On 05/21/2010 05:51 PM, From Gervase Markham:
On 21/05/10 12:11, Eddy Nigg wrote:
And your whole arguing starts to become ridiculous.

Not at all. He is saying that the browser cannot tell whether a certificate problem is the result of an attack or the result of a misconfiguration. And that's absolutely correct. Isn't it?

The browser can say if a certificate chains correctly to a trusted root for the intended target. This is what it's about, because for everything else neither the browser nor the user can truly know if there is an attack or not.

We have only a result that is valid and all the rest. The rest might be anything from sloppy configuration, invalid certificates to an attack.

Otherwise we'd just not put up errors for the misconfigurations, only for the attacks :-)

No Sir, because CAs will only warrant for certificates that chained to their root and are correctly installed and not revoked. The rest is pretty irrelevant from my point of view - the rest can be all attacks and we don't know.

--
Regards

Signer:  Eddy Nigg, StartCom Ltd.
XMPP:    start...@startcom.org
Blog:    http://blog.startcom.org/
Twitter: http://twitter.com/eddy_nigg

--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to