Firefox 3 Installer for Halevi-Krawczyk Hash

Back to the project page.

This is a private Firefox 3 built for the Firefox implementation of Halevi-Krawczyk Hash. It contains code changes in NSS library as explained here.

This is built on Windows XP with ActiveX disable. It has only been tested on Windows XP. Please note that the baseline source code is from the development branch in Mozilla CVS server and thus the code is not considered stable. This is only meant for demo purpose.

Step 1

Download the installer firefox-3.0a2pre.en-US.win32.installer.exe. Verify the file size: 5743916 Bytes.

Warning: This is NOT A FINAL OR PRE-RELEASE VERSION. This program is provided without any guarantees of stability, so please use it at your own risk. It is recommended that you back up your profile regularly, as there may be bugs that corrupt your data. If that sounds scary, you'd probably be better off with the latest version of Firefox that you can download here.

Step 2

Run the installer file, please note that it is called "Minefield" because this is not an official release. It will NOT override your current install of Firefox on your system. The first dialog in the installer:

The second dialog on the License Agreement:

The third dialog for Setup Type, choose "Standard".

Step 3: Start Firefox

When you start the Firefox (Minefield), please notice the "Warning".

Step 4: Import Testing CA

The self-signed testing CA is here. This is needed so that Firefox will trust the randomized signed digital certificate on https://cryptohash.stanford.edu, which is signed by this CA. Download this .crt. Please right click on the link crypto_ca.crt and choose "Save Link As" or "Save Target As" (on IE) file and save it on your system.

The reason you need this in your browser is so that the browser will do the signature verification. If a digital certificate is signed by an unknown CA, then the browser will only display a warning dialog and by-pass signature verification after you choose to accept the certifiate for the current browser session.

From "Tools" menu, choose "Options". Then, select "Encryption" tab and click on "View Certificates" button.

You will see the "Certificate Manager" dialog. Choose "Authorities" tab, and then "Import" button.


Choose the "crypto_ca.crt" file on your local system, and you will see this dialog. Check "Trust this CA to identify web sites.".

Step 4: Run the Test

You may run the test by visiting https://cryptohash.stanford.edu. After the page is loaded, you may view the certificate information by choosing "Tools" menu, then "Page Info", and finally selecting the "Security" tab.

Step 5: Uninstall Firefox (Minefield)

After you are done, you can use the standard Windows Control Panel to remove the Minefield Browser.

Go back to the project page.