On Thursday, October 16, 2014 3:04:59 PM UTC-5, treb...@gmail.com wrote:
> On Monday, April 7, 2014 6:33:50 PM UTC-4, Kathleen Wilson wrote:
> > All,
> > 
> > 
> > 
> > We have been working on a new certificate verification library for 
> > 
> > Gecko, and would greatly appreciate it if you will test this new library 
> > 
> > and review the new code.
> > 
> > 
> > 
> > Background
> > 
> > 
> > 
> > NSS currently has two code paths for doing certificate verification. 
> > 
> > "Classic" verification has been used for verification of non-EV 
> > 
> > certificates, and libPKIX has been used for verification of EV 
> > 
> > certificates.
> > 
> > 
> > 
> > As many of you are aware, the NSS team has wanted to replace the 
> > 
> > "classic" verification with libPKIX for a long time. However, the 
> > 
> > current libPKIX code was auto-translated from Java to C, and has proven 
> > 
> > to be very difficult to maintain and use. Therefore, Mozilla has created 
> > 
> > a new certificate verification library called mozilla::pkix.
> > 
> > 
> > 
> > Request for Testing
> > 
> > 
> > 
> > Replacing the certificate verification library can only be done after 
> > 
> > gaining sufficient confidence in the new code by having as many people 
> > 
> > and organizations test it as possible.
> > 
> > 
> > 
> > We ask that all of you help us test this new library as described here:
> > 
> > https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Request_for_Testing
> > 
> > 
> > 
> > Testing Window: The mozilla::pkix certificate verification library is 
> > 
> > available for testing now in Nightly Firefox builds. We ask that you 
> > 
> > test as soon as possible, and that you complete your testing before 
> > 
> > Firefox 31 exits the Aurora branch in June.
> > 
> > (See https://wiki.mozilla.org/RapidRelease/Calendar)
> > 
> > 
> > 
> > Request for Code Review
> > 
> > 
> > 
> > The more people who code review the new code, the better. So we ask all 
> > 
> > of you C++ programmers out there to review the code and let us know if 
> > 
> > you see any potential issues.
> > 
> > https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Request_for_Code_Review
> > 
> > 
> > 
> > 
> > 
> > We look forward to your help in testing and reviewing this new 
> > 
> > certificate verification library.
> > 
> > 
> > 
> > Mozilla Security Engineering Team
> 
> Mozilla::pkix includes some changes in support of current best practices and 
> policies, as listed below. If you notice an issue due to any of these 
> changes, please feel free to let us know. However, we believe that in most 
> cases, the simplest resolution will be to update the SSL certificate in your 
> webserver. 
> 
> 
> YOU F**KTARDS.. SOMETIMES WE HAVE ABSOLUTELY ZERO F**KING CONTROL OVER THE 
> SSL CERT PRESENTED.. WE **know** IT SHOULD BE TRUSTED BECAUSE ITS AN INTERNAL 
> F**KING DEVICE, AND DON'T GIVE ONE FLYING F**K IF THE CERT IS VALID OR NOT.. 
> 
> WE **SHOULD** BE ALLOWED REGARDLESS OF THE F**KING CAUSE, TO ADD AN 
> EXCEPTION.. TAKE THE SAME F**KING URL TO ANY OTHER BROWSER, AND AT WORST YOU 
> GET CHROME WHICH NOW WON'T REMEMBER USER/PASS COMBOS TO GET INTO THOSE SITES
> 
> 
> **** BUT IT STILL F**KING LETS YOU GET TO THE GOD DAMNED F**KING SITE!
> 
> WHY IS IT THAT YOU SMART A** F**KERS CAN'T UNDERSTAND YOU **CAN NOT FORCE 
> THIS ON PEOPLE**  YOU **MUST** ALLOW THEM TO ADD AN EXCEPTION EVEN IF 
> TEMPORARY!  OTHERWISE BY NOT ALLOWING US TO DO SO YOU FORCE US TO USE ANOTHER 
> BROWSER.. FOR SOME OF US AS PART OF OUR JOB.. AND WHAT THEN IS THE POINT OF 
> HAVING FIREFOX IF YOU CAN'T USE IT TO DO YOUR F**KING WORK?
> 
> F**KTARD DEVELOPERS you think you're so smart, you think you know everything 
> and that because YOU think vendors of broken hardware should be forced to 
> fix.. or what.. buy something new? ... F U devs.. you fix this.. or see 
> people abandon you and loose what little cred you had in the browser war!

I agree with the opinion this user is trying to get across. We end users must 
have an option to completely circumvent security measures when we know a 
connection is trusted. Otherwise, like the poster indicated, we have to ditch 
Firefox and use a browser that gives us that capability. 

We, the end users, don't want to make a statement of how global security 
practices should theoretically work. We want to use a browser that we have 
control of and can use as a tool to accomplish a task. Removing some of the 
functionality of the browser and forcing us into a rigid security model only 
makes us install a second browser. Over time, I can imagine that the second 
browser would usurp Firefox's position as "Preferred browser".

Just an opinion, from an end-user.
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to