Hi Johnathan,

Under 
http://wiki.mozilla.org/Security:SSLErrorPages#Motivations_.26_Objections 
(Motivations & Objections) goes into the issue: "to object to the idea 
that Mozilla "force" them to pay for a CA-validated certificate"

Allow me to point out that the StartCom CA[1] is issuing _free_ Class 1 
(Domain validated) digital certification to any domain owner, valid for 
one year and without any strings attached! Obviously the StartCom CA is 
a known CA to NSS which makes the argument above invalid....

BTW, contributions are always welcome ;-)

[1] http://cert.startcom.org/

-- 
Regards
 
Signer:      Eddy Nigg, StartCom Ltd.
Jabber:      [EMAIL PROTECTED]
Phone:       +1.213.341.0390

Johnathan Nightingale wrote:
> Hi folks,
>
> I wanted to bring up some changes we are making to how Firefox handles 
> SSL with certificates of unknown provenance (self-signed, expired, 
> untrusted CA, domain mismatch).  I've documented the details in the wiki 
> here:
>
>     http://wiki.mozilla.org/Security:SSLErrorPages
>
> which, in turn, points to bugs 327181 and 387480.  The very short 
> version is that the current SSL error dialogs will be replaced with 
> error pages that do not offer default-unsafe one-click overrides.  This 
> will also involve improving support for adding trust exceptions from the 
> certificate manager, since those trust exceptions will be the way around 
> the error pages.
>
> If there are gaping holes in the approach here, it would be helpful to 
> know that!
>
> Cheers,
>
> Johnathan
>
> PS - Cross posted to dev.sec and d.t.crypto, but please follow up to 
> d.a.firefox.
>
>   

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to