Re: Firefox security too strict (HSTS?)?

2015-09-16 Thread AnilG
Co-incidentally, now that I've resolved that certificate problem, I am now getting an issue connecting to https://support.mozilla.org/1/firefox/40.0.3/Darwin/en-GB/clicktoplay Secure Connection Failed The connection to support.mozilla.org was interrupted while the page was loading. The page

Re: Firefox security too strict (HSTS?)?

2015-09-16 Thread Kathleen Wilson
On 9/16/15 1:13 AM, Kurt Roeckx wrote: I think they can distribute the certificate for use by chrome and internet explorer by using the group policy and so it's trivial for them to distribute it to all the PCs. It might be a little bit more complicated to do the same for Firefox. We have

Re: Firefox security too strict (HSTS?)?

2015-09-16 Thread Kurt Roeckx
On Wed, Sep 16, 2015 at 02:51:28PM -0700, AnilG wrote: > > there's another issue blocking them for Firefox: Secure Connection Failed. > The connection to wiki.mozilla.org was interrupted while the page was loading. I wonder if firefox is using certificate pinning for *.mozilla.org. Kurt

Re: Firefox security too strict (HSTS?)?

2015-09-16 Thread AnilG
On Thursday, 17 September 2015 08:02:21 UTC+10, David Keeler wrote: > On 09/16/2015 02:51 PM, AnilG wrote: > > Thanks Kathleen, those links might be helpful. I'm following them up in > > Chrome because there's another issue blocking them for Firefox: Secure > > Connection Failed. The connection

Re: Firefox security too strict (HSTS?)?

2015-09-16 Thread David Keeler
On 09/16/2015 02:51 PM, AnilG wrote: > Thanks Kathleen, those links might be helpful. I'm following them up in > Chrome because there's another issue blocking them for Firefox: Secure > Connection Failed. The connection to wiki.mozilla.org was interrupted while > the page was loading. The page

Re: Firefox security too strict (HSTS?)?

2015-09-16 Thread sjw
Yes, some hosts are pinned: https://dxr.mozilla.org/mozilla-central/source/security/manager/tools/PreloadedHPKPins.json MITM is *always* bad and breaks the web. Modern browsers, especially Firefox, have great features to protect the users and this is something good. I'm pretty sure your students

Re: Firefox security too strict (HSTS?)?

2015-09-16 Thread AnilG
On Thursday, 17 September 2015 09:27:15 UTC+10, s...@gmx.ch wrote: > MITM is *always* bad and breaks the web. Modern browsers, especially > Firefox, have great features to protect the users and this is something > good. I'm pretty sure your students don't even know, that you attack > their

Re: Firefox security too strict (HSTS?)?

2015-09-16 Thread Daniel Micay
Chrome has pinning too (in fact, Firefox's baseline list for HSTS and pinning is extracted from there). AFAIK, Mozilla just didn't ask for their domains to be pinned in Chromium. I don't think lack of support for MITM attacks is a bug that should be addressed. It's a security liability even when

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-16 Thread David E. Ross
On 9/15/2015 8:51 AM, Kathleen Wilson wrote [in part]: > Yes. My plan is to publish the DRAFT of version 2.3 of the policy and > list the changes, and then send a CA Communication to be sure they are > all aware of the proposed changes and give them time to respond. So, it > is very possible

Re: Policy Update Proposal: Remove Code Signing Trust Bit

2015-09-16 Thread Peter Kurrasch
‎It sounds as though the decision has been made, then: the code sign trust bit is out as are the pertinent certs. With Gerv giving a repeated "best regards" to the BR I don't think any other conclusion could be