Re: List/remove cached S/MIME capabilities

2010-02-20 Thread Nelson B Bolyard
On 2010-02-18 03:06 PST, Michael Ströder wrote: I'm using Seamonkey 2.0.3 under Linux. Is there a way to list and tweak the cached S/MIME capabilities for certain recipients? There is no way to list them, at present. There could be. It just doesn't exist. As for tweaking them, they get

Re: Another protection layer for the current trust model

2010-02-20 Thread Nelson B Bolyard
On 2010-02-20 08:46 PST, Nguyễn Đình Nam wrote: [yet another promotion of perspectives] Questions/issues: 1. How do you secure the connection to the perspectives server? (This is a recursive problem) 2. How do you avoid false reports for the multiple servers that legitimately claim to be the

Re: Fix for the TLS renegotiation bug

2010-02-20 Thread Jean-Marc Desperrier
On 20/02/2010 03:25, Eddy Nigg wrote: Apache performs a renegotiation when none is needed when configuring client authentication at a particular location, is there a logical explanation for that? Or even considered correct implementation? Yes, there's a logical explanation and Apache is doing

Re: Fix for the TLS renegotiation bug

2010-02-20 Thread Eddy Nigg
On 02/21/2010 03:10 AM, Jean-Marc Desperrier: On 20/02/2010 03:25, Eddy Nigg wrote: Apache performs a renegotiation when none is needed when configuring client authentication at a particular location, is there a logical explanation for that? Or even considered correct implementation? Yes,

Re: Another protection layer for the current trust model

2010-02-20 Thread Nguyễn Đình Nam
1. How do you secure the connection to the perspectives server? The software to be released with predefined intrusion detection servers, each comes with it's own X.509 certificate, should be self signed. It's a kind of Auditive mechanism, by using it, we should be suspicious of any CA, so we

Re: Another protection layer for the current trust model

2010-02-20 Thread Eddy Nigg
On 02/21/2010 04:11 AM, Nguyễn Đình Nam: I think you didn't look closely at my description. The intrusion detection servers track the changes of certificates belong to a host name over time, reported by user agent software around the world, this is just like Perspectives. If there is one time