Multiple certificates with different aliases

2021-03-29 Thread Mithilesh Wachasunder
Hi Team Is it possible to have multiple certificates having same subject to be part of different aliases in NSSDB? For example, if I have Certificate 1 : Subject: CN = Certificate-randomcert.com Serial Number: 02:0a:4f:ac:ad:80:00:32:19:5b:3f:38:08 Certificate 2 : Subject: CN

How to handle nicknames/tokens with colons in ECA certificates

2021-02-20 Thread Bill McGrory
I am the trying to get a new (for me) hardware token to work with the nss lib on Linux. This is an ECA token (external certificate authority) specified by the U.S. Government. Apparently there are specifications for certificate common name naming conventions which require the inclusion of a colon i

Re: Can import multiple certificates with same subject?

2018-02-02 Thread Hubert Kario
On Wednesday, 31 January 2018 06:43:19 CET John Jiang wrote: > In order to describing my point clearly, please consider the below simple > example. > > 1. Two certificates with same subject (CN=www.example.com) and different > nicknames (respectively, example1 and example2). Both

Re: Can import multiple certificates with same subject?

2018-01-30 Thread John Jiang
In order to describing my point clearly, please consider the below simple example. 1. Two certificates with same subject (CN=www.example.com) and different nicknames (respectively, example1 and example2). Both of them are in PKCS12 format. 2. Import the certificates to an existing database

Can import multiple certificates with same subject?

2018-01-30 Thread John Jiang
Hi, I'm using NSS 3.35. With my testing, it is not allowed to import multiple certificates with same subject and different nicknames to a certificate database via pk12util. I just want to confirm this point. Best regards, John Jiang -- dev-tech-crypto mailing list dev-tech-c

[TDB 45.8.0] Thunderbird rejects non-CA self-signed certificates for e-mail signature verification

2017-04-10 Thread NovHak
Dear forum readers, I use self-signed certificates. As long as it's not for a large public, trust can be achieved that way : the certificate is sent to a friend, its fingerprint is then verified via a secure (enough) channel such as a phone call, and that's fine. Hence I was

[TDB 45.8.0] Thunderbird doesn't accept non-CA self signed certificates for e-mail signature verification

2017-04-10 Thread NovHak
Dear forum readers, I use self-signed certificates. As long as it's not for a large public, trust can be achieved that way : the certificate is sent to a friend, its fingerprint is then verified via a secure (enough) channel such as a phone call, and that's fine. Hence I was

[TDB 45.8.0] Thunderbird rejects non-CA self-signed certificates for e-mail signature verification

2017-04-10 Thread NovHak
Dear forum readers, I use self-signed certificates. As long as it's not for a large public, trust can be achieved that way : the certificate is sent to a friend, its fingerprint is then verified via a secure (enough) channel such as a phone call, and that's fine. Hence I was

How are the private keys associated with the certificates in the NSS Database?

2016-06-17 Thread Opa114
Hi, can someone tell me more about some technical detail. I want to know how the private keys stored ind the key3.db are associated / linked with the corresponding certificate stored in the cert8.db? I could not find any detail how that was implemented. Hope someone could give me more informat

Removing certificates and org.mozilla.jss.CryptoManager refresh

2016-05-30 Thread zalkindvova
Hope this is the right place to ask... I use org.mozilla.jss.CryptoManager to manage certificates and everything works fine. Now I want to remove one of the existing certificates from outside using the "certutil" command. At this point CryptoManager::findCertsByNickname method reco

How to get details on certificates?

2016-05-23 Thread RJT
On CentOS 6 and 7, i can get certutil to list the certificates via `certutil -L -d sql:${HOME}/.pki/nssdb` but i need the creation and expiration date time stamps and many other details of the certificate. How does one get detailed certificate information? i have many certificates that

Re: Root certificates bundled with Iceweasel/Firefox (Icecode/Thunderbird)?

2015-10-08 Thread helpcrypto helpcrypto
A SSL CA 3 with 08 70 BC C5 AF 3F DB 95 9A 91 CB 6A EE EF E4 65 > > > None of them seem to appear on: > https://mozillacaprogram.secure.force.com/CA/IncludedCACertificateReport > > Is this page up to date? > > Is there any place where I can check which certificates are bu

Root certificates bundled with Iceweasel/Firefox (Icecode/Thunderbird)?

