On 2009-07-28 10:41 PDT, Grant Gayed wrote:
(originally posted on the mozilla.dev.security group, was suggested to post
here as well)
Yeah, this is the right place.
I work on the SWT Browser, which embeds XULRunner. I've been stuck on a
problem for a while now, and would really appreciate
On 2009-07-28 12:53 PDT, sudha panchag wrote:
Hi I am trying to write a program to communicate to a smart card (Athena)
when connected. The program must generate certificate requests and also
generate key pair.
I have been following the window.crypto functions and it is able to
generate a
The NSS 3.12.3.1 release is now available. The CVS tag is
NSS_3_12_3_1_RTM. You can download the source tarball
from
https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_12_3_1_RTM/src/
NSS 3.12.3.1 requires NSPR 4.7.4 or later.
NSS 3.12.3.1 fixes the following bugs in NSS
On 07/30/2009 10:22 PM, Drew:
I just upgraded to XULRunner 1.9.1, and my application is now no
longer accepting my cert_override.txt. If I change my application.ini
to use 1.9.0.11, it works fine.
I'm using a wildcard certificate (signed by GoDaddy) for *.domain.com,
but my server URL is
On 2009-07-30 13:02 PDT, Eddy Nigg wrote:
On 07/30/2009 10:22 PM, Drew:
I just upgraded to XULRunner 1.9.1, and my application is now no
longer accepting my cert_override.txt. If I change my application.ini
to use 1.9.0.11, it works fine.
I'm using a wildcard certificate (signed by GoDaddy)
On 2009-07-30 14:21 PDT, Nelson B Bolyard wrote:
On 2009-07-30 13:02 PDT, Eddy Nigg wrote:
On 07/30/2009 10:22 PM, Drew:
I just upgraded to XULRunner 1.9.1, and my application is now no
longer accepting my cert_override.txt. If I change my application.ini
to use 1.9.0.11, it works fine.
Thank you both for your quick reply. I've gotten it working with a
CNAME at the correct subdomain level.
Out of curiosity, what's the CA and client support for SubjectAltName
at this time?
On Jul 30, 2:02 pm, Eddy Nigg eddy_n...@startcom.org wrote:
On 07/30/2009 10:22 PM, Drew:
I just
On 2009-07-30 15:50 PDT, Drew wrote:
Thank you both for your quick reply. I've gotten it working with a
CNAME at the correct subdomain level.
Out of curiosity, what's the CA and client support for SubjectAltName
at this time?
All major desktop browsers have supported SANs for years, IINM.
Wan-Teh Chang wrote:
The NSS 3.12.3.1 release is now available. The CVS tag is
NSS_3_12_3_1_RTM. You can download the source tarball
from
https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_12_3_1_RTM/src/
As far as I can see, CERT_VerifyCertName() is still vulnerable to the
On 2009-07-30 19:04 PDT, Howard Chu wrote:
As far as I can see, CERT_VerifyCertName() is still vulnerable to the
embedded NUL hack that was recently published here
http://www.wired.com/threatlevel/2009/07/kaminsky/ and on slashdot. Yet
some comments in the discussion say that Firefox 3.5 is
On 31/7/09 04:29, Nelson B Bolyard wrote:
... So, a name with a NULL in it will appear
as something like www.mybank.com\00*.badguy.org
There must be something I am missing. Since when is a NULL a legal
character in a domain?
iang
--
dev-tech-crypto mailing list
On 2009-07-30 19:46 PDT, Ian G wrote:
On 31/7/09 04:29, Nelson B Bolyard wrote:
... So, a name with a NULL in it will appear
as something like www.mybank.com\00*.badguy.org
There must be something I am missing. Since when is a NULL a legal
character in a domain?
Read the article that
12 matches
Mail list logo