⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 impl-mozilla.htm

📁 The Open–source PKI Book Version 2.4.6 Edition Copyright &copy 1999, 2000 by Symeon (Simos) Xenite
💻 HTM
字号:
<HTML><HEAD><TITLE>Mozilla Open Source PKI projects</TITLE><METANAME="GENERATOR"CONTENT="Modular DocBook HTML Stylesheet Version 1.55"><LINKREL="HOME"TITLE="The Open&#8211;source PKI Book"HREF="ospki-book.htm"><LINKREL="UP"TITLE="Open-Source Implementations"HREF="implementations.htm"><LINKREL="PREVIOUS"TITLE="Jonah: Freeware PKIX reference implementation"HREF="impl-jonah.htm"><LINKREL="NEXT"TITLE="MISPC Reference Implementation"HREF="impl-mispc.htm"></HEAD><BODYCLASS="SECT1"BGCOLOR="#FFFFFF"TEXT="#000000"LINK="#0000FF"VLINK="#840084"ALINK="#0000FF"><DIVCLASS="NAVHEADER"><TABLEWIDTH="100%"BORDER="0"CELLPADDING="0"CELLSPACING="0"><TR><THCOLSPAN="3"ALIGN="center">The Open&#8211;source PKI Book: A guide to PKIs and Open&#8211;source Implementations</TH></TR><TR><TDWIDTH="10%"ALIGN="left"VALIGN="bottom"><AHREF="impl-jonah.htm">Prev</A></TD><TDWIDTH="80%"ALIGN="center"VALIGN="bottom">Chapter 7. Open-Source Implementations</TD><TDWIDTH="10%"ALIGN="right"VALIGN="bottom"><AHREF="impl-mispc.htm">Next</A></TD></TR></TABLE><HRALIGN="LEFT"WIDTH="100%"></DIV><DIVCLASS="SECT1"><H1CLASS="SECT1"><ANAME="IMPL-MOZILLA">Mozilla Open Source PKI projects</A></H1><P>  Currently, the software application that makes most use of PKI technology  is the WWW browser. This importance was realised by Netscape and has lead  to the creation of two libraries to aid the unified support of cryptography  and security for both the browser and server software. These libraries are   the Network Security Services (NSS) and the Personal Security Manager (PSM)   and provide the functionality of a PKI.  </P><P>  These libraries are also plagued with the export&#8211;control regulations  and currently it is under consideration to receive an export license.  However, in this case, there is an additional problem with the patents  and the licenses that covers parts of the cryptographic software   that makes the release of the source code even more difficult.  Currently, the source code distributed does not contain the full functionality  and thus, cannot be compiled. The result of this procedure remains to be seen.   On the other hand, binary version of these libraries are both available and  exportable from the US.  For more information on the licensing and crypto issues, there is an appropriate  <AHREF="http://www.mozilla.org/crypto-faq.html"TARGET="_top">Mozilla Crypto FAQ</A>.  </P><P>  These libraries (with the exclusion of code on crypto and patented components by   third&#8211;parties) are covered by the   <AHREF="http://www.mozilla.org/MPL/"TARGET="_top">Mozilla Public License</A> and the   <AHREF="http://www.gnu.org/copyleft/gpl.html"TARGET="_top">GNU General Public License</A>.   The use is free to choose under which of the two licenses to   use the source code, either the MPL terms or the GPL terms.   </P><DIVCLASS="SECT2"><H2CLASS="SECT2"><ANAME="IMPL-MOZILLA-PSM">Personal Security Manager (<SPANCLASS="ACRONYM">PSM</SPAN>)</A></H2><P>  Personal Security Manager (PSM) is a client-independent desktop security module.   It performs PKI operations on behalf of desktop client applications, including   certificate and key management, SSL, S/MIME, cryptographic token support, and   centralized administration.   </P><P>  More information can be found at the  <AHREF="http://www.mozilla.org/projects/security/pki/psm/"TARGET="_top">  Personal Security Manager (PSM)</A> WWW page.  </P></DIV><DIVCLASS="SECT2"><H2CLASS="SECT2"><ANAME="IMPL-MOZILLA-NSS">Network Security Services (<SPANCLASS="ACRONYM">NSS</SPAN>)</A></H2><P>  Network Security Services (NSS) is a set of libraries designed to support   cross-platform development of security-enabled server applications.  Applications built with NSS can support SSL v2 and v3, TLS, PKCS #5, PKCS #7,   PKCS #11, PKCS #12, S/MIME, X.509 v3 certificates, and other security standards.   </P><P>  More information can be found at the   <AHREF="http://www.mozilla.org/projects/security/pki/nss/"TARGET="_top">  Network Security Services (NSS)</A> WWW page.  </P></DIV><DIVCLASS="SECT2"><H2CLASS="SECT2"><ANAME="IMPL-MOZILLA-JAVASCRIPT">JavaScript API for Client Certificate Management</A></H2><P>  As part of the Personal Security Manager, a new JavaScript API for Client  Certificate Management has been implemented. The effect of this is that  specific client PKI functionality can move to the browser, allowing  implementations like <AHREF="impl-openca.htm">the section called <I>The OpenCA Project[TODO]</I></A> and <AHREF="implementations.htm#IMPL-PYCA">the section called <I>The pyCA Certification Authority</I></A>  to fully take advantage of it.  </P><P>  This is the functionality supported by PSM version 1.0.  <P></P><OLTYPE="1"><LI><P>	User fill out enrollment form.	</P></LI><LI><P>	User action initiates script (for example, pressing submit).	</P></LI><LI><P>	The script calls the key&#8211;generation method.	</P></LI><LI><P>	Encryption and Signing key&#8211;pairs are generated.	</P></LI><LI><P>	The Encryption Private Key is wrapped with the the public key of the 	Key Recovery Authority (<SPANCLASS="ACRONYM">KRA</SPAN>).	The public key of the KRA is passed in in the form of a certificate 	as part of the script and is checked against a pre&#8211;installed	certificate copy in the local certificate database.	</P></LI><LI><P>	Both the Encryption and Signing Public keys, the wrapped encryption	public key and a text string from the script are signed by the user's	Signing Private Key. The text string can contain naming or enrollment	information.	</P></LI><LI><P>	The signed information is returned to the script (from the PSM).	</P></LI><LI><P>	The script submits the signed information and other necessary information	to the CA/RA.	</P></LI><LI><P>	The CA/RA verify the signature of the signed information.	</P></LI><LI><P>	The CA/RA validate the identity of the user.	</P></LI><LI><P>	The CA/RA sends the wrapped Encryption Private Key to the KRA.	</P></LI><LI><P>	The KRA sends escrow verification information back to the CA.	</P></LI><LI><P>	The CA creates and signs the certificates.	</P></LI><LI><P>	The CA sends the created certificates back to the PSM&#8211;capable	browser.	</P></LI><LI><P>	The certificates are stored.	</P></LI></OL>  More information can be found at the   <AHREF="http://docs.iplanet.com/docs/manuals/psm/11/cmcjavascriptapi.html"TARGET="_top">  JavaScript API for Client Certificate Management</A> WWW page.  </P></DIV></DIV><DIVCLASS="NAVFOOTER"><HRALIGN="LEFT"WIDTH="100%"><TABLEWIDTH="100%"BORDER="0"CELLPADDING="0"CELLSPACING="0"><TR><TDWIDTH="33%"ALIGN="left"VALIGN="top"><AHREF="impl-jonah.htm">Prev</A></TD><TDWIDTH="34%"ALIGN="center"VALIGN="top"><AHREF="ospki-book.htm">Home</A></TD><TDWIDTH="33%"ALIGN="right"VALIGN="top"><AHREF="impl-mispc.htm">Next</A></TD></TR><TR><TDWIDTH="33%"ALIGN="left"VALIGN="top">Jonah: Freeware PKIX reference implementation</TD><TDWIDTH="34%"ALIGN="center"VALIGN="top"><AHREF="implementations.htm">Up</A></TD><TDWIDTH="33%"ALIGN="right"VALIGN="top">MISPC Reference Implementation</TD></TR></TABLE></DIV></BODY></HTML>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -