Add a GUI option to toggle the "Friendly certs" option of NSS
Categories
(Core :: Security: PSM, enhancement, P5)
Tracking
()
People
(Reporter: martin, Unassigned)
References
(Blocks 1 open bug)
Details
(Whiteboard: [psm-smartcard])
Comment 1•15 years ago
|
||
Comment 2•14 years ago
|
||
Updated•14 years ago
|
Comment 3•9 years ago
|
||
Comment 4•9 years ago
|
||
Updated•9 years ago
|
Comment 5•9 years ago
|
||
Comment 6•9 years ago
|
||
Comment 7•9 years ago
|
||
Comment 8•9 years ago
|
||
Updated•8 years ago
|
Updated•3 years ago
|
Comment 10•2 years ago
|
||
I am suffering from this issue as well. I can say the same for a handful of colleagues who also have a PKCS#11 hard cert/smart card.
This issue notes that there is no GUI based way to set the "friendly" flag to enable read of public certs on tokens, but is there a more advanced way/workaround such as a flag in about:config?
The interval at which my PKCS#11 Module under Settings > Privacy & Security > Security > Security Devices > <MY_SMARTCARD> automatically logs itself out is super painful. It automatically logs out at ~ a 2 minute interval any time I am actively using it to connect to the server that requires it.
Is there a way to enable the friendly flag at all at present? If not, is there a way to extend the duration that the smart card is considered "logged in"? As it is, I've been suffering typing in my pin every two minutes for going on a year, but this is the only viable path at my company for myself and my colleagues.
Please provide details concerning any known workarounds if possible. Thank you!
I am imagining the solution to this issue looks like two new about:config values
security.pki.enable_friendly_certs (bool)
security.pki.logged_in_time_out (int)
I do not care what the defaults are for this, but I'd expect if the first proposed configuration value is set to true, then pub certs are readable without a pin. For the second config, the value could represent a number of minutes before a smart badge logs out and requires a pin for all certs if the latter config is false, or for only private certs if the latter config is true.
This is my single biggest problem with Firefox. I created a Bugzilla account specifically to share how important I consider this.
Comment 11•2 years ago
|
||
What OS are you using?
One thing you could do is write a web extension that installs your PKCS#11 module with the correct flags: https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/WebExtensions/API/pkcs11/installModule
Comment 12•2 years ago
|
||
OS is Windows 10
Most of our machines are locked down pretty hard with corporate policy. Likely a custom solution like what you’ve suggested would (unfortunately) not pass security requirements for wider distributon, but I can look into it in any case. Does an extension to install such a module already exist perhaps in an extensions marketplace that is known to be reputable? Regardless, a native solution would be strongly preferable over something custom/third party in the long term.
Any way to change the settings on a security device that’s already installed perhaps?
Comment 13•2 years ago
|
||
You could have a look at https://github.com/open-eid/firefox-pkcs11-loader, which I believe corresponds to https://addons.mozilla.org/en-US/firefox/addon/pkcs11-module-loader/
Why do you need to load a PKCS#11 module at all? Does osclientcerts not work? (about:config -> security.osclientcerts.autoload should be true by default).
Comment 14•2 years ago
|
||
First time I hear about it. Firefox now has smart card support via platform keychain/cng key/cert support? This is built into FF: https://github.com/mozkeeler/osclientcerts ? Super cool in that case.
Comment 15•2 years ago
|
||
(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #13)
You could have a look at https://github.com/open-eid/firefox-pkcs11-loader, which I believe corresponds to https://addons.mozilla.org/en-US/firefox/addon/pkcs11-module-loader/
Why do you need to load a PKCS#11 module at all? Does osclientcerts not work? (
about:config->security.osclientcerts.autoloadshould be true by default).
The flag is disabled as the default smart cards provided to employees are basic assurance, but we have specific medium assurance certs that don't play nicely with company defaults, so the security.osclientcerts.autoload is disabled for our use case and we load our MA certs manually to deconflict.
Comment 16•2 years ago
|
||
I will look at the plugin you referenced! Thanks Dana.
Comment 17•2 years ago
|
||
(In reply to Martin Paljak from comment #14)
First time I hear about it. Firefox now has smart card support via platform keychain/cng key/cert support? This is built into FF: https://github.com/mozkeeler/osclientcerts ? Super cool in that case.
Can you provide context for how this relates to this discussion? If this is built into FF, then starting with what version?
Comment 18•2 years ago
|
||
(In reply to davidhinton23 from comment #16)
I will look at the plugin you referenced! Thanks Dana.
Unfortunately the referenced extension is not created by FF or another well known publisher. It's also not Open Source (that I know of). Given all that, security wont go for it. So this specific avenue is not viable for my use case. Could be exactly what someone else needs though, so thank you in any case!
Comment 19•2 years ago
|
||
(In reply to davidhinton23 from comment #17)
(In reply to Martin Paljak from comment #14)
First time I hear about it. Firefox now has smart card support via platform keychain/cng key/cert support? This is built into FF: https://github.com/mozkeeler/osclientcerts ? Super cool in that case.
Can you provide context for how this relates to this discussion? If this is built into FF, then starting with what version?
Apologies. I think I understand now, but please correct me if I'm wrong. The functionality provided by security.osclientcerts.autoload started with the referenced Github repository? The only hangup I have is that the README for mozkeeler/osclientcerts repo indicates:
For the time being, this module must be manually compiled and added to Firefox.
That said, are you mozkeeler @Dana Keeler? If so, I'm sure you know the full story.
Comment 20•2 years ago
|
||
Yes, that's my github account. That repo is out of date and unnecessary now - the functionality it provided is built-in to Firefox. It mainly exists for historical purposes at this point.
(In reply to davidhinton23 from comment #15)
Why do you need to load a PKCS#11 module at all? Does osclientcerts not work? (
about:config->security.osclientcerts.autoloadshould be true by default).The flag is disabled as the default smart cards provided to employees are basic assurance, but we have specific medium assurance certs that don't play nicely with company defaults, so the
security.osclientcerts.autoloadis disabled for our use case and we load our MA certs manually to deconflict.
Can you share more information here? What is the difference between "basic assurance" and "medium assurance" certificates? Why don't the medium assurance certificates work with your company's defaults?
Comment 21•2 years ago
|
||
(In reply to davidhinton23 from comment #18)
(In reply to davidhinton23 from comment #16)
I will look at the plugin you referenced! Thanks Dana.
Unfortunately the referenced extension is not created by FF or another well known publisher. It's also not Open Source (that I know of). Given all that, security wont go for it. So this specific avenue is not viable for my use case. Could be exactly what someone else needs though, so thank you in any case!
It is open source (as the link referenced to is github), published by Estonian e-gov (where all client software is open source)
Updated•1 year ago
|
Comment 22•1 year ago
|
||
Clear a needinfo that is pending on an inactive user.
Inactive users most likely will not respond; if the missing information is essential and cannot be collected another way, the bug maybe should be closed as INCOMPLETE.
For more information, please visit BugBot documentation.
Updated•1 year ago
|
Description
•