Nelson Bolyard wrote:
> Gervase Markham wrote:
>> Eddy Nigg (StartCom Ltd.) wrote:
>>> The fact that connections to expired certificates are allowed by most if
>>> not all browser vendors contributes to this problem, if this certificate
>>> is removed from the CRL...than it's just an expired certificate which
>>> was once valid, compared to a certificate which is actually revoked.
>> Indeed. For Firefox 3, we plan to treat revoked and expired equally,
>> preventing access in both cases.
> 
> Gerv, I am SO delighted to hear that!
> But, I have not heard (or read) it anywhere else.  :-/

I just confirmed it with Johnathan, as he was sitting across from me 
when I wrote that response :-).

> I gather that a lot of decisions about being made about the handling of
> security errors and "overrides" for FF3, decisions that may change the way
> things work significantly.  I applaud that, especially if it results in
> fewer security errors being overridable on the "spur of the moment" by
> someone who is actively falling for a phishing attack..
> 
> But where are these decisions being recorded?  Where can I go to read about
> them, and try to keep up with them?

It's a fair question. I agree that communication about the plans could 
be improved. I'll think about how best to do that.

Gerv
_______________________________________________
dev-security mailing list
dev-security@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security

Reply via email to