Robert Relyea wrote:
> This is a side effect of the Mozilla/Firefox cert selection criteria. 
> Only valid certs that chain to a CA that is trusted by the Server (as 
> indicated by the Client auth CA list) is included. One of the changes 
> in my suggestions would be to include certs don't fit our criteria of 
> valid on the Ask Every Time list, but mark them as 'not preferred' 
> because the couldn't be validated.
Anything which does away with the automatic selection  will do. 
Specially in cases one has more than one certificate installed. It would 
make the process of accessing a client/auth protected server more 
obvious, instead of of doing this job for the user. I don't know how you 
would feel if you'd access a protected area on a web site and you don't 
even know about it...Some might suggest that the web site isn't 
protected at all...

I can understand from the perspective of the developers, that doing away 
with the automatic selection, is somewhat unsatisfying...after all, some 
of you have thought out the best one can do for the user in this 
respect. It's like throwing a very nice feature out of the 
window...grrr. Still, personally I'm not convinced that FF gets it right 
currently...
>  
>
> BTW the server kicked out the error because it had Request/Require 
> client auth set.
Sure! But that message is useful as "XXXXXXXXXX happened".

-- 
Regards 
 
Signer:         Eddy Nigg, StartCom Ltd. <http://www.startcom.org>
Jabber:         [EMAIL PROTECTED] <xmpp:[EMAIL PROTECTED]>
Blog:   Join the Revolution! <http://blog.startcom.org>
Phone:          +1.213.341.0390
 

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to