Dave Townsend wrote:
> Hi all, I am looking for some feedback on a proposal I'm working on to
> improve the security of add-on updates in Mozilla products. Let me give
> an overview of the problem I wish to solve and then what I have come up
> with so far as a potential solution.
> 
> In the Mozilla applications we have an add-ons installed. I'm ignoring
> how the add-ons are installed but let's assume that once there we have
> some faith in them. The application periodically checks for available
> updates to an add-on by downloading an update file from a url specified
> by the installed add-on.
> 
> What I want is to be able to be able to establish some trust that the
> update file retrieved is correct, and has not been tampered with,
> intercepted and is as it was originally written by the add-on author.
> 
> The key problem is that I wish to do this in a way that does not cost
> the add-on author any money (or at least a very small amount of money),
> so getting a certificate signed by one of the root CA's is not an option
> nor is serving the file from an ssl server.

$18/year is too expensive, eh?

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to