Re: Low security SSL sites

2005-04-25 Thread Ian Grigg
Peter 128 128 128 128 128 128 128 128 128 128. [Snip] Ignore the numbers, concentrate on the security. iang 128 ^ 128 (my 128 is better than your 128) Actually you should have used 128+1, because real cryptographers' keys go to 129. LOL... For those who do not understand the reference,

Re: Low security SSL sites

2005-04-24 Thread Peter Gutmann
Heikki Toivonen [EMAIL PROTECTED] writes: Ian G wrote: Peter Gutmann wrote: 1. Disable SSLv2 in your browser (i.e. take it to the state that it should have been shipped in in the first place). Right. Perhaps we should file a bug? Something like?:

Re: Low security SSL sites

2005-04-21 Thread Gervase Markham
Ka-Ping Yee wrote: I believe the problem is that right now a lot of people are expecting or led to expect CAs to do job (b), but they don't do that. Some do, some don't. Work is in progress to differentiate between the two in the browser UI. Gerv ___

Re: Low security SSL sites

2005-04-21 Thread Gervase Markham
Ian G wrote: They have no incentive to do so, and even if they did, they'd be ignored. People widely ignore the fact that when Verisign says trusted it means one thing, and when Comodo says trusted it means another thing. Until this is fixed, there is no point in (b) so we see what we see - a

Re: Low security SSL sites

2005-04-21 Thread Heikki Toivonen
Ian G wrote: Peter Gutmann wrote: 1. Disable SSLv2 in your browser (i.e. take it to the state that it should have been shipped in in the first place). Right. Perhaps we should file a bug? Something like?: https://bugzilla.mozilla.org/show_bug.cgi?id=106604

Re: Low security SSL sites

2005-04-19 Thread Nelson B
Ian G wrote: Nelson explained this a while ago ... until the browsers go to SSL3 / TLS 1.0 they cannot handle virtual hosts. Ian, If you're going to attribute explanations to me, please be sure you get them right. Today the browsers support all 3: SSL2 SSL3 TLS1 The new TLS extensions are

Re: Low security SSL sites

2005-04-19 Thread Duane
Julien Pierre wrote: You still have the ability to use alternate ports for your 2 extra SSL servers, using your single IP. If you must use the same port, all may not be lost. You might be able get a single cert with all 3 hostnames in it, for example. If you want to use different certs or

Re: Low security SSL sites

2005-04-18 Thread Ian G
Jaqui Greenlees wrote: Peter Gutmann wrote: You can see where the magic-numbers problem has lead with the magic number 128. Provided that you mention this magic number somewhere in your marketing literature, your product will be regarded as secure no matter how bad it is in practice. ~snip~

Re: Low security SSL sites

2005-04-18 Thread Gervase Markham
Ian G wrote: And ... my point is that the difficulty of numbers that you refer to is equally applicable to any other metric we might come up with. Literally, your commerce v. non-commerce differentiation is equally fraught. The two are not equivalent. If the distinction is made by, say, an icon

Re: Low security SSL sites

2005-04-18 Thread Nelson B
Ian G wrote: Nelson B wrote: Ian G wrote: (OTOH, something like SSLv2 v. SSLv3/TLSv1 is stopping people elsewhere using crypto. What are you talking about? This one: [here I have snipped an old message of mine that says that SSL2 servers are hindering the rollout of new optional TLS

Re: Low security SSL sites

2005-04-18 Thread Ian G
Gervase Markham wrote: It's like Michelin stars. You probably have to cook better food these days to get 3 stars for your restaurant than you did in the 30s, but three stars still means the best available. Michelen stars would be a perfect example. The users would see the michelin man, and the

Re: Low security SSL sites

2005-04-18 Thread Ka-Ping Yee
On Mon, 18 Apr 2005, Ian G wrote: Gervase Markham wrote: It's like Michelin stars. You probably have to cook better food these days to get 3 stars for your restaurant than you did in the 30s, but three stars still means the best available. Michelen stars would be a perfect example. [...]

Re: Low security SSL sites

2005-04-18 Thread Ian G
Nelson B wrote: [here I have snipped an old message of mine that says that SSL2 servers are hindering the rollout of new optional TLS extensions. ] Ian, how is that stopping people from using encryption? Correct me if I am wrong, but it means that the virtual hosts capability in newer versions

Re: Low security SSL sites

2005-04-18 Thread Ian G
Ka-Ping Yee wrote: On Mon, 18 Apr 2005, Ian G wrote: Gervase Markham wrote: It's like Michelin stars. You probably have to cook better food these days to get 3 stars for your restaurant than you did in the 30s, but three stars still means the best available. Michelen stars would be a perfect

Re: Low security SSL sites

2005-04-18 Thread Julien Pierre
Ian, Ian G wrote: Nelson B wrote: [here I have snipped an old message of mine that says that SSL2 servers are hindering the rollout of new optional TLS extensions. ] Ian, how is that stopping people from using encryption? Correct me if I am wrong, but it means that the virtual hosts capability

Re: Low security SSL sites

2005-04-18 Thread Jaqui Greenlees
Julien Pierre wrote: Ian, Ian G wrote: Nelson B wrote: [here I have snipped an old message of mine that says that SSL2 servers are hindering the rollout of new optional TLS extensions. ] Ian, how is that stopping people from using encryption? Correct me if I am wrong, but it means that the

RE: Low security SSL sites

2005-04-18 Thread Deacon, Alex
14, 2005 11:11 PM To: mozilla-security@mozilla.org Subject: Re: Low security SSL sites Deacon, Alex [EMAIL PROTECTED] writes: It should be noted that VeriSign sold the registrar division of Network Solutions (including the brand) back in 2003. It is no longer has any affiliation

Re: Low security SSL sites

2005-04-17 Thread Frank Hecker
Peter Gutmann wrote: You can see where the magic-numbers problem has lead with the magic number 128. Provided that you mention this magic number somewhere in your marketing literature, your product will be regarded as secure no matter how bad it is in practice. And of course 256 will be the new

Re: Low security SSL sites

2005-04-15 Thread Nelson B
Ian G wrote: (OTOH, something like SSLv2 v. SSLv3/TLSv1 is stopping people elsewhere using crypto. What are you talking about? Stopping people using crypto should be a hanging offence. Come the revolution, they will be the first against the wall...) iang -- Nelson B

Re: Low security SSL sites

2005-04-15 Thread Gervase Markham
Ian G wrote: I'd say 40 bit is good enough for banking, and 128 bit is good enough for banks :-) As the TLS people have now added a 256 bit protocol suite, they no doubt think that only 256 should be used by banks... I think you may have missed my point, which was: a number is still a number,

Re: Low security SSL sites

2005-04-15 Thread Ian G
Gervase Markham wrote: Ian G wrote: I'd say 40 bit is good enough for banking, and 128 bit is good enough for banks :-) As the TLS people have now added a 256 bit protocol suite, they no doubt think that only 256 should be used by banks... I think you may have missed my point, which was: a

Re: Low security SSL sites

2005-04-15 Thread Ian G
Nelson B wrote: Ian G wrote: (OTOH, something like SSLv2 v. SSLv3/TLSv1 is stopping people elsewhere using crypto. What are you talking about? This one: Nelson B wrote: Julien Pierre wrote: There is a TLS extension called server name indication. It is currently not implemented by NSS .

Re: Low security SSL sites

2005-04-14 Thread Ian G
Peng wrote: That may instead annoy them sufficiently that they switch back to IE, if they need to visit the site a lot. Personally, I didn't used to think to contact a website if there was a problem. I just ignored it or went to another website or spoofed my user agent or something. Putting

Re: Low security SSL sites

2005-04-14 Thread Duane
Ian G wrote: Peng wrote: That may instead annoy them sufficiently that they switch back to IE, if they need to visit the site a lot. Personally, I didn't used to think to contact a website if there was a problem. I just ignored it or went to another website or spoofed my user agent or

RE: Low security SSL sites

2005-04-14 Thread Deacon, Alex
Gutmann Sent: Wednesday, April 13, 2005 12:06 AM To: mozilla-security@mozilla.org Subject: Re: Low security SSL sites Duane [EMAIL PROTECTED] writes: Peter Gutmann wrote: You may as well name 'em since it's fairly well known, it's Verisign (yes, the Actually another one, so that makes 2

Re: Low security SSL sites

2005-04-14 Thread Gervase Markham
Duane wrote: This certificate is 50% good (128/256) or 15% good (40/256) then you just alter the top number, or even subtract for bad protocols, I'm sure people would get the idea pretty quick and it would be consistent, even when things change in future... That's better, but it doesn't address

Re: Low security SSL sites

2005-04-14 Thread Ian G
Duane wrote: Ian G wrote: Peng wrote: That may instead annoy them sufficiently that they switch back to IE, if they need to visit the site a lot. Personally, I didn't used to think to contact a website if there was a problem. I just ignored it or went to another website or spoofed my user agent

Re: Low security SSL sites

2005-04-13 Thread Peng
On 04/11/05 23:27, Peter Gutmann wrote: Frank Hecker [EMAIL PROTECTED] writes: Doug Wright wrote: Gerv suggested I post this here for discussion - copied from bug 288693 [Snip] In Opera, the message must be OKed/cancelled *before the site is even rendered* My personal preference would be a

Re: Low security SSL sites

2005-04-12 Thread Ian G
Duane wrote: Peter Gutmann wrote: You may as well name 'em since it's fairly well known, it's Verisign (yes, the Actually another one, so that makes 2 of them (at least)... Duane, Either you are working for some company and you have a conflict of interest that stops you doing security work. Or

