Closed
Bug 377604
Opened 18 years ago
Closed 2 years ago
certutil should take PQGParams from issuer's cert, if possible
Categories
(NSS :: Tools, enhancement, P5)
Tracking
(Not tracked)
RESOLVED
INACTIVE
People
(Reporter: nelson, Unassigned)
Details
certutil has an option to read in a file of PQGParams and use that for
the generation of the keypair in the CSR or cert being generated.
In a real world scenario, a user would not have a PQGParams file, but
rather would have the CA's cert, whose public key would contain the
PQGParams that he should use in the generation of his own key.
NSS's cert chain validation code (in NSS shared libraries) is smart enough
to go up the chain and get missing PQGParams from a parent certificate,
but certutil is not that smart.
certutil has no way to specify the intended issuer's cert when generating a CSR.
So, there's no way for certutil to get the PQGParams from the issuer's cert
when generating a CSR.
certutil DOES have a way to specify the intended issuer's cert when generating
a new cert (when certutil is acting as the CA, issuing the new cert). But
even in this case, certutil does not take the PQGParameters for the new cert
from the issuer's cert.
In both cases (generating a CSR, or issuing a cert), if the PQGParams are not
explicitly given in a PQGParams file, then certutil uses a compiled-in
"default" set of PQGParams, rather than trying to get the real params from
the intended issuer cert.
I think this is low priority. DSA's lifetime ends in 2010. It's not in
widespread use now. So, the priority is going to be on developing the new
technology to go forward, not in perfecting this essentially obsolete DSA
technology. I predict this bug will sit inactive for a while, then be
resolved WONTFIX.
Updated•3 years ago
|
Severity: normal → S3
Updated•2 years ago
|
Severity: S3 → N/A
Status: NEW → RESOLVED
Closed: 2 years ago
Priority: -- → P5
Resolution: --- → INACTIVE
You need to log in
before you can comment on or make changes to this bug.
Description
•