Bug#744027: data point

2014-04-10 Thread Kurt Roeckx
On Thu, Apr 10, 2014 at 11:10:11AM -0700, Geoffrey Thomas wrote: > On Thu, 10 Apr 2014, Kurt Roeckx wrote: > > >I'm hereing some vague cases why OCSP mandatory checking can't be > >enabled by default because some users can't contact the OCSP > >server. I've never had this problem myself and I thi

Bug#744027: data point

2014-04-10 Thread Geoffrey Thomas
On Thu, 10 Apr 2014, Kurt Roeckx wrote: What we really need is OCSP stapling. That would mean that the server asks the CA for the OCSP response and adds that response in the TLS session, and the client doesn't have to contact the CA anymore to ask for the status. Only the server would need to

Bug#744027: data point

2014-04-10 Thread Kurt Roeckx
On Wed, Apr 09, 2014 at 06:22:10PM -0700, Geoffrey Thomas wrote: > On Wed, 9 Apr 2014, Kurt Roeckx wrote: > > >However, iceweasel/firefox by default is happy to ignore a OCSP > >timeout. You need to turn it on that it doesn't allow a timeout. > >I have no idea why they use that as default. > > B

Bug#744027: Revocation Policy

2014-04-10 Thread Raphael Geissert
On 10 April 2014 16:38, Thorsten Glaser wrote: > http://pbs.twimg.com/media/Bk0DY8XCEAAPpS7.png:large You can not expect an implementation that doesn't provide key usage checks to, well, check key usage. That said, even if for instance OpenSSL supports them, applications must tell the library wh

Bug#744027: Revocation Policy

2014-04-10 Thread Thorsten Glaser
lso contains a comment from the guy who said “don’t panic, it is unlikely that private keys have leaked” yesterday, correcting himself. See also: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744027 ObAmusing: switching to other implementations? Nope. OpenSSL, NSS and the Java™ crowd are the only o

Bug#744027: Please remove StartCom Certification Authority root certificate

2014-04-10 Thread Thorsten Glaser
On Wed, 9 Apr 2014, Geoffrey Thomas wrote: > This only affects certs that were used on vulnerable versions of OpenSSL with > allocation schemes that actually loaded the private key into freed memory that > could be returned. I haven't seen a valid claim that this is anywhere near a > significant f

Bug#744027: data point

2014-04-09 Thread Geoffrey Thomas
On Wed, 9 Apr 2014, Kurt Roeckx wrote: However, iceweasel/firefox by default is happy to ignore a OCSP timeout. You need to turn it on that it doesn't allow a timeout. I have no idea why they use that as default. Because it's an easy DoS if an attacker is in a position to MITM the connection

Bug#744027: data point

2014-04-09 Thread Raphael Geissert
On Wednesday 09 April 2014 23:01:30 Joey Hess wrote: [...] > So this is a gamble with not much of a payoff. The payoff is a certificate that is more likely not to have been compromised, and one that is signed by your CA. > I would be quite happy if Debian came with a way to say: > "I don't trust

Bug#744027: data point

2014-04-09 Thread Kurt Roeckx
On Wed, Apr 09, 2014 at 05:01:30PM -0400, Joey Hess wrote: > > And then, browsers don't check SSL cert revocations, and the infrastructure to > check reovocations is apparently broken too. The major browser do check OCSP, but they do not import CRLs. The CAs are supposed to be providing OCSP. H

Bug#744027: data point

2014-04-09 Thread Joey Hess
StartSSL revoked one of my certs on request the night Heartbleed came out. I mentioned heartbleed in the form. However, that was a $24.90 gamble.. They could just has easily billed me. Especially if you have a lot of different certs, that gamble may not be worth it. Also, I'm a paying customer, h

Bug#744027: Please remove StartCom Certification Authority root certificate

2014-04-09 Thread Geoffrey Thomas
On Wed, 9 Apr 2014, Klemens Baum wrote: StartCom provides cheap and even free SSL certificates via the StartSSL brand. However, certificates revoking cerificates requires a US$ 24.90 fee [3]. This discourages responsible sysadmin procedure and and will ensure many compromised certificates remain

Bug#744027: Please remove StartCom Certification Authority root certificate

2014-04-09 Thread Raphael Geissert
Control: tag -1 wontfix On Wednesday 09 April 2014 15:39:25 Michael Shuler wrote: [...] > If mozilla believes this is justification for removal, which I doubt > will happen, then the same will happen in ca-certificates. Debian > ca-certificates users may remove trust locally at any time, if they >

Bug#744027: Please remove StartCom Certification Authority root certificate

2014-04-09 Thread Jan Niehusmann
On Wed, Apr 09, 2014 at 03:48:56PM +0200, Thijs Kinkhorst wrote: > Whatever you and I think of this pricing structure, people free to chose any > provider of certificates that matches their pricing interest and that people > are knowingly or should be knowlingly buying a product that has a certai

Bug#744027:

2014-04-09 Thread David Wilson
It's worth bearing in mind that a leaked private key has so far not been reproducible on Debian, only for first request on specific configurations of FreeBSD. Following from that, it is really questionable whether such mass certificate compromises have really happened, and whether removal of Start

Bug#744027: Please remove StartCom Certification Authority root certificate

2014-04-09 Thread Thijs Kinkhorst
Op woensdag 9 april 2014 15:07:08 schreef Klemens Baum: > Package: ca-certificates > > Following the OpenSSL CVE-2014-0160 "Heartbleed" vulnerability [1,2], > any certificate that was used with an vulnerable version of OpenSSL (I > read somewhere 1/3 of the web) should be handled as it is compromi

Bug#744027: Please remove StartCom Certification Authority root certificate

2014-04-09 Thread Michael Shuler
Control: forwarded -1 https://bugzilla.mozilla.org/show_bug.cgi?id=994033 On 04/09/2014 08:07 AM, Klemens Baum wrote: Following the OpenSSL CVE-2014-0160 "Heartbleed" vulnerability [1,2], any certificate that was used with an vulnerable version of OpenSