Firefox unable to use client certificates in Windows certificate store
Categories
(Core :: Security: PSM, defect, P3)
Tracking
()
People
(Reporter: pysrisur, Unassigned, NeedInfo)
References
(Depends on 1 open bug)
Details
(Keywords: csectype-other, Whiteboard: [psm-backlog])
| Reporter | ||
Updated•11 years ago
|
Updated•11 years ago
|
Comment 1•11 years ago
|
||
Comment 2•11 years ago
|
||
Comment 3•10 years ago
|
||
Updated•9 years ago
|
Updated•8 years ago
|
Comment 5•8 years ago
|
||
Comment 6•8 years ago
|
||
Comment 7•8 years ago
|
||
| Comment hidden (advocacy) |
Comment 9•7 years ago
|
||
Updated•7 years ago
|
Comment 10•7 years ago
|
||
Comment 11•7 years ago
|
||
| Comment hidden (advocacy) |
| Comment hidden (advocacy) |
| Comment hidden (advocacy) |
Comment 17•7 years ago
|
||
Comment 18•7 years ago
|
||
Comment 19•7 years ago
|
||
Comment 20•7 years ago
|
||
Comment 24•6 years ago
|
||
Would appreciate this feature too, because Enterprise certificate based applications do not work with Firefox, but with Chrome.
I'd like to keep Chrome outside the company....
Comment 25•6 years ago
|
||
FYI, My company just auto uninstalled & blocked Firefox and Thunderbird from all corporate assets.
Not honoring the system certificate store was the reason.
This will start to cause a larger decrease in installs & usage as this propagates.
Had to send this from chrome!
Comment 26•6 years ago
|
||
(In reply to Jestre from comment #25)
FYI, My company just auto uninstalled & blocked Firefox and Thunderbird from all corporate assets.
Not honoring the system certificate store was the reason.
This will start to cause a larger decrease in installs & usage as this propagates.
Had to send this from chrome!
Are you using client certificates specifically? Or just trying to read CAs from the system store?
| Comment hidden (off-topic) |
| Comment hidden (off-topic) |
Comment 31•6 years ago
|
||
If this was enabled, it is possible that Microsoft would be able to get Firefox working for Azure Active Directory Conditional Access bypass, so enterprise users implementing compliance policies or multi-factor authentication bypasses would be able to use FireFox (alongside Chrome, Edge, IE):
| Comment hidden (advocacy) |
Updated•6 years ago
|
Updated•6 years ago
|
Comment 33•6 years ago
|
||
The reason for me to use the Windows certificate store for client certificates, is that they can be marked as non-exportable. With Firefox, there's no way to prevent someone from making a backup of the client certificates.
Comment 34•6 years ago
|
||
In addition to Anthony, I am on the other side - a user, whose company administratively has marked the user certificate as non-exportable in Windows certstore. As result I cannot use Firefox productively and have to fallback to another pretty uncomfortable browser.
Comment 35•6 years ago
|
||
I think this might work in current Nightly now. Bug 1591269 and dependencies.
Firefox Nightly now supports using client auth certs directly from OS* storage - flip the pref "security.osclientcerts.autoload" to give it a try!
Comment 36•6 years ago
|
||
I can get the current nightly working with that setting in our corporate intranet - excellent! Hope this gets rolled out asap.
Comment 37•6 years ago
|
||
I tried it also and I was able to see my client certificate from the Windows store in the FF certificates. However, the client cert authentication didn't work, it seems FF didn't send my certificate to the remote server and I always get the logon page.
In addition, I was not able to see the trusted CA certificates from the Windows store. I had to import the relevant ones manually into the FF store in order for the server cert to be accepted.
Comment 38•6 years ago
|
||
@lassenov The server cert issue is another one, and has a solution, see bug 1265113 (tl:dr; set security.enterprise_roots.enabled in about:config to true).
Comment 39•6 years ago
|
||
Thanks, Cailin. After enabling enterprise roots I can see the trusted CAs now, but the client cert authn still fails.
How can I find out why it fails?
Comment 40•6 years ago
|
||
No clue, I only happened to know the answer to that one question :D
Comment 41•6 years ago
|
||
Caitlin: are you using nightly or something else?
Updated•6 years ago
|
Comment 42•6 years ago
|
||
I am already able to see the client certs in the Windows store and in most of the cases the client cert authn works. However, there are cases, where it doesn't. How can I check what is wrong or collect traces for further analysis?
Comment 43•6 years ago
|
||
(In reply to Lyubomir from comment #42)
I am already able to see the client certs in the Windows store and in most of the cases the client cert authn works. However, there are cases, where it doesn't. How can I check what is wrong or collect traces for further analysis?
You can file a new bug here: https://bugzilla.mozilla.org/enter_bug.cgi?product=Core&component=Security%3A%20PSM
It would be good to include things like what kinds of certificates work vs. don't, or if there are any server differences, and if you can, include a packet trace of the working/not working TLS handshakes.
Comment 44•6 years ago
|
||
Here is the new bug: https://bugzilla.mozilla.org/show_bug.cgi?id=1611471
Comment 45•6 years ago
|
||
I think we can go ahead and close this.
| Comment hidden (advocacy) |
Updated•6 years ago
|
Description
•