On 13-Oct-09, at 2:04 AM, Rob Stradling wrote:
An alternate approach I'd like to lobby our front-end guys on would be
to put up a scary red bar when we can't validate OCSP.

I think that your suggestion strikes a good balance between security and
useability.

Sorry I missed this thread - Canadian thanksgiving wreaks havoc on an inbox.

This piece of this conversation sounds an awful lot like: https://bugzilla.mozilla.org/show_bug.cgi?id=496661 , and in comment 8, I outline my own thinking on the constraints under which that kind of UI would need to operate. I'm not sure I agree with Nelson in comment 11, characterizing my reply as a de facto WONTFIX, but I do feel like it's a hard line to walk. The temptation to attach UI to this problem sets off "blame the user" alarms for me - do we think that uses will make better decisions with this information? Like I say, I don't think we're at WONTFIX on this question, but I don't think it's an easy problem to solve correctly, either.

As for ipsCA, I find myself agreeing with Eddy's point: that the null bytes are a regrettable validation error that we should work with ipsCA to ensure they fix; but NXDOMAIN on an OCSP server that appears in issued certs is a bigger problem. I'm talking with Frank and Kathleen about options there. I think contacting the CA and understanding their situation is certain to be part of it. I think suspension of their trust bits is a possible outcome, but it's premature to talk about that before giving ipsCA a full chance to explain things. We break 6k cert holders if we do that, which I'll support if we don't have better options, but I don't see that we're there yet.

Do others really feel like we've exhausted other options or that attempts to communicate with the CA are fruitless?

Johnathan

---
Johnathan Nightingale
Human Shield
[email protected]



_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

Reply via email to