On Mon, Oct 5, 2009 at 11:38 AM, Eddy Nigg <eddy_n...@startcom.org> wrote:

>> I don't think anyone is doubting that both FF and IE have some problems
>> with the way they handle client auth. Most of these problems can be
>> worked around on the server (use request, not require, through an error
>> page if the cert you wanted wasn't the cert you got).
>>
>
> I know, we however prefer a hard require for some reasons. Obviously what
> you suggested is only a work-around for a relative broken UI :S

Well, the question here, Eddy, is: Does your TLS layer's hard require
actually produce a useful error alert, as enumerated in my earlier
email?  Or does it just send the "handshake failure" alert on all
certificate failures?

If it sends only "handshake failure", your server software is part of
the problem, and not at all part of the solution.

(And security needs to be a pervasive, systemic thing, not something
like a firewall to simply prevent access to more meaningful
information otherwise available.  Even Microsoft managed to get this
one right with their PC Health stuff in Server 2008's Remote Access:
if the user's system doesn't report "healthy", then the same ipsec VPN
connection could be dropped... or, as a recommended Best Practice, it
can be redirected to another network that might have tools such as
virus scanners, malware scanners, and patches available to bring that
client machine back up to health.  You already keep track of what is
clicked by each user... how about keeping track of the failures that
each IP has, and figuring out what your system's TLS layer is sending
back?)

-Kyle H
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to