2015-09-24 Thread helpcrypto helpcrypto
/IncludedCACertificateReport Is this page up to date? Is there any place where I can check which certificates are bundled? Any place to check which certificates were are added/removed on each version? (I guess release notes, but don't see it) Same applies for Thunderbird. Thanks -- dev

Re: Problems with FF and internal certificates

2015-05-04 Thread Robert Relyea
On 05/04/2015 10:09 AM, Brian Smith wrote: On Fri, May 1, 2015 at 9:11 AM, Tanvi Vyas wrote: On Apr 27, 2015, at 2:03 PM, Michael Peterson < michaelpeterson...@gmail.com> wrote: Now, in the album I posted above (https://imgur.com/a/dmMdG), the last two screenshots show a packet capture from

Re: Problems with FF and internal certificates

2015-05-04 Thread Brian Smith
On Fri, May 1, 2015 at 9:11 AM, Tanvi Vyas wrote: > > On Apr 27, 2015, at 2:03 PM, Michael Peterson < > michaelpeterson...@gmail.com> wrote: > > Now, in the album I posted above (https://imgur.com/a/dmMdG), the last > two screenshots show a packet capture from Wireshark. It appears that > Firefox

Re: Problems with FF and internal certificates

2015-05-04 Thread Hubert Kario
On Friday 01 May 2015 12:11:00 Tanvi Vyas wrote: > > On Apr 27, 2015, at 2:03 PM, Michael Peterson wrote: > > > > > > Firefox does not like our internal certificates. I'm trying to figure out > > why...> > > > > > > tl;dr - Our inte

Re: Problems with FF and internal certificates

2015-05-04 Thread Tanvi Vyas
Posting to mozilla-dev-tech-crypto instead. firefox-dev to bcc. > On Apr 27, 2015, at 2:03 PM, Michael Peterson > wrote: > > Firefox does not like our internal certificates. I'm trying to figure out > why... > > tl;dr - Our internal IIS servers, signed with

Re: FF 37 - ssl_error_no_cypher_overlap with java SSL and java generated self-signed certificates

2015-04-08 Thread Brian Smith
Gervase Markham wrote: > On 07/04/15 17:32, Hanno Böck wrote: >> Are you using DSA? Firefox removed DSA recently (which is good - almost >> nobody uses it and it's a quite fragile algorithm when it comes to >> random numbers). > > Hanno's probably hit the nail on the head here. > https://bugzilla.

Re: FF 37 - ssl_error_no_cypher_overlap with java SSL and java generated self-signed certificates

2015-04-08 Thread Gervase Markham
On 07/04/15 17:32, Hanno Böck wrote: > Are you using DSA? Firefox removed DSA recently (which is good - almost > nobody uses it and it's a quite fragile algorithm when it comes to > random numbers). Hanno's probably hit the nail on the head here. https://bugzilla.mozilla.org/show_bug.cgi?id=107386

Re: FF 37 - ssl_error_no_cypher_overlap with java SSL and java generated self-signed certificates

2015-04-07 Thread Hanno Böck
On Thu, 2 Apr 2015 14:06:32 -0700 (PDT) stefano.forn...@gmail.com wrote: > it seems the latest update to FF37 has broken some SSL functionality. > I am not able to access any more a java server running HTTPS. The > implementation is based on standard Java SSL and I generated the >

Re: FF 37 - ssl_error_no_cypher_overlap with java SSL and java generated self-signed certificates

2015-04-07 Thread Gervase Markham
makes? (We have a fallback connection if the first one fails; it might be useful to see if it's triggered.) > I am not able to access any more a java server running > HTTPS. The implementation is based on standard Java SSL and I Which version of Java? > generated the certifica

FF 37 - ssl_error_no_cypher_overlap with java SSL and java generated self-signed certificates

2015-04-02 Thread stefano . fornari
Hi All, it seems the latest update to FF37 has broken some SSL functionality. I am not able to access any more a java server running HTTPS. The implementation is based on standard Java SSL and I generated the certificates myself (being an internal server). It seems the problem is not in the

RE: Client auth only sending client certificate, not sending intermediate CA certificates

2015-03-03 Thread Jason Pyeron
e:x509ce:x509ce:x509ce:pkix1implicit:x509ce:x50 > 9sat:x509ce:x509sat:x] > > > > Secure Sockets Layer > > -TLSv1.2 Record Layer: Handshake Protocol: Multiple > Handshake Messages > > +TLSv1 Record Layer: Handshake Protocol: Multiple > Handshake Messages > >

Re: Client auth only sending client certificate, not sending intermediate CA certificates

2015-03-03 Thread David Keeler
ke Messages > +TLSv1 Record Layer: Handshake Protocol: Multiple Handshake Messages > Content Type: Handshake (22) > -Version: TLS 1.2 (0x0303) > -Length: 1691 > + Version: TLS 1.0 (0x0301) > + Length: 3052 > Handshake Protocol: Certificate >

Client auth only sending client certificate, not sending intermediate CA certificates

2015-03-03 Thread Jason Pyeron
dshake (22) -Version: TLS 1.2 (0x0303) -Length: 1691 +Version: TLS 1.0 (0x0301) +Length: 3052 Handshake Protocol: Certificate Handshake Type: Certificate (11) -Length: 1289 - Certificates Length: 1286 - Certificates (

Re: Get only personal certificates

2015-01-19 Thread Opa114
(look at my attached screenshot: http://imgur.com/5VtcEpJ). or if this is not possible in any way i want an option to select onlythe personal certificates from the return of getPermCerts(). thanks for help. -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https

Problem with loading certificates with JSS on Ubuntu.

2014-11-26 Thread alexrait
la/firefox/XXX.default) Running getCACerts on CryptoManager instance returns no certificates... While certutil tool does show the certificates. This is my code: CryptoManager.initialize("~/.mozilla/firefox/zk13jer0.default/"); CryptoManager cm = Crypt

Re: High CPU usage when acccessing internal devices that do not have externally validated certificates

2014-10-06 Thread Frederik Braun
; file a bug under Core/Security:PSM ? > > On Thu, Oct 2, 2014 at 11:51 PM, Phil Davis wrote: > >> I am accessing pfSense router/s that have self-generated certificates so >> obviously they do not validate publicly. Prior to Firefox 31 I had the >> security warning and had

Re: High CPU usage when acccessing internal devices that do not have externally validated certificates

2014-10-06 Thread Patrick McManus
Hi Phil, this is probably something the pkix team should look at. can you file a bug under Core/Security:PSM ? On Thu, Oct 2, 2014 at 11:51 PM, Phil Davis wrote: > I am accessing pfSense router/s that have self-generated certificates so > obviously they do not validate publicly. Pr

High CPU usage when acccessing internal devices that do not have externally validated certificates

2014-10-05 Thread Phil Davis
I am accessing pfSense router/s that have self-generated certificates so obviously they do not validate publicly. Prior to Firefox 31 I had the security warning and had clicked through to add the certificate for a number of these routers on our internal networks. The list of certificates in

Re: creating SHA256 certificates with certutil

2014-09-09 Thread el...@gmail.com
You can specify with -Z sha256. See https://bugzilla.mozilla.org/show_bug.cgi?id=1058870 On Tue, Sep 9, 2014 at 8:21 AM, Rex Roof wrote: > Hi, I've been searching for documentation on this and I'm coming up short. > > I have created my own CA for our domain using moznss certutil on a redhat6 > m

creating SHA256 certificates with certutil

2014-09-09 Thread Rex Roof
Hi, I've been searching for documentation on this and I'm coming up short. I have created my own CA for our domain using moznss certutil on a redhat6 machine. I need to change my methods to start creating SHA256 certs (i'm sure you all know why) currently I use this command to create keys: certu

Re: Using libnss with client certificates via pkcs11

2013-06-21 Thread Robert Relyea
Third, you may need to hook the client_auth_callback as John describes below. If your server sends the list of trusted CA's in it's client auth request, then the default client_auth_callback should be able to find the cert on your smartcard without requiring the use of any special hooks, bu

Re: Using libnss with client certificates via pkcs11

2013-06-21 Thread Robert Relyea
On 06/21/2013 08:13 AM, John Dennis wrote: On 06/20/2013 01:20 PM, Johan Dahlin wrote: [Sorry if this appears twice, the first copy got stuck in the moderation queue] I'm investigating the use of smart card readers for my application[1], which is also free software. As part of the brazilian el

Re: Using libnss with client certificates via pkcs11

2013-06-21 Thread Johan Dahlin
I've been setting that as well, if I pass in a nickname nss says that the database is corrupted, so I'm passing in an empty string. I managed to get the password callback called as well, so there's some interaction with the pkcs11 device. Still seeing a 403 though. I've been trying to figure out

Re: Using libnss with client certificates via pkcs11

2013-06-21 Thread John Dennis
On 06/20/2013 01:20 PM, Johan Dahlin wrote: > [Sorry if this appears twice, the first copy got stuck in the moderation > queue] > > I'm investigating the use of smart card readers for my application[1], > which is also free software. > > As part of the brazilian eletronic legislation I need to b

Using libnss with client certificates via pkcs11

2013-06-20 Thread Johan Dahlin
[Sorry if this appears twice, the first copy got stuck in the moderation queue] I'm investigating the use of smart card readers for my application[1], which is also free software. As part of the brazilian eletronic legislation I need to be able to connect to a https server[2] and do a couple of s

Re: Root Certificates in Firefox OS (was Re: NSS in Firefox OS)

2013-04-19 Thread Brian Smith
Rob Stradling wrote: > > I presume that Firefox OS trusts NSS's "Built-in" Root Certificates > > [1], but what (if anything) does Firefox OS do for EV SSL? As you found, Firefox OS doesn't have an EV UI, and in fact I just disabled the EV validation logic in B2

Re: Root Certificates in Firefox OS (was Re: NSS in Firefox OS)

2013-04-19 Thread Rob Stradling
On 18/04/13 13:54, Rob Stradling wrote: On 20/10/12 18:33, Brian Smith wrote: B2G (Firefox OS) does use NSS. Brian, I presume that Firefox OS trusts NSS's "Built-in" Root Certificates [1], but what (if anything) does Firefox OS do for EV SSL? Does Firefox OS import PSM'

Root Certificates in Firefox OS (was Re: NSS in Firefox OS)

2013-04-18 Thread Rob Stradling
On 20/10/12 18:33, Brian Smith wrote: B2G (Firefox OS) does use NSS. Brian, I presume that Firefox OS trusts NSS's "Built-in" Root Certificates [1], but what (if anything) does Firefox OS do for EV SSL? Does Firefox OS import PSM's list of EV-enabled Root Certificate

Re: JSS: How to recover only certificates wich have an associated private key.

2013-04-10 Thread Jaime Hablutzel Egoavil
>> Hi all, > >> > >> I´m developing an applet with JSS 4, my intentions are to access > >> Firefox´s certs repositories and recover the user certificates, and > >> among them, only show to the user the certificates which have a > >> private

Re: Ensuring certificate chain when creating certificates in memory without db.

2013-02-10 Thread passfree
On Friday, February 8, 2013 9:08:50 PM UTC, Brian Smith wrote: > pass@googlemail.com > > > I use SSL_ConfigSecureServer with a certificate which was created in > > > memory (no db). The certificate was created with the > > > CERT_CreateCertificate passing the CA's issuer. The same cert was >

Re: Ensuring certificate chain when creating certificates in memory without db.

2013-02-08 Thread Brian Smith
passf...@googlemail.com > I use SSL_ConfigSecureServer with a certificate which was created in > memory (no db). The certificate was created with the > CERT_CreateCertificate passing the CA's issuer. The same cert was > also signed with the CA's key. The CA cert was also created on the > fly, i.e.

Ensuring certificate chain when creating certificates in memory without db.

2013-02-04 Thread passfree
Hi everyone, I use SSL_ConfigSecureServer with a certificate which was created in memory (no db). The certificate was created with the CERT_CreateCertificate passing the CA's issuer. The same cert was also signed with the CA's key. The CA cert was also created on the fly, i.e. without the need

How to find all certificates by subject name?

2012-06-03 Thread Sean Leonard
Hi all, What is the best way with NSS to find all certificates that have the same subject name? The function CERT_FindCertByName expresses the right general idea, but it only returns one certificate at maximum. Internally, it calls NSSCryptoContext_FindBestCertificateBySubject, which calls

Re: Serial Number on Certificates

2011-12-09 Thread mallapadi niranjan
On Mon, Nov 28, 2011 at 8:11 AM, mallapadi niranjan < niranjan.as...@gmail.com> wrote: > Hi all > > I would like to know how are serial numbers generated when creating certs > using certutil commands(without -m option). > And how do we track what serial numbers were given t

Serial Number on Certificates

2011-11-27 Thread mallapadi niranjan
Hi all I would like to know how are serial numbers generated when creating certs using certutil commands(without -m option). And how do we track what serial numbers were given to signed certificates ? Any documentation on the above subject would be helpful. Regards Niranjan -- dev-tech-crypto

Re: Explicitly distrusted certificates in certdata.txt (NSS built-in root CA certificate list)

2011-10-11 Thread Ludwig Nussel
eople have written scripts to extract the trusted root CA > certificates from this file. Florian Weimer provided us with the > following examples: > https://atlaswww.hep.anl.gov/twiki/bin/view/UsAtlasTier3/FetchingCA-bundle > http://cblfs.cross-lfs.org/index.php/OpenSSL > http://

Re: Explicitly distrusted certificates in certdata.txt (NSS built-in root CA certificate list)

2011-10-11 Thread Gervase Markham
On 11/10/11 05:02, Nelson B Bolyard wrote: > I'd say it's going to be difficult for the typical scripting language to do > the recommended instructions. How about putting the distrusted certs and > their trust objects in a separate file in the CVS repository? What particularly do you think is dif

Re: Explicitly distrusted certificates in certdata.txt (NSS built-in root CA certificate list)

2011-10-10 Thread Nelson B Bolyard
ipts to extract the trusted root CA > certificates from this file. [...] > After the two CA break-in incidents this year, certdata.txt started to > contain several explicitly distrusted certificates. Scripts that > extract trusted root CA certificates from certdata.txt must now check >

Re: Explicitly distrusted certificates in certdata.txt (NSS built-in root CA certificate list)

2011-10-10 Thread Robert Relyea
e (which may not be a > CA) is explicitly distrusted. > > Note: I recommend that the scripts assert that these attributes only > have these three values, so that it can detect when this assumption is > no longer true. > > The scripts must exclude the certificates whose trust

Explicitly distrusted certificates in certdata.txt (NSS built-in root CA certificate list)

2011-10-10 Thread Wan-Teh Chang
certificates from this file. Florian Weimer provided us with the following examples: https://atlaswww.hep.anl.gov/twiki/bin/view/UsAtlasTier3/FetchingCA-bundle http://cblfs.cross-lfs.org/index.php/OpenSSL http://curl.haxx.se/docs/parse-certs.txt Originally certdata.txt contained only trusted root

Re: JSS SSLSocket problems choosing Client Certificates

2011-09-19 Thread Nelson B Bolyard
On 2011/09/07 09:38 PDT, praspa wrote: > > I'm trying to make two separate HTTPS requests to a remote host using two > client sockets and two different client certificates respectively (client > cert A and B). [...] > From my host, I'm able to make two connections on

JSS SSLSocket problems choosing Client Certificates

2011-09-09 Thread praspa
I'm trying to make two separate HTTPS requests to a remote host using two client sockets and two different client certificates respectively (client cert A and B). My test program is a modified version of: http://mxr.mozilla.org/mozilla/source/security/jss/org/mozilla/jss/ssl/SSLTest.java.

Re: CERT_PKIXVerifyCert does not recognize bogus certificates contained in nssckbi.dll

2011-04-07 Thread Joachim Lingner
On Thu, Apr 7, 2011 at 5:26 AM, Joachim Lingner wrote: Hi, I am testing NSS 3.9.12 with CKBI 1.82 on Windows. To verify that the bogus certificates are recognized as such I run vfychain. The certificates are exported from the Windows certificate store. Having vfychain use

Re: CERT_PKIXVerifyCert does not recognize bogus certificates contained in nssckbi.dll

2011-04-07 Thread Wan-Teh Chang
On Thu, Apr 7, 2011 at 5:26 AM, Joachim Lingner wrote: >  Hi, > > I am testing NSS 3.9.12 with CKBI 1.82 on Windows. To verify that the bogus > certificates are recognized as such I run vfychain. The certificates are > exported from the Windows certificate store. > >

CERT_PKIXVerifyCert does not recognize bogus certificates contained in nssckbi.dll

2011-04-07 Thread Joachim Lingner
Hi, I am testing NSS 3.9.12 with CKBI 1.82 on Windows. To verify that the bogus certificates are recognized as such I run vfychain. The certificates are exported from the Windows certificate store. Having vfychain use CERT_VerifyCertificate gives me this output [../nss/wntmsci12.pro/bin

Announcing a NSS release for Blocking Fraudulent Certificates

2011-03-23 Thread Kai Engert
This announcement is related to the same underlying issue as reported in http://blog.mozilla.com/security/2011/03/22/firefox-blocking-fraudulent-certificates/ While the above mentioned hotfix was made at the Mozilla client application level, we would like to provide a hotfix at the NSS level

Re: Known Issue? Looping CA Cross-Certificates not displayed as going to a Root CA

2011-03-07 Thread Brian Smith
Ridley wrote: > Presence both of a pair of cross-certificates in the Authorities > certificarte store results looping rather than traversing to a root > certificate. See https://bugzilla.mozilla.org/show_bug.cgi?id=634074. - Brian -- dev-tech-crypto mailing list dev-te

Known Issue? Looping CA Cross-Certificates not displayed as going to a Root CA

2011-03-06 Thread Ridley
Presence both of a pair of cross-certificates in the Authorities certificarte store results looping rather than traversing to a root certificate. Although the looping appears to end in the 5th scrolled image [See link to gallery below], that is ending at a cross- certificate and not a root. It

Re: Encoding and comparing certificates with NSS

2011-02-01 Thread Ambroz Bizjak
On Feb 1, 12:45 am, Robert Relyea wrote: > If I were you, I'd double check my byte compare code in B. Try > connecting to A with one cert and to B with another and make sure it > fails. In our previous example, you clearly had a mangled version of > certificate C sent to be, but you indicated tha

Re: Encoding and comparing certificates with NSS

2011-01-31 Thread Robert Relyea
o these two certs identify the same subject", then you >> may need to do much more work. >> > Just byte-comparing seems right; I see no reason why system C would > want > to use different certificates for connecing to A and C. > > Thank you for your response. I think my

