On Mon, Jan 12, 2009 at 2:02 AM, Jean-Marc Desperrier
<jmd...@alussinan.org> wrote:
> Daniel Stenberg wrote:
>>
>> [...]
>> I've been curious on how these devices deal with self-signed
>> certificates. Does anyone know?
>>
>> I mean does it hide them the same way or does it generate fake
>> self-signed ones for those?
>
> Hum, hum. So helping user detect MITM attacks could be as simple as telling
> them to go to "https://self-signed.mozilla.com"; and telling them that if
> they get no warning then their https access is hijacked ? ;-)

This assumes that the vendors haven't figured out how to put the CAs
that they want to proxy for in something like
OpenSSL_load_verify_locations().  However, this would normally also
create a proxy error, which would also be detectable by the
end-user... if they know how to interpret proxy result codes.

-Kyle H
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to