On 2009-03-02 at 21:02 -0600, Peter da Silva wrote:
> On 2009-03-02, at 15:35, Phil Pennock wrote:
> > On wifi, you're fooling yourself if you think that accepting arbitrary
> > unverified host certs is better than nothing.
> 
> You're not "accepting arbitrary unverified certs".
> 
> You just need to accept "the same unverified cert as last time". Then  
> you can go ahead and scream if it changes. But if you're using the  
> same cert you used the last time you connected to the site, you're not  
> in any greater danger than you were the last time.

Right, using it like ssh and latching onto a value and, if particularly
security conscious, connecting from a vaguely trusted location the first
time.

Now please re-read what the OP wrote and note that he was clicking
through certs blindly, which meant it was the first connection; the
complaints here generally read as both ssh is good (agreed) and an
advocacy to use a mode of behaviour akin to turning off host key
checking, which so misses the point that it's not funny.

Note that the old FF behaviour would nag on every connection and the new
behaviour is to prompt carefully on first connection but to default to
latching onto the key for next time.  So FF changed to use ssh's model
and other people here complain that it's not as easy to click through
and you shouldn't have to do this and the old behaviour was fine and if
you don't agree then you must be arguing against ssh too.  Pathetic.

Reply via email to