Closed Bug 209168 Opened 21 years ago Closed 21 years ago

Mozilla Mail S/Mime instructs NSS to import the wrong certs

Categories

(MailNews Core :: Security: S/MIME, defect)

Other Branch
defect
Not set
normal

Tracking

(Not tracked)

VERIFIED FIXED

People

(Reporter: KaiE, Assigned: KaiE)

References

Details

(Keywords: fixed1.4, regression, Whiteboard: [adt2])

Attachments

(1 file)

cc'ing many people, mostly FYI When Mozilla Mail processes an S/Mime message, it tries to import the certs contained in the message. It does so by calling NSS_CMSSignedData_ImportCerts(.., .., certUsageEmailSigner, ..); This seems to be wrong. It should instead import type certUsageEmailRecipient. In the past, before bug 193367 was fixed, this mistake didn't matter, because NSS_CMSSignedData_ImportCerts imported any contained cert.
The consequence of this bug is: Mozilla versions that uses an NSS version containing the fix from bug 193367, might not import the required certificate to reply using encrypted mail, if dual-key certificates are used. See also bug 209166, a related issue, that requests a more relaxed handling of importing S/Mime certificates.
Keywords: regression
Attached patch Patch v1Splinter Review
Suggested fix
Keywords: nsbeta1
fixing summary
Flags: blocking1.4?
Summary: Mozilla Mail S/Mime instructs NSS to import correct certs → Mozilla Mail S/Mime instructs NSS to import the wrong certs
Proposing this bug as a 1.4 blocker, because I believe this bug breaks S/Mime functionality when using dual key certificates.
Blocks: 74157
After having tested, I can confirm - Mozilla is currently broken - this patch fixes the problem Testing scenario: - set up a new Mozilla profile, let's call it RECIPIENT, with an empty certificate database, where you can receive mail - using another profile, let's call it SENDER, send a signed message using a dual key certificate (like the ones that are issued at testca.netscape.com). [all actions below are to be done in the RECIPIENT PROFILE] - use the RECIPIENT profile to receive the message [checkpoint] - read the received message, you should see a valid signature icon. - open certificate manager other people's tab. It's empty - click reply, and in the new compose message window, click the security icon. You'll see the recipient's name listed and the certificate status will be "not found". The above behaviour is incorrect. With the patch applied the tested behaviour after [checkpoint] is instead: - read the received message, you see the valid signature icon - open cert manager tab, you'll see the mail message sender's encryption cert - click reply in the received email message, click security icon. You'll see the certificate status is "valid".
Attachment #125502 - Flags: review?(ddrinan)
cc'ing Terry FYI
Comment on attachment 125502 [details] [diff] [review] Patch v1 Looks good r=relyea
Comment on attachment 125502 [details] [diff] [review] Patch v1 Thanks for the review, marking the patch as r=relyea.
Attachment #125502 - Flags: superreview?(kin)
Attachment #125502 - Flags: review?(ddrinan)
Attachment #125502 - Flags: review+
Attachment #125502 - Flags: superreview?(kin) → superreview+
Comment on attachment 125502 [details] [diff] [review] Patch v1 requesting branch approval for this regression fix
Attachment #125502 - Flags: approval1.4?
a=adt to land on the branch. Please add fixed1.4 keyword. nsbeta1+/adt2
Keywords: nsbeta1nsbeta1+
Whiteboard: [adt2]
/me waits for driver's approval before landing
fixed on trunk
Status: NEW → RESOLVED
Closed: 21 years ago
Resolution: --- → FIXED
*** Bug 203235 has been marked as a duplicate of this bug. ***
Comment on attachment 125502 [details] [diff] [review] Patch v1 Can't hurt. /be
Attachment #125502 - Flags: approval1.4? → approval1.4+
fixed on 1.4 branch after rc2, thanks a lot for approving.
Flags: blocking1.4?
Keywords: fixed1.4
Verified that expected results outlined in comment #5 occur in 1.4 branch 20030624 "With the patch applied the tested behaviour after [checkpoint] is instead: - read the received message, you see the valid signature icon - open cert manager tab, you'll see the mail message sender's encryption cert - click reply in the received email message, click security icon. You'll see the certificate status is "valid"."
Status: RESOLVED → VERIFIED
Product: PSM → Core
Product: Core → MailNews Core
QA Contact: bmartin → s.mime
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: