kathleen Wilson wrote, On 2009-02-24 12:21: > * CRL issue: Current CRLs result in the e009 error code when > downloading into Firefox. ComSign has removed the critical flag from > the CRL, and the new CRLs will be generated in April. Was that with FF 2? FF 3 should not be showing hexadecima

Re: ComSign Root Inclusion Request

2009-02-25 Thread kathleen95014
I apologize for the confusion. I was mentally mistaking the error code e009 for fffe095. In regards to the CRLS http://fedir.comsign.co.il/crl/ComSignCA.crl http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl I have just tried the two CRL’s again, and see that the error is indeed e009 whi

Re: ComSign Root Inclusion Request

2009-02-25 Thread Frank Hecker
stefan.claes...@gmail.com wrote: Is CIDP required to use in a crl? No. In fact, the issue with Hongkong Post was that its CDP CRL had the CIDP extension marked as critical, and that was why Firefox had an error when loading it. The NSS cryptographic library used by Firefox, Thunderbird, and

Re: ComSign Root Inclusion Request

2009-02-25 Thread Kyle Hamilton
There are no certificates revoked in either the ComsignCA.crl or ComsignSecuredCA.crl. I do not know if this would be the cause of the e009 error. -Kyle H On Wed, Feb 25, 2009 at 2:56 AM, wrote: > On Feb 24, 10:42 pm, Frank Hecker > wrote: >> Kathleen Wilson wrote: >> > As per the CA Sche

Re: ComSign Root Inclusion Request

2009-02-25 Thread stefan . claesson
On Feb 24, 10:42 pm, Frank Hecker wrote: > Kathleen Wilson wrote: > > As per the CA Schedule athttps://wiki.mozilla.org/CA:ScheduleComSign > > is the next request in the queue for public discussion. > > Thanks for preparing this for public discussion! > > > * CRL issue: Current CRLs result in the

Re: ComSign Root Inclusion Request

2009-02-24 Thread Frank Hecker
Kathleen Wilson wrote: As per the CA Schedule at https://wiki.mozilla.org/CA:Schedule ComSign is the next request in the queue for public discussion. Thanks for preparing this for public discussion! * CRL issue: Current CRLs result in the e009 error code when downloading into Firefox. Com

ComSign Root Inclusion Request

2009-02-24 Thread Kathleen Wilson
As per the CA Schedule at https://wiki.mozilla.org/CA:Schedule ComSign is the next request in the queue for public discussion. ComSign (a private company owned by Comda, Ltd. in Israel) has applied to add two new root CA certificates to the Mozilla root store, as documented in the following bug: