On Fri, 2010-05-21 at 04:02 +0300, Eddy Nigg wrote:
> On 05/21/2010 03:23 AM, From Matt McCutchen:
> > On May 19, 11:28 am, Eddy Nigg<eddy_n...@startcom.org>  wrote:
> >
> >> Well, just for the record, lets get this strait - there are no false
> >> positives. I have NEVER encountered an error with a web site and there
> >> was no reason for it. Either the certificate was not trusted or the
> >> domain did not match or other reasons. Those are real errors, those are
> >> not false positives, those are REAL positives.
> >>
> > That's not right.  We are discussing SSL as a /means/ to prevent
> > impersonation of the site the user wanted to visit.  In this context,
> > a "false positive" is defined as an SSL error when no impersonation is
> > taking place.
>
> Oh really? And how do you know?

I'm not claiming that the user knows.  I only said that if there is in
fact no impersonation, then the error is a false positive.

> There are no false positives, it all
> boils down to correct or incorrect.

There absolutely are from the perspective of a user who uses SSL as a
means to prevent impersonation of the site he/she wants to visit,
which describes me and probably most of the public.

For a site administrator, having a valid SSL certificate makes it
easier for users to connect securely with current technology (since
they don't have to perform out-of-band verification), and for this
reason I strongly encourage it.  But you seem to be suggesting that
having a valid SSL certificate is an end in itself, which is a view I
don't subscribe to.

> Anything that is incorrect may not be relied upon because you actually
> can't know (from the outset, you might correct and check for the
> reasons, but this isn't anybody knows how to do).

That's true but beside the point.

--
Matt
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to