Re: Encoding and comparing certificates with NSS

2011-01-30 Thread Ambroz Bizjak
certs identical" > then comparing both from stem to stern is a very good way.  If you're > trying to ask "do these two certs identify the same subject", then you > may need to do much more work. > Just byte-comparing seems right; I see no reason why system C would want

Re: Encoding and comparing certificates with NSS

2011-01-30 Thread Nelson B Bolyard
On 2011-01-29 06:06 PDT, Ambroz Bizjak wrote: > Hello. I have a problem with NSS. Here's what I'm trying to achieve: [ If I may paraphrase, system C sends a cert to systems A and B. ] [ A forwards its copy to B. B must compare the two copies. ] > Here's how I encoded the certificate (on

Encoding and comparing certificates with NSS

2011-01-29 Thread Ambroz Bizjak
ing so, it must identify with the same client certificate as it did to A. So, I made A encode C's certificate to DER format and send it to system B, before ordering C to connect to B. Once C connects to B, B byte-compares the peer provided ant the server provided certificates to make sure they

Accessing Server Certificates Read-Only with XUL / DOM / JS

2010-11-17 Thread georg
Hello, I'd like to be able to read the server certificate and the certificate chain that belongs to a page loaded via an HTTPS connection. Are there any bindings for that in JavaScript, XUL, or DOM so that I can easily do that in a Firefox extension? I read the respective APIs on MDC but didn't f

Re: problem Importing certificates in NSS db using Cert_importcerts -

2010-10-19 Thread Brian Smith
> I am using NSS on linux as a part of a bigger project. To implement > similar functionality on windows I used windows system APIs. If you > have any working example pl. share with me. That's OK. Post a complete, minimal program that runs on Linux. -- dev-tech-crypto mailing list dev-tech-crypt

Re: problem Importing certificates in NSS db using Cert_importcerts -

2010-10-19 Thread PeachUser
> Sent: Tuesday, October 19, 2010 8:06:33 AM > Subject: Re: problem Importing certificates in NSS db using Cert_importcerts - > > CAN Somebody please help me ??? > THanks > > On Oct 18, 12:32 pm, PeachUser wrote: > > I am implementing functionality  which needs to tak

Re: problem Importing certificates in NSS db using Cert_importcerts -

2010-10-19 Thread Brian Smith
Importing certificates in NSS db using Cert_importcerts - CAN Somebody please help me ??? THanks On Oct 18, 12:32 pm, PeachUser wrote: > I am implementing functionality  which needs to take trusted root > certs from user and use it to do SSl handshake. > I use CERT_ImportCert > I read a DER

Re: problem Importing certificates in NSS db using Cert_importcerts -

2010-10-19 Thread PeachUser
CAN Somebody please help me ??? THanks On Oct 18, 12:32 pm, PeachUser wrote: > I am implementing functionality  which needs to take trusted root > certs from user and use it to do SSl handshake. > I use CERT_ImportCert > I read a DER file get the data and length  , create  SECItem  and then > pas

problem Importing certificates in NSS db using Cert_importcerts -

2010-10-18 Thread PeachUser
I am implementing functionality which needs to take trusted root certs from user and use it to do SSl handshake. I use CERT_ImportCert I read a DER file get the data and length , create SECItem and then pass it to the CERt_importCerts. I am keeping both the "keepcerts" and "isCA" flags true.

Re: Thunderbird problem with the search for certificates in the S-TRUST trust list service

2010-06-10 Thread Nelson B Bolyard
On 2010-06-10 07:49 PDT, Jean-Marc Desperrier wrote: > Nelson B Bolyard wrote: >> Fame and Glory await.:-) > > Which means a mention in http://www.mozilla.org/credits/ or about:credits : >We would like to thank our contributors, whose efforts make this > software what it is. [...] >Any su

Re: Thunderbird problem with the search for certificates in the S-TRUST trust list service

2010-06-10 Thread Jean-Marc Desperrier
Nelson B Bolyard wrote: Fame and Glory await.:-) Which means a mention in http://www.mozilla.org/credits/ or about:credits : We would like to thank our contributors, whose efforts make this software what it is. [...] Any such contributors who wish to be added to the list should send mail

Re: Thunderbird problem with the search for certificates in the S-TRUST trust list service

2010-06-09 Thread Nelson B Bolyard
On 2010-06-09 05:18 PDT, the_flyingdutch wrote that when fetching certs from LDAP ... > [...] Thunderbird can evaluate maximum two certificates of the > email receiver, even if the email receiver owns more than two > certificates. This behaviour prevents that the encoding certificate i

Thunderbird problem with the search for certificates in the S-TRUST trust list service

2010-06-09 Thread the_flyingdutch
Dear crypto-groupe , below i wrote down our Technical cause analysis for Thunderbird problem with the search for certificates in the S-TRUST trust list service and will please you, to support us with this question: the analysis of the phenomenon has proved that the problem is caused client-sided

Re: automatically deleting expired certificates..

2010-05-19 Thread Robert Relyea
On 05/19/2010 02:51 PM, Bud P. Bruegger wrote: > Hello, I would like to ask your advice on how to best deal with a > problem related to deleting certificates/keys. > > I'm currently experimenting with creating short-lived certificates for > TLS-client-authentication using the

automatically deleting expired certificates..

2010-05-19 Thread Bud P. Bruegger
Hello, I would like to ask your advice on how to best deal with a problem related to deleting certificates/keys. I'm currently experimenting with creating short-lived certificates for TLS-client-authentication using the element. While it seems easy to create the keys/certs, I have

Re: Classification of client certificates by NSS / Mozilla Firefox

2010-05-06 Thread M.Hunstock
Am 05.05.2010 21:28, schrieb Nelson B Bolyard: > Hopefully I've cleared that up with my explanation above. Yes you did. Thanks for the very verbose explanation. Matthias -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: Classification of client certificates by NSS / Mozilla Firefox [SOLVED]

2010-05-05 Thread Nelson B Bolyard
use I assumed NSS looks for the values > in the X.509 certificate itself... NSS does look at values in the certificate, but searches for certificates are done based on attribute values. -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: Classification of client certificates by NSS / Mozilla Firefox

2010-05-05 Thread Nelson B Bolyard
On 2010/05/04 12:10 PDT, Robert Relyea wrote: > 2) almost all tokens mark the private key as private, and it's not even > findable if the token has not been logged in. As Honras and Nelson > pointed out, this is what makes a cert 'yours'. It's also used when > deciding if a cert is usable for cl

Re: Classification of client certificates by NSS / Mozilla Firefox [SOLVED]

2010-05-05 Thread M.Hunstock
On 05.05.2010 11:05, M.Hunstock wrote: > In the meanwhile it appears in the correct tab, but the trust chain > cannot be built. It says something like "this certificate could not be > verified for an unknown reasen" (I have a localized version of FF). Well.. "if you do everything right, everthin

Re: Classification of client certificates by NSS / Mozilla Firefox

2010-05-05 Thread M.Hunstock
Am 05.05.2010 12:03, schrieb Kaspar Brand: > Does the cert viewer not show any chain (under "Details"), or is it just > showing the "Could not verify this certificate for unknonw reasons" > message on the "General" tab? It is the latter, on the "Details" tab in the chain field it shows just the

Re: Classification of client certificates by NSS / Mozilla Firefox

2010-05-05 Thread Kaspar Brand
On 05.05.2010 11:05, M.Hunstock wrote: > In the meanwhile it appears in the correct tab, but the trust chain > cannot be built. It says something like "this certificate could not be > verified for an unknown reasen" (I have a localized version of FF). Does the cert viewer not show any chain (under

Re: Classification of client certificates by NSS / Mozilla Firefox

2010-05-05 Thread M.Hunstock
Am 05.05.2010 08:59, schrieb Kaspar Brand: > Does your cert / CKO_CERTIFICATE object lack a label? My application sets it to "null" (Java app), but even when I put something into that label.. there are strange results. I read the labels with pkcs11-tool from openSC, and it prints out something.

Re: Classification of client certificates by NSS / Mozilla Firefox

2010-05-05 Thread M.Hunstock
Am 04.05.2010 21:10, schrieb Robert Relyea: > If the token is marked with the publically readable certs/friendly > flag, then NSS will not try to authenticate to it before looking up > certs and depend on the public key semantics to identify 'user' certs. > If your token does not have a public

Re: Classification of client certificates by NSS / Mozilla Firefox

2010-05-05 Thread Kaspar Brand
On 04.05.2010 19:39, M.Hunstock wrote: > Is there some magic done with the labels, too? Does your cert / CKO_CERTIFICATE object lack a label? If so, I remember having seen a similar issue. The problem "starts" with this PSM code, most likely: http://bonsai.mozilla.org/cvsblame.cgi?file=mozilla/s

Re: Classification of client certificates by NSS / Mozilla Firefox

2010-05-04 Thread Robert Relyea
> That results in 2 questions from me: > > 1. What is the criteria of NSS for distinguishing between "own" and > "others" certificates? > > 2. I recently read that there is a hidden flag to mark a token > implementation as "friendly", allowing

Re: Classification of client certificates by NSS / Mozilla Firefox

2010-05-04 Thread M.Hunstock
resume that the token does not possess > the corresponding private key. That seems true. Now the IDs are equal - and another problem arises. The certificate is now shown in the "Your certificates" tab, but something seems to be wrong with the labels. The certificate cannot be linked to t

