On 4    , 03:33, Nelson Bolyard <[EMAIL PROTECTED]>
wrote:

> I agree with the rest of what you wrote, down to here:
>
> > The major downside of XPCOM approach is that it requires user
> > intervention: for some reason you cannot pass the certificate trust as
> > an argument for the certificate import methods (see e.g.
> > nsIX509CertDB::ImportCertsFromFile) so the user will be presented with
> > a pop-up dialog where he'll have to tick appropriate check-boxes;
>
> Yes.  Does that surprise you?  It shouldn't.
>
> Should web pages be able to alter the user's set of trusted CAs without
> his knowledge?
>
> If they could, what would stop a "bad guy" from installing his own
> evil root CA certs as trusted in the user's browser, then then thereafter
> successfully attacking the user's otherwise "secure" pages?
>
> With a bogus root CA installed and trusted, an attacker could successfully
> MITM attack any server he chose. Imagine a rogue employee as your ISP
> doing that.  The user's ability to control what certs he trusts is his
> PRIMARY DEFENSE against MITM attackers.  If we take away that control
> from the user, and give it to the web site designer, FireFox users
> would have no reason remaining to trust anything they see in their
> browser windows, ever again.  That's why we require user participation
> in matters affecting their security.

You are right that importing *root* CA is actually a process of
establishing trust between the user the the cert. issuer. Thus, user
should explicitly (dis)approve this. However installing *non-root*
stuff, or specifying password for pfx are the tasks that can be
performed without user. And this is exactly what I am grumbling about.

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to