.. _mozilla_projects_nss_tools_signver: NSS tools : signver =================== .. container:: | Name | signver — Verify a detached PKCS#7 signature for a file. | Synopsis | signtool -A \| -V -d directory [-a] [-i input_file] [-o output_file] [-s | signature_file] [-v] | Description | The Signature Verification Tool, signver, is a simple command-line utility | that unpacks a base-64-encoded PKCS#7 signed object and verifies the | digital signature using standard cryptographic techniques. The Signature | Verification Tool can also display the contents of the signed object. | Options | -A | Displays all of the information in the PKCS#7 signature. | -V | Verifies the digital signature. | -d [sql:]directory | Specify the database directory which contains the certificates and | keys. | signver supports two types of databases: the legacy security | databases (cert8.db, key3.db, and secmod.db) and new SQLite | databases (cert9.db, key4.db, and pkcs11.txt). If the prefix sql: | is not used, then the tool assumes that the given databases are in | the old format. | -a | Sets that the given signature file is in ASCII format. | -i input_file | Gives the input file for the object with signed data. | -o output_file | Gives the output file to which to write the results. | -s signature_file | Gives the input file for the digital signature. | -v | Enables verbose output. | Extended Examples | Verifying a Signature | The -V option verifies that the signature in a given signature file is | valid when used to sign the given object (from the input file). | signver -V -s signature_file -i signed_file -d sql:/home/my/sharednssdb | signatureValid=yes | Printing Signature Data | The -A option prints all of the information contained in a signature file. | Using the -o option prints the signature file information to the given | output file rather than stdout. | signver -A -s signature_file -o output_file | NSS Database Types | NSS originally used BerkeleyDB databases to store security information. | The last versions of these legacy databases are: | o cert8.db for certificates | o key3.db for keys | o secmod.db for PKCS #11 module information | BerkeleyDB has performance limitations, though, which prevent it from | being easily used by multiple applications simultaneously. NSS has some | flexibility that allows applications to use their own, independent | database engine while keeping a shared database and working around the | access issues. Still, NSS requires more flexibility to provide a truly | shared security database. | In 2009, NSS introduced a new set of databases that are SQLite databases | rather than BerkleyDB. These new databases provide more accessibility and | performance: | o cert9.db for certificates | o key4.db for keys | o pkcs11.txt, which is listing of all of the PKCS #11 modules contained | in a new subdirectory in the security databases directory | Because the SQLite databases are designed to be shared, these are the | shared database type. The shared database type is preferred; the legacy | format is included for backward compatibility. | By default, the tools (certutil, pk12util, modutil) assume that the given | security databases follow the more common legacy type. Using the SQLite | databases must be manually specified by using the sql: prefix with the | given security directory. For example: | # signver -A -s signature -d sql:/home/my/sharednssdb | To set the shared database type as the default type for the tools, set the | NSS_DEFAULT_DB_TYPE environment variable to sql: | export NSS_DEFAULT_DB_TYPE="sql" | This line can be set added to the ~/.bashrc file to make the change | permanent. | Most applications do not use the shared database by default, but they can | be configured to use them. For example, this how-to article covers how to | configure Firefox and Thunderbird to use the new shared NSS databases: | o https://wiki.mozilla.org/NSS_Shared_DB_Howto | For an engineering draft on the changes in the shared NSS databases, see | the NSS project wiki: | o https://wiki.mozilla.org/NSS_Shared_DB | See Also | signtool (1) | The NSS wiki has information on the new database design and how to | configure applications to use it. | o Setting up the shared NSS database | https://wiki.mozilla.org/NSS_Shared_DB_Howto | o Engineering and technical information about the shared NSS database | https://wiki.mozilla.org/NSS_Shared_DB | Additional Resources | For information about NSS and other tools related to NSS (like JSS), check | out the NSS project wiki at | [1]\ `http://www.mozilla.org/projects/security/pki/nss/ `__. The NSS site relates | directly to NSS code changes and releases. | Mailing lists: https://lists.mozilla.org/listinfo/dev-tech-crypto | IRC: Freenode at #dogtag-pki | Authors | The NSS tools were written and maintained by developers with Netscape, Red | Hat, and Sun. | Authors: Elio Maldonado , Deon Lackey | . | Copyright | (c) 2010, Red Hat, Inc. Licensed under the GNU Public License version 2. | References | Visible links | 1. `http://www.mozilla.org/projects/security/pki/nss/ `__