Open secondary (additional) read-only system NSS database
Categories
(NSS :: Libraries, defect)
Tracking
(Not tracked)
People
(Reporter: KaiE, Unassigned)
References
Details
(Whiteboard: [psm-shared-db])
Attachments
(1 file, 1 obsolete file)
2.17 KB,
patch
|
KaiE
:
review-
rrelyea
:
review+
|
Details | Diff | Splinter Review |
Comment 1•14 years ago
|
||
Comment 2•14 years ago
|
||
Reporter | ||
Comment 3•14 years ago
|
||
Comment 4•14 years ago
|
||
Comment 5•14 years ago
|
||
Comment 6•14 years ago
|
||
Comment 7•14 years ago
|
||
Comment 8•14 years ago
|
||
Comment 9•14 years ago
|
||
Reporter | ||
Comment 10•14 years ago
|
||
Reporter | ||
Updated•14 years ago
|
Comment 12•13 years ago
|
||
Comment 13•12 years ago
|
||
Comment 14•12 years ago
|
||
Comment 15•10 years ago
|
||
Comment 16•10 years ago
|
||
Comment 17•9 years ago
|
||
Comment 18•9 years ago
|
||
Comment 19•9 years ago
|
||
Updated•4 years ago
|
Comment 20•4 years ago
|
||
@J.C. Jones Can you kindly undo your recent change to the status of this bug?
@David Woodhouse: p11-kit-trust.so only handles CA certificates; it does not pull in the PKCS#11 security module configuration, which is stored in the system-wide NSS database. This is required where smart cards are used (using security modules such as OpenSC, either directly or via the p11-kit-proxy security module). This was part of the issue reported with this bug.
As it stands now, the PKCS#11 module configuration still has to be manually added to every Firefox/Thunderbird profile after the application is first launched by the user and the NSS databases are created at that time. Changes to the system-wide NSS database won't propagate (for example, if the system administrator replaces the CoolKey module with OpenSC).
Comment 21•4 years ago
|
||
David, I presume you are running on Linux? If your firefox/thunderbird is build with policy enabled, you can add the line to our policy file:
name=p11-kit-proxy
library=p11-kit-proxy.so
On Fedora or RHEL 8 the policy file is in /etc/crypto-policies/back-ends/nss.config.
On RHEL7 it's in /etc/pki/nss-legacy/nss-rhel7.config
For other distributions look at the build scripts for POLICY_FILE and POLICY_PATH.
Comment 22•4 years ago
|
||
David,
Let me know if Bob's advice here isn't a good resolution. Otherwise, I don't see us changing NSS' behavior to load multiple SQLite databases.
Updated•6 months ago
|
Description
•