Re: Classification of client certificates by NSS / Mozilla Firefox

2010-05-04 Thread Nelson B Bolyard
oduces" cards, I have a strange effect when trying to use them. > > There is a PKCS#11 module for the tokens used, which loads and works > fine e.g. in Firefox. When a token is inserted, Firefox shows the > certificate on the token only in the "Other Persons" tab, but not in

Re: Classification of client certificates by NSS / Mozilla Firefox

2010-05-04 Thread Honza Bambas
On 5/4/2010 3:41 PM, M.Hunstock wrote: 1. What is the criteria of NSS for distinguishing between "own" and "others" certificates? This function [1] used from [2] should return true for your certificate. If there is a private key, then you should see it in the user tab

Classification of client certificates by NSS / Mozilla Firefox

2010-05-04 Thread M.Hunstock
is a PKCS#11 module for the tokens used, which loads and works fine e.g. in Firefox. When a token is inserted, Firefox shows the certificate on the token only in the "Other Persons" tab, but not in "Your certificates" although there is a matching keypair on the token and I manual

Re: Difference between Firefox and Thunderbird in Supplied Root Certificates

2010-04-09 Thread randrews
Kaspar is correct; the server is returning the wrong intermediate cert. You can see this by using VeriSign's Chain Checker at https://knowledge.verisign.com/support/ssl-certificates-support/index?page=content&id=AR1130 I'll have our support team contact the customer. Thanks for

Re: Difference between Firefox and Thunderbird in Supplied Root Certificates

2010-04-09 Thread Ulrich Boche
Kaspar Brand schrieb am 09.04.2010 18:28: On 09.04.2010 15:35, Ulrich Boche wrote: According to Firefox, the complete chertificate chain is: service.lbb.de VeriSign Class 3 Secure Server CA - G2 Builtin Object Token: Verisign Class 3 Public Primary Certification Authority - G2 The certificat

Re: Difference between Firefox and Thunderbird in Supplied Root Certificates

2010-04-09 Thread Kaspar Brand
On 09.04.2010 15:35, Ulrich Boche wrote: > According to Firefox, the complete chertificate chain is: > > service.lbb.de > > VeriSign Class 3 Secure Server CA - G2 > > Builtin Object Token: Verisign Class 3 Public Primary Certification > Authority - G2 > > The certificate I listed is only the i

Re: Difference between Firefox and Thunderbird in Supplied Root Certificates

2010-04-09 Thread Ulrich Boche
Eddy Nigg schrieb am 09.04.2010 15:14: On 04/09/2010 04:05 PM, Ulrich Boche: I'm not sure what the right newsgroup for this problem is. If I'm not at the right place here, please let me know. Apparently, the the CA root certificates that are supplied with Firefox 3.6.3 are different

Re: Difference between Firefox and Thunderbird in Supplied Root Certificates

2010-04-09 Thread Eddy Nigg
On 04/09/2010 04:05 PM, Ulrich Boche: I'm not sure what the right newsgroup for this problem is. If I'm not at the right place here, please let me know. Apparently, the the CA root certificates that are supplied with Firefox 3.6.3 are different from those that come with Thunderb

Re: Difference between Firefox and Thunderbird in Supplied Root Certificates

2010-04-09 Thread Eddy Nigg
On 04/09/2010 04:05 PM, Ulrich Boche: I'm not sure what the right newsgroup for this problem is. If I'm not at the right place here, please let me know. Apparently, the the CA root certificates that are supplied with Firefox 3.6.3 are different from those that come with Thunderb

Difference between Firefox and Thunderbird in Supplied Root Certificates

2010-04-09 Thread Ulrich Boche
I'm not sure what the right newsgroup for this problem is. If I'm not at the right place here, please let me know. Apparently, the the CA root certificates that are supplied with Firefox 3.6.3 are different from those that come with Thunderbird 3.0.4. The following CA certifi

Re: Domain-validated name-constrained CA certificates?

2010-04-07 Thread Matt McCutchen
ces, this is the same concern raised in the Problematic Practices for wildcard certificates, except that the name constraints allow multiple labels (i.e., dots): https://wiki.mozilla.org/CA:Problematic_Practices#Wildcard_DV_SSL_certificates Personally I'm not worried about this weak attempt to fo

Re: Domain-validated name-constrained CA certificates?

2010-04-07 Thread Nelson B Bolyard
On 2010-04-07 01:54 PST, Jean-Marc Desperrier wrote: > Matt McCutchen wrote: >> On Apr 6, 5:54 am, Jean-Marc Desperrier wrote: >>>> Matt McCutchen wrote: >>>>> > An extended key usage of "TLS Web Server Authentication" on the >>>>&

  1   2   3   4   5   6   >