Classification: UNCLASSIFIED Caveats: NONE Hi, Great to hear et all. I have had a couple of meetings with the PKE team but I think it would be a good idea to get Neil and some of the folks that raised their hands for testing together on a phone call and work out an actual game plan for: 1) Where will the plug-in be hosted? 2) Where is the "official" location for the plug-in to pull certs? 3) Establish our testing/validation for the plug-in? 4) How to push it and or include it in the standard "DoD Firefox" install Pete and or Stuart, I think that PKE should setup the call since its really down to a coordination effort between your team/process and "Us" so what is a good time for you all? Neil et all - aka "Us" - what's are good times for you? Thanks, Aaron > -----Original Message----- > From: Saiki, Stuart [mailto:Stuart.Saiki@xxxxxxxxxxx] > Sent: Monday, June 02, 2008 4:40 PM > To: Lippold, Aaron L CIV DISA PEO-GES; Todd Denniston; Neil M. > Cc: coolkey-devel@xxxxxxxxxx; PKE_Support; Petronello, Peter (BAE) > Subject: RE: Enterprise Deployment of Root > Certificates (UNCLASSIFIED) > > Aaron, > We'll be happy to test the plug-in. Please coordinate with > Pete Petronello from the PKE Team. > > Stuart Saiki > Tech Lead > DoD PKE Engineering Support > Ennovex Solutions, Inc. > Office: 703.889.5377 > Mobile: 703.269.8829 > stuart.saiki@xxxxxxxxxxx > www.ennovex.com > > > > > > -----Original Message----- > From: Lippold, Aaron L CIV DISA PEO-GES > [mailto:Aaron.Lippold@xxxxxxxx] > Sent: Monday, June 02, 2008 3:01 PM > To: Todd Denniston; Neil M. > Cc: coolkey-devel@xxxxxxxxxx > Subject: RE: Enterprise Deployment of Root > Certificates > (UNCLASSIFIED) > > > Classification: UNCLASSIFIED > Caveats: NONE > > Hello, > > The DISA OSSG, Neil McNab and PKE are going to try and collaborate on > the FF/TB "DOD Configure" plug-in. It works very well and at > this point > we only need to get the certificates sources "nodded" at by PKE and a > testing and update process defined between Neil and the PKE team. > > Neil would still be the maintainer but is hoping to collaborate more > with PKE so that we could offer a "vetted" version of the code and > provide it to the DOD community on the gov/mil side of the > house. Given > that Firefox is now the official replacement of our > antiquated Netscape > 7.x browser, this becomes more of an issue all around. > > Of course, we are always looking for folks interested in testing and > helping push this effort along so please raise your hands. We all have > to get it working anyway right? :) > > Yours, > > Aaron > > > -----Original Message----- > > From: coolkey-devel-bounces@xxxxxxxxxx > > [mailto:coolkey-devel-bounces@xxxxxxxxxx] On Behalf Of Todd > Denniston > > Sent: Monday, June 02, 2008 9:46 AM > > To: Neil M. > > Cc: coolkey-devel@xxxxxxxxxx > > Subject: Re: Enterprise Deployment of Root > > Certificates > > > > Neil M. wrote, On 06/01/2008 10:38 PM: > > > Whats the best way to do this so that they are available to > > all users > > > in Firefox/Thunderbird/Mozilla applications? All I can > > find is doing > > > it manually, which is problematic when you need to do > this for each > > > Mozilla app, for each user. Same problem as the coolkey > > module too. > > > Anyone have any ideas or know something I don't? Thanks. > > > > > > Neil > > > > As I _Understand_ it, the following is someone's attempt to > > do that with the DoD certs: > > https://addons.mozilla.org/en-US/thunderbird/user/37619 > > Perhaps you can use it as an example/starting point. > > > > -- > > Todd Denniston > > Crane Division, Naval Surface Warfare Center (NSWC Crane) > > Harnessing the Power of Technology for the Warfighter > > > > _______________________________________________ > > Coolkey-devel mailing list > > Coolkey-devel@xxxxxxxxxx > > https://www.redhat.com/mailman/listinfo/coolkey-devel > > > Classification: UNCLASSIFIED > Caveats: NONE > > > Classification: UNCLASSIFIED Caveats: NONE
Attachment:
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ Coolkey-devel mailing list Coolkey-devel@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/coolkey-devel