On 01/29/2009 02:31 PM, Jean-Marc Desperrier:
Gerv, what about changing the Firefox SSL page/implementation so that in
that situation, for those 99% of the market, it gives the most
informative information, non scary, non blocking possible ? Even when
there was an error in the configuration ?

The problem is, that the browser can't currently know which CA root is responsible for the end user certificate, because NSS doesn't fetch the issuer CA certificates. Would it do that, it could build up a valid chain up to a known root (or not). The solution to the problem would really be to fetch the missing certificates when an issuer URI is present in the certificate until it finds a valid root. In this way 99% of all errors could be omitted.

--
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: start...@startcom.org
Blog:   https://blog.startcom.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to