Re: MITM in the wild

2008-10-18 Thread Eddy Nigg
David E. Ross: I visit some Web sites with self-signed certificates. None of those sites request any input from me. The only reason they have site certificates is that the site owners want to show off how technically astute they are. Hah! However, those sites do indeed contain information tha

Re: MITM in the wild

2008-10-18 Thread David E. Ross
On 10/18/2008 11:22 AM, Nelson B Bolyard wrote [in part]: > > Is removal of the ability to override bad certs the ONLY effective > protection for such users? I visit some Web sites with self-signed certificates. None of those sites request any input from me. The only reason they have site certif

Re: MITM in the wild

2008-10-18 Thread Steffen Schulz
On 081018 at 20:30, Nelson B Bolyard wrote: > FF3 had utterly failed to convey to her any understanding that she was > under attack. The mere fact that the browser provided a way to override > the error was enough to convince her that the errors were not serious. I find it amazing that someone sh

Re: revocation of roots

2008-10-18 Thread Paul Hoffman
At 2:45 AM + 10/18/08, Frank Hecker wrote: >Yes, but as I understand it what is being discussed here is a more elaborate >scheme whereby, for example, we (Mozilla) might run an actual CA just for the >purpose of cross certifying the roots that we accept. Like Nelson, I can't >remember who ex

Re: NSS implementation of TLS-PSK/ RFC 4279

2008-10-18 Thread Nelson B Bolyard
Ian G wrote, On 2008-10-14 14:27: > People in the apps security field hold out high hopes for TLS-PSK as > a great aid for phishing; it would be a shame of that didn't happen PSK is just a new name for a very old idea: shared secrets. When it comes to phishing, shared secrets aren't the solutio

Re: MITM in the wild

2008-10-18 Thread Eddy Nigg
Ian G: Nelson B Bolyard wrote: Despite all the additional obstacles that FF3 put in her way, and all the warnings about "legitimate sites will never ask you to do this", she persisted in overriding every error, and thus giving away most of her valuable passwords to her attacker. Yep, no surp

Re: MITM in the wild

2008-10-18 Thread Ian G
Nelson B Bolyard wrote: > In bug https://bugzilla.mozilla.org/show_bug.cgi?id=460374 the reporter > complained about how difficult it is to override bad cert errors in FF3. > She complained because she was getting bad cert errors on EVERY https > site she visited. ALL the https sites she visited w

Re: S/MIME support in this list doesn't work. Re: revocation of roots

2008-10-18 Thread Eddy Nigg
István Zsolt BERTA: On the long run, we plan to introduce an OCSP service that is usable for the general public, i.e. that does not require authentication and works using the 'authorized responder' concept. This week we had a discussion with the National Communications Authority, we shall be able

MITM in the wild

2008-10-18 Thread Nelson B Bolyard
In bug https://bugzilla.mozilla.org/show_bug.cgi?id=460374 the reporter complained about how difficult it is to override bad cert errors in FF3. She complained because she was getting bad cert errors on EVERY https site she visited. ALL the https sites she visited were apparently presenting self-s

Re: Microsec CA inclusion request

2008-10-18 Thread Nelson B Bolyard
Kaspar Brand wrote, On 2008-10-18 00:18: > Nelson B Bolyard wrote: >> Yes. Bad response, ugly errors, no fun. > > With the default settings in Firefox 3, it isn't that bad... remember > that it's the "graceful failure" mode which is selected by default: > Don't forget the OCSP checks done in c

Re: S/MIME support in this list doesn't work. Re: revocation of roots

2008-10-18 Thread István Zsolt BERTA
> I.e., unless bugs 205436 or 92923 are worked on soon, using https OCSP > URIs will quite effectively prevent Mozilla clients from connecting to > this responder :-) [1] István, maybe you can confirm that in all the > certs issued so far you've only used https OCSP URIs? Yes, they all contain htt

S/MIME support in this list doesn't work. Re: revocation of roots

2008-10-18 Thread Anders Rundgren
How come that S/MIME-signed messages are unreadable using Microsoft Mail and Outlook Express? Anders - Original Message - From: "Ian G" <[EMAIL PROTECTED]> To: "mozilla's crypto code discussion list" Sent: Saturday, October 18, 2008 12:49 Subject: Re: revocation of roots _

Re: revocation of roots

2008-10-18 Thread Ian G
Frank Hecker wrote: > Eddy Nigg wrote: >>> b. Is there a way in the root list (code) to signal that a root is >>> revoked (other than by a self-signed CRL of self)? E.g., by a flag >>> or something? >> >> Not that I'm aware of. > > I don't know if this is what Ian was referring to, but in theor

Re: Microsec CA inclusion request

2008-10-18 Thread Kaspar Brand
Nelson B Bolyard wrote: > Frank Hecker wrote, On 2008-10-17 06:57: > >> Please refresh my memory here: As I understand it, the basic problem was >> that if the Microsec root were included in Firefox (or other products) >> and a user surfed to an SSL/TLS-enabled site with an end entity >> certif