Alexander Klink wrote:
> Here is how it works:
> - Because Firefox's standard configuration is to automatically choose a
>   TLS client certificate to be sent out, the certificate including
>   the personal data will now be sent out to any website that requests it.
>   Contrary to a typical cookie, this includes websites that are on a
>   completely different domain. The user will not notice this at all.
>   
Personally I'd prefer to have the default settings for "When a website 
requires a certificate" to be "Ask me every time". Specially if one has 
various certificates from the same CA, the clueless user logs in always 
with the first certificate on the list. Not really something one might 
expect.

However information stated in certificates signed by CAs isn't usually 
"private" and depending on the CA policy even published via directories 
and other different channels, so I'm not sure if this could be an 
invasion of privacy. Also tracking visitors can be done in different 
ways and doesn't have to be with cookies - again I'm not sure what's the 
difference. IChanging the default selection for certificate 
authentication could solve the problem you stated in any case. Perhaps 
file a bug for this?

>
> What other browsers do:
> - Firefox 1.5: Does not allow you to install a client certificate that
>   is from a CA which you don't trust. I still believe this was a decent
>   default setting.
>   
Are you sure there was a change? I don't remember this to be the case of 
pre-2.0 Firefox either.

-- 
Regards 
 
Signer:         Eddy Nigg, StartCom Ltd. <http://www.startcom.org>
Jabber:         [EMAIL PROTECTED] <xmpp:[EMAIL PROTECTED]>
Blog:   Join the Revolution! <http://blog.startcom.org>
Phone:          +1.213.341.0390
 

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to