I'm also going to state that yes, I know this, because I HAVE DONE IT.
 And I wouldn't wish that hell on anyone who didn't have a DETAILED
knowledge of how the X.509 model operates, and I wouldn't wish the
user-interface hell on ANYONE.

-Kyle H

On Wed, Dec 24, 2008 at 2:36 PM, Kyle Hamilton <aerow...@gmail.com> wrote:
> On Wed, Dec 24, 2008 at 1:46 PM, Nelson B Bolyard <nel...@bolyard.me> wrote:
>> Of course, that is COMPLETELY equivalent to simply setting trust flags on
>> the CA certs you want to trust, and removing those flags from the ones you
>> don't want to trust, which is already a part of Mozilla browsers (and
>> Netscape browsers, before them) for over 14 years.
>
> To be honest, Mozilla doesn't distribute keytool with Firefox, which
> means that I have to try to go into the (unbatchable) interface and
> remove the flags one. by. one. by. one. and then select the next
> certificate and remove those trust flags, and the next, and the next,
> and the next...
>
> ...for all hundred or so certs that Firefox includes.
>
> And then, once I DO manage to do that, then with the "new and
> improved" user interface updates, I then have to click at least six
> times to try to figure out what's going on, and then when I do find a
> site that's protected by an unknown CA certificate (OR that I've
> removed the trust bits on), I have to do the following:
>
> 1) Click 'add an exception'
> 2) click 'get certificate' (why I should have to do this is beyond me,
> since firefox obviously already has the certificate downloaded since
> it told me 'sec_error_untrusted_issuer', which it couldn't have known
> without the certificate in its possession ANYWAY)
> 3) click 'view'
> 4) get the name of the Issuer
> 5) hope to all the gods that there's enough information in the chain
> to figure out what root it's supposed to be going to
> 6) close the window
> 7) go into Preferences
> 8) click Advanced
> 9) click Encryption
> 10) click 'View Certificates'
> 11) Scroll through the list, with each click giving me approximately
> 0.6 useful results (given the preponderance of 'section headings by
> root owner', which by the way doesn't work at all with the Addtrust AB
> stuff since those are Comodo roots)
> 12) find the appropriate root and re-enable it for identification of websites
> 13) refresh the page.
>
> How 'bout this, Nelson (and I invite Frank and the entire security UI
> team to do this, as well): YOU do it.  Create a new profile and
> manually remove the trust on every CA.  Then, browse around, and see
> which CAs are actually used by you in your day-to-day browsing,
> reenabling them manually (since you're trying to emulate not having
> keytool around).
>
> Furthermore, even when keytool IS available, it's entirely likely that
> its name conflicts with Java's keytool.  (especially on Mac OSX.)
>
> This is completely unworkable, and discourages users that want to from
> taking their security into their own hands.
>
> -Kyle H
>
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to