Re: Low security SSL sites

2005-04-11 Thread Peter Gutmann
Frank Hecker [EMAIL PROTECTED] writes: Doug Wright wrote: Gerv suggested I post this here for discussion - copied from bug 288693 [Snip] In Opera, the message must be OKed/cancelled *before the site is even rendered* My personal preference would be a dialog with a delayed OK button (like

Re: Low security SSL sites

2005-04-11 Thread Peter Gutmann
Duane [EMAIL PROTECTED] writes: Ram A M wrote: I have SSL2 disabled and AFAIK it has not limited my access to sites in a long time. Perhaps it is time to retire SSL2 in the default config. I have had problems with one domain registrar using it... You may as well name 'em since it's fairly

Re: Low security SSL sites

2005-04-11 Thread Duane
Peter Gutmann wrote: You may as well name 'em since it's fairly well known, it's Verisign (yes, the Actually another one, so that makes 2 of them (at least)... -- Best regards, Duane http://www.cacert.org - Free Security Certificates http://www.nodedb.com - Think globally, network locally

Re: Low security SSL sites

2005-04-07 Thread Duane
Gervase Markham wrote: So in two years, time, when the advice changes to 256/2048, they have to learn a new set of numbers? I should issue a better cert for the CAcert website, but it's more common then not that I'm getting 256/1024, and the root cert is 4096, which some software still doesn't

Re: Low security SSL sites

2005-04-06 Thread Ram A M
Duane wrote: Ram A M wrote: I have SSL2 disabled and AFAIK it has not limited my access to sites in a long time. Perhaps it is time to retire SSL2 in the default config. I have had problems with one domain registrar using it... Yep me too, it seems netsol still requires SSL2. I wonder how

Re: Low security SSL sites

2005-04-05 Thread Ram A M
If one wanted to achieve a useful distinction, then I suggest warning when an SSL v2 protocol site is struck, as at least then a real issue is being addressed. I have SSL2 disabled and AFAIK it has not limited my access to sites in a long time. Perhaps it is time to retire SSL2 in the default

Re: Low security SSL sites

2005-04-05 Thread Ian G
Ram A M wrote: If one wanted to achieve a useful distinction, then I suggest warning when an SSL v2 protocol site is struck, as at least then a real issue is being addressed. I have SSL2 disabled and AFAIK it has not limited my access to sites in a long time. Perhaps it is time to retire SSL2 in

Re: Low security SSL sites

2005-04-05 Thread Duane
Ram A M wrote: I have SSL2 disabled and AFAIK it has not limited my access to sites in a long time. Perhaps it is time to retire SSL2 in the default config. I have had problems with one domain registrar using it... -- Best regards, Duane http://www.cacert.org - Free Security Certificates

Re: Low security SSL sites

2005-04-04 Thread Gervase Markham
Frank Hecker wrote: This raises the question that we've previously debated on this group: If popping up a warning dialog the right thing to do, or does that just encourage users to blindly click OK? Is a better alternative to just display the page without the SSL lock icon, with an accompanying

Re: Low security SSL sites

2005-04-04 Thread Gervase Markham
Ian G wrote: Why not just put the number of crypto bits on the status bar, next to the site name, CA name and padlock? I'm surprised at you, Ian. I would have thought the reason was obvious :-) In Opera, the message must be OKed/cancelled *before the site is even rendered* Heavens above! I

Re: Low security SSL sites

2005-04-04 Thread Jean-Marc Desperrier
Doug Wright wrote: Gerv suggested I post this here for discussion - copied from bug 288693 When visiting 'secure' sites that use outdated encryption, Firefox/Thunderbird should give a big ugly warning about the dangers of submitting information to this site. [...] My personal preference would

Re: Low security SSL sites

2005-04-04 Thread Ian G
Jean-Marc Desperrier wrote: I'm surprised nobody has said until now that there's already such a warning dialog for 40 bit crypto (at least in the suite, maybe FF removed it). I don't believe 512 RSA keys trigger it, though. 512 bit keys are a lot stronger than 40 bit, they are more like about

Re: Low security SSL sites

2005-04-04 Thread Ian G
Gervase Markham wrote: Ian G wrote: Why not just put the number of crypto bits on the status bar, next to the site name, CA name and padlock? I'm surprised at you, Ian. I would have thought the reason was obvious :-) It could be blindingly obvious to others ... but it's not to me! In Opera,

Re: Low security SSL sites

2005-04-04 Thread Ian G
Gervase Markham wrote: Ian G wrote: It could be blindingly obvious to others ... but it's not to me! Because 99.99% of users will have no idea what the numbers are, nor will they have any ability to make sensible decisions based on them. Well, they are generally in a much better position to make

Re: Low security SSL sites

2005-04-01 Thread Frank Hecker
Doug Wright wrote: Gerv suggested I post this here for discussion - copied from bug 288693 When visiting 'secure' sites that use outdated encryption, Firefox/Thunderbird should give a big ugly warning about the dangers of submitting information to this site. For reference: the latest Opera 8