Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(520)

Issue 9875010: nss: Fix GetCertType returning SERVER_CERT for explicitly distrusted CA certs. (Closed)

Created:
8 years, 9 months ago by mattm
Modified:
8 years, 8 months ago
Reviewers:
wtc, Ryan Sleevi
CC:
chromium-reviews, cbentzel+watch_chromium.org, darin-cc_chromium.org
Visibility:
Public.

Description

nss: Fix GetCertType returning SERVER_CERT for explicitly distrusted CA certs. (Based on wtc's patch from crbug.com/96654.) BUG=96654 TEST=X509CertificateModelTest.GetTypeCA Committed: https://src.chromium.org/viewvc/chrome?view=rev&revision=129662

Patch Set 1 : #

Total comments: 6

Patch Set 2 : review changes, add HasTrustedPeer test #

Patch Set 3 : review changes, add server testcase #

Total comments: 3
Unified diffs Side-by-side diffs Delta from patch set Stats (+108 lines, -3 lines) Patch
M chrome/chrome_tests.gypi View 1 2 chunks +6 lines, -0 lines 0 comments Download
A chrome/common/net/x509_certificate_model_unittest.cc View 1 1 chunk +101 lines, -0 lines 3 comments Download
M chrome/third_party/mozilla_security_manager/nsNSSCertHelper.cpp View 1 2 1 chunk +1 line, -3 lines 0 comments Download

Messages

Total messages: 10 (0 generated)
mattm
Is setting the cert trust on a temporary cert ok? It seems to work for ...
8 years, 9 months ago (2012-03-28 02:53:39 UTC) #1
wtc
On 2012/03/28 02:53:39, mattm wrote: > Is setting the cert trust on a temporary cert ...
8 years, 9 months ago (2012-03-28 18:10:13 UTC) #2
wtc
Patch set 1 LGTM. Mozilla upstream still has this bug: http://mxr.mozilla.org/mozilla-central/ident?i=getCertType The Mozilla upstream bug ...
8 years, 9 months ago (2012-03-28 19:36:05 UTC) #3
mattm
I added a test case for the server certs too. I wanted to add one ...
8 years, 9 months ago (2012-03-29 00:24:45 UTC) #4
wtc
Patch set 3 LGTM. I didn't realize that the old Mozilla bug https://bugzilla.mozilla.org/show_bug.cgi?id=178692 involved an ...
8 years, 8 months ago (2012-03-29 18:39:37 UTC) #5
Ryan Sleevi
Hey matt, just some quick drive-by nits. https://chromiumcodereview.appspot.com/9875010/diff/12001/chrome/common/net/x509_certificate_model_unittest.cc File chrome/common/net/x509_certificate_model_unittest.cc (right): https://chromiumcodereview.appspot.com/9875010/diff/12001/chrome/common/net/x509_certificate_model_unittest.cc#newcode33 chrome/common/net/x509_certificate_model_unittest.cc:33: } use ...
8 years, 8 months ago (2012-03-29 19:26:49 UTC) #6
Ryan Sleevi
On 2012/03/29 18:39:37, wtc wrote: > Patch set 3 LGTM. > > I didn't realize ...
8 years, 8 months ago (2012-03-29 19:29:34 UTC) #7
mattm
On 2012/03/29 19:29:34, Ryan Sleevi wrote: > On 2012/03/29 18:39:37, wtc wrote: > > Patch ...
8 years, 8 months ago (2012-03-29 19:44:27 UTC) #8
mattm
On 2012/03/29 19:26:49, Ryan Sleevi wrote: > Hey matt, just some quick drive-by nits. > ...
8 years, 8 months ago (2012-03-29 19:47:05 UTC) #9
wtc
8 years, 8 months ago (2012-03-30 00:53:10 UTC) #10
On 2012/03/29 19:29:34, Ryan Sleevi wrote:
>
> Is this true that we're breaking such certs from being trusted?

Such certs can still be trusted by being chained up to a trusted
root CA cert.

What won't work is to explicitly trust such certs as server certs,
without building a chain.

> It's already enough of a gripe on several other devices (namely, ICS G:N),
that
> require v3 certificates, and there are a number of large sites (such as
> Dreamhost) that still issue v1 certs for internal servers.

Unless those v1 certs are self-signed server certs, they won't
be affected by this CL.

The problem we need to solve is to determine whether a v1 cert is
a CA cert or an SSL server cert.  Since a v1 cert has no extensions,
CERT_IsCACert() assumes a v1 self-signed cert is a root cert.
I guess if the Subject common name is a DNS name, we can guess the
v1 self-signed cert is a server cert.

Powered by Google App Engine
This is Rietveld 408576698