On 08/10/2009 22:30, Daniel Veditz wrote:
On 10/7/09 4:00 PM, Guenter wrote:
Hi,
is there any way to overwrite the default behaviour that a remote SSL
host is verified against the CA list in the certdb?

At what level? Assuming you're asking in this newsgroup because you're
writing code to use NSS directly (or through PSM) you could look at what
PSM does to create "override" exceptions and just do that automatically.

If you're asking about how to do it from Firefox you could try the "MITM
Me" addon (Description: "This add-on is a terrible idea, and you
shouldn't install it.") https://addons.mozilla.org/en-US/firefox/addon/6843


Hilarious! I wonder if Jonath has measured the flood of MITMs he's experienced using this plugin as against other SSL MITMs?


Needless to say what you're proposing can't be called "SSL" anymore and
there are sound security reasons SSL does not work that way. Using such
a client to connect to commercial, financial, or government sites would
be profoundly dangerous.



I am often reminded on the policy group that SSL *does not require CAs*, so according to the people who frequently correct me, what you write is incorrect :)

Understandable error, around a highly controversial term. SSL is sometimes just a protocol, and CAs are sometimes just application or policy decisions. Alternatively, SSL is sometimes a whole system of secure browsing, from consumer to seller, mind to mind, wallet to wallet ...

Personally, I prefer to use the term Secure Browsing to indicate the system of authentication in browser/servers. And TLS when talking about the protocol.

But, also personally, I think it is a lost cause. The whole system is called SSL by the vast body of the media, and anyone who wants to push pedantic terms is either very alone or selling snake oil.

http://www.darkreading.com/security/vulnerabilities/showArticle.jhtml?articleID=220301548

iang
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to