>And you have a clue for us on how to do that?
>Kind regards
>Philipp Kern
Some ideas that were proposed:
1) make use of the already existing openssl-blacklist infrastructure
2) drop the offending CA (this is already the third -publicly reported-
incident specifically involving them)
3) take
On Fri, Mar 25, 2011 at 11:40:48AM +, giff g wrote:
> This is in response to DSA 2200-1
> http://lists.debian.org/debian-security-announce/2011/msg00068.html
> The issue got fixed for iceweasel but to my understanding this still leaves
> other browsers, libraries and tools that use TLS/SSL vuln
Package: ca-certificate
Version: 20090814+nmu2
From: giffgi...@hotmail.com
To: t...@security.debian.org
Subject: ca-certificate: blacklist invalid certs
Date: Thu, 24 Mar 2011 13:02:03 +
Package: ca-certificate
Version: 20090814+nmu2
Hello!
This is in response to DSA 2200-1
http://l
3 matches
Mail list logo