Julien Pierre wrote:
Mr nospam,

nospam wrote:

Are mozilla and openssl commercial products? If so, I've had a misconception. If apache uses openssl (and it does), and suddenly openssl is gone, it harms apache...which harms mozilla.


Sorry, but I don't see how harm to Apache harms Mozilla. They don't share code. They interoperate - but commercial products do that too. Mozilla also interoperates with commercial server products, and Apache also interoperates with commercial client products.

The features I mentioned above are all implemented in moz browser products,
accessible via html, javascript, and the GUI.  (At least in Mozilla 1.x,
and probably in FireFox too.)  They are also available in command line
utilities.  Start looking here:

http://www.google.com/search?num=100&q=keygen-tag



Sorry, I did not know what to search for, as mozilla itself does not present any clues that this was even a possibility. I have no magic to pop "generateCRMFRequest" into my brain to search for. That's why I ask. If I must learn javascript or build programs that for example use "crypto.generateCRMFRequest()", then it is probably better to use openssl. I'm certainly not going to refer someone I'm trying to help to a programmer's man page, that'd be a total failure. I'm looking for tools to do the job, not API's to write something with.


You seem to misunderstand the audience. It's the job of the CA to take advantage of the APIs and leverage the features of the browser to trigger the keygen. This can be done transparently in pages served by the CA's web server that include Javascript code. This is far simpler than asking anyone to run any tool !

The web site will limit access via keys that have been signed by the web site admin, on a LAN, using a self-signed CA for the web site. This means that each user will need to have a key that is sent in and signed by the site prior to accessing the site. How can this be done in javascript? There will be no outside authority like Verisign. I fail to see how a key can be pre-approved via some automated javascript. There should in fact be no javascript required, as it is using Apache's mod_ssl to check a list of allowed users.

I believe that most browsers are able.  IINM, Safari offers the same
<keygen> tag as do Mozilla and Netscape. The methods by which a web page requests the generation of cert signing requests varies from one to another,
but the ability is there in most, if not all.



At this point it looks like it is easier to use openssl. I need one simple way to do this that I can send to other people who know nothing about programming or public/private key structure. I can't ask anyone to create scripts or edit javascript.


openssl certainly doesn't come standard on most operating systems, so relying on it is a big barrier to entry. It's additional work for someone to locate, download, install and manually run it . I think you'll agree that taking advantage of a tag in a browser that the user is already running is far easier.

The thing is that I can create a cert even if they don't. That means I'd have a private key that they use, but the key would only be for access to one internal/private LAN site. The key is to determine what directories are to be accessible. Everyone involved has a Linux install. So even if I don't provide the actual keys, I can easily provide a script to do so if I can figure it out myself (yes, it is more desireable if I don't have to see their private key, but it also doesn't matter much since this is the only site it is for).

Now if I am able to provide instructions that are simpler than using OpenSSL, that's an improvement...showing them an API page is not going show them how to create key pairs for me to sign. I have yet to see how mozilla can create a key pair directly from the browser, which is necessary without external programs if it is to replace OpenSSL for these limited purposes.
_______________________________________________
mozilla-crypto mailing list
[email protected]
http://mail.mozilla.org/listinfo/mozilla-crypto

Reply via email to