You are currently viewing a snapshot of www.mozilla.org taken on April 21, 2008. Most of this content is highly out of date (some pages haven't been updated since the project began in 1998) and exists for historical purposes only. If there are any pages on this archive site that you think should be added back to www.mozilla.org, please file a bug.



You are here: NSS project page > S/MIME Toolkit

S/MIME Toolkit

Newsgroup: mozilla.dev.tech.crypto
Technical contacts: Christian Kaiser
Yell at the manager: Bob Lord

Overview

The S/MIME Toolkit provides S/MIME functionality via an API that can be integrated with a variety of MIME parsers and generators. It will support S/MIME version 3 features.

The S/MIME Toolkit cannot act as a MIME parser on its own. It includes a simple parser for testing, but final applications will need to use a MIME parser like the one developed for the Mozilla mail/news project (see libmime).

Project Information

To check out the source code,

cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co mozilla/security

The library source code is located in nss/lib/smime. Two utilities are located in nss/cmd/smimetools:

  • smime is a Perl script that turns ordinary RFC822 messages into signed and/or encrypted S/MIME messages that verify and decrypt correctly in Netscape Communicator 4.7 and Microsoft Outlook.
  • cmsutil generates CMS/PKCS7 messages and is used by smime.

You can send an automatically generated, signed email as follows:

"cat rfc822msg.txt | smime -S "nickname" -p "passwd" | mail chrisk@netscape.com"

"nickname" is the nickname of the certificate to sign with, and "passwd" is the key database password.

The message sent to chrisk@netscape.com is signed and verifies correctly with Netscape Communicator 4.7 and Microsoft Outlook.

Current Tasks

Our current task list includes the following:

  • Document a first cut at an API and begin to refine it.
  • Review the API to determine fitness for inclusion into various MIME parsers, changing the API definition where necessary.
  • Create a test harness that can ideally be integrated into the build process.
  • Create a prioritized list of further tasks, such as: Implement Cryptographic Message Syntax (CMS) and S/MIME v3 features.

Status Summary

We have completed and posted the version 1.0 code to mozilla.org.

Target Applications

Possible applications for the new S/MIME Toolkit include:

  • S/MIME support in the Mozilla mail/news client.
  • S/MIME support in WebMail clients.
  • EDI messaging.
  • A Perl module that can be used to generate and process S/MIME messages using Perl scripts.

Design

The S/MIME Toolkit will be implemented on top of the core NSS crypto and PKI services.

The S/MIME API will be implemented in C for several reasons:

  • The existing NSS code is in C, so sticking with C maintains the same level of portability.
  • Not all widely-used C++ compilers are up to the current standards.
  • Some applications (especially embedded apps) may not want the C++ runtime performance overhead.
  • Some of the NSS C code on which S/MIME depends may be difficult to interface with a C++ API.
  • Of course, there may be some software engineering and maintenance advantages to C++, so we should not consign it to the dustbin just yet.

Project Goals

The overall goal for the S/MIME Toolkit is to create useful code that can be implemented in real applications. To help keep us focused on that goal, the list below shows what we want to accomplish.

The S/MIME Toolkit will...

  • Make S/MIME easy to use and integrate in a wide variety of MIME parsers and generators.

    We want a flexible API that anticipates the possible needs of users. For example, we need to support regular and streaming input and output.

    We will need an implementation of Cryptographic Message Syntax (CMS) to get full support for cryptographic messages in non-email/MIME contexts.

    Finally, we will need S/MIME-specific glue code to allow easy integration with common MIME parsers and generators.

  • Implement commonly used features of S/MIME v3.

    The following features are currently on the "commonly used" list, in order of decreasing importance:

    • sMimeCapabilities and sMimeEncryptionKeyPreferences attributes
    • signingCertificate attribute
    • DSA signatures
    • Triple-DES CBC bulk encryption
    • Diffie-Helman key agreement protocol
  • Provide an API specifically for generating and processing CMS messages.

    S/MIME is based on CMS messages, but CMS messages have many useful applications even outside the context of MIME (wallets, data storage, generic messaging, etc.).

  • Provide a support tool that can sign, verify, encrypt, and decrypt S/MIME and raw CMS messages.

    A toolkit just isn't easy to use if it's harder to test and verify the code than it is to write it.

  • Provide a lightweight MIME parser suitable for basic testing

Non-Goals

The Non-Goals list shows some things that could be done, but that we are explicitly excluding.

The S/MIME Toolkit will not...

  • Be a reference implementation for S/MIME v3.

    The S/MIME Toolkit will not implement all of the features of S/MIME v3. For example, support for some parts of ESS are not planned at this time.

  • Parse or generate MIME headers.

    The goal is to integrate with the MIME parsers/generators that have already been built, debugged, and stood the test of time.

Feature List

The list below prioritizes the features to be implemented. For each feature, the S/MIME Toolkit will be able to generate or process the attribute (or feature) using an appropriate API.

The toolkit should be able to process message containing any features and attributes defined in RFC2632, RFC2633, or RFC2634 without displaying adverse behavior. Features marked with (*) are available in the current PKCS7 and i S/MIME implementations for Communicator.

  1. MIME Parser Interface: Input/output both in streaming and one-shot mode (* - streaming mode)
  2. MIME Parser Interface: both clear-signed and inline-signed messages (multipart/signed and application/pkcs7-mime)
  3. CMS: SignedData objects, with internal and external signatures (RFC2630 - 5) (* - external signatures)
  4. CMS: EnvelopedData objects (RFC2630 - 6) (*)
  5. SMIME: smimeCapabilities attribute
  6. CERT: Build list of certificates and CRLs for SignedData messages (*)
  7. CMS: MD5 and SHA1 digest algorithms (RFC2630 12.1.1, 12.1.2) (*)
  8. CMS: RSA signature algorithm (RFC2630 12.2.2) (*)
  9. CMS: DSA signature algorithm (RFC2630 - 12.2.1) (*)
  10. CMS: RSA Key Transport Protocol RFC2630 12.3.2.1) (*)
  11. CMS: Triple-DES CBC and RC2 CBC content encryption algorithms (RFC2630 12.4.1 and 12.4.2) (*)
  12. SMIME: sMIMEEncryptionKeyPreference attribute (dual key support)
  13. ESS: signingCertificate attribute (RFC2634 - 5)
  14. ESS: Triple Wrapping (RFC2634 - 1.1)
  15. CMS: "degenerate" SignedData objects containing certs and CRLs only (RFC2630 - 5)
  16. CMS: Ephemeral Static Diffie-Helman Key Agreement Protocol (ESDH) (RFC2630 12.3.1.1). This includes Triple-DES and RC2 key wrap algorithms
  17. CMS: EncryptedData objects (RFC2630 - 8)
  18. The following features are lower in priority and are not likely to be included in version 1.0:

    CMS: Static Static Diffie Hellman Key Agreement Protocol (SSDH) (RFC2630 12.3.1.1)
  19. CMS: multiple signers for SignedData objects
  20. CMS: counter signatures (RFC2630 - 11.4)
  21. CMS: DigestedData objects (RFC2630 - 7)
  22. CMS: AuthenticatedData objects (RFC2630 - 9)
  23. ESS: Signed Receipt Requests and Receipts (RFC2634 - 2)
  24. ESS: Security Labels (RFC2634 - 3)
  25. ESS: contentHints attribute (RFC2634 - 2.9)
  26. ESS: contentIdentifier / contentReference attributes (RFC2634 - 2.7, 2.11)
  27. ESS: Mail List Agent (MLA) Processing (RFC2634 - 4)