Closed
Bug 449883
Opened 17 years ago
Closed 17 years ago
Replace existing "GlobalSign Root CA" cert and add new WellsSecure cert
Categories
(NSS :: Libraries, defect)
Tracking
(Not tracked)
RESOLVED
FIXED
People
(Reporter: KaiE, Assigned: KaiE)
References
Details
Attachments
(3 files)
|
13.59 KB,
patch
|
rrelyea
:
review+
nelson
:
review+
|
Details | Diff | Splinter Review |
|
844 bytes,
patch
|
nelson
:
review+
|
Details | Diff | Splinter Review |
|
114.86 KB,
application/octet-stream
|
Details |
I want to do a single patch to fix both 446407 and 449393.
| Assignee | ||
Updated•17 years ago
|
Assignee: nobody → kaie
| Assignee | ||
Comment 1•17 years ago
|
||
I used
addbuiltin -n "GlobalSign Root CA" -t C,C,C < globalsign_446407.crt
and used the output to replace the existing "GlobalSign Root CA".
I used
addbuiltin -n "WellsSecure Public Root Certificate Authority" -t C,, < wellssecure_449393.crt
to add the new WellsSecure cert.
| Assignee | ||
Comment 2•17 years ago
|
||
Attachment #333011 -
Flags: superreview?(nelson)
Attachment #333011 -
Flags: review?(rrelyea)
| Assignee | ||
Comment 3•17 years ago
|
||
| Assignee | ||
Comment 4•17 years ago
|
||
If we are able to get patch v1 added to the NSS 3.11 branch very quickly, before the NSS 3.11.10 release, then we can avoid updating the roots module version number on the 3.11 branch.
However, should we miss the train, I'll attach a patch for updating the version on the 3.11 branch. We'll decide that later.
| Assignee | ||
Comment 5•17 years ago
|
||
| Assignee | ||
Comment 6•17 years ago
|
||
$ sha1sum nssckbi.dll
82c5cdc1e30d677eea0653031f92f867caace91f nssckbi.dll
Comment 7•17 years ago
|
||
Do we actually want to replace an existing cert?
Or do we rather want to add it as a new cert?
If someone has a signed document, signed (say) 3 years ago (or 5 or 10),
will its signature still validate (as of the date it was signed) with
the new cert?
Comment 8•17 years ago
|
||
If the new cert has the same public key as the one it replaces, and if its
validity period entirely overlaps the old one (starts not later than the
old one started), then replacing it is fine. Is that the case here?
| Assignee | ||
Comment 9•17 years ago
|
||
(In reply to comment #7)
> Do we actually want to replace an existing cert?
yes
> Or do we rather want to add it as a new cert?
I'd say: no
(In reply to comment #8)
> If the new cert has the same public key as the one it replaces
according to bug 406794: yes
> and if its
> validity period entirely overlaps the old one (starts not later than the
> old one started),
according to my inspection: yes
> then replacing it is fine. Is that the case here?
I think it is.
Updated•17 years ago
|
Attachment #333011 -
Flags: superreview?(nelson) → review+
Comment 10•17 years ago
|
||
The intention is to replace the cert. See the authorization bug and discussion at m.d.t.c
| Assignee | ||
Updated•17 years ago
|
Attachment #333013 -
Flags: review?(rrelyea)
Comment 11•17 years ago
|
||
Comment on attachment 333011 [details] [diff] [review]
Patch v1 for both NSS 3.12x and NSS 3.11.x
r+ It appears we are replacing the global sign cert with one with the same Subject/Issuer/and Key. I did not verify that the proper extensions exist in the new cert (that is I did not actually decode the certificate).
this matches with the description in the bug.
I also see ae are adding WellsSecure which also matches the description in the bug.
bob
Attachment #333011 -
Flags: review?(rrelyea) → review+
Updated•17 years ago
|
Attachment #333013 -
Flags: review+
| Assignee | ||
Updated•17 years ago
|
Attachment #333013 -
Flags: review?(rrelyea)
| Assignee | ||
Comment 12•17 years ago
|
||
checked in the root changes and the version number increase on trunk.
Checking in certdata.c;
/cvsroot/mozilla/security/nss/lib/ckfw/builtins/certdata.c,v <-- certdata.c
new revision: 1.50; previous revision: 1.49
done
Checking in certdata.txt;
/cvsroot/mozilla/security/nss/lib/ckfw/builtins/certdata.txt,v <-- certdata.txt
new revision: 1.49; previous revision: 1.48
done
Checking in nssckbi.h;
/cvsroot/mozilla/security/nss/lib/ckfw/builtins/nssckbi.h,v <-- nssckbi.h
new revision: 1.16; previous revision: 1.15
done
| Assignee | ||
Comment 13•17 years ago
|
||
checked in the root changes to the 3.11 branch
(no version increase necessary, because that already happened since the last release)
Checking in certdata.c;
/cvsroot/mozilla/security/nss/lib/ckfw/builtins/certdata.c,v <-- certdata.c
new revision: 1.36.24.13; previous revision: 1.36.24.12
done
Checking in certdata.txt;
/cvsroot/mozilla/security/nss/lib/ckfw/builtins/certdata.txt,v <-- certdata.txt
new revision: 1.37.24.12; previous revision: 1.37.24.11
done
| Assignee | ||
Comment 14•17 years ago
|
||
Marking fixed as of 3.11.10
Status: NEW → RESOLVED
Closed: 17 years ago
Resolution: --- → FIXED
Version: 3.12.1 → 3.11.10
You need to log in
before you can comment on or make changes to this bug.
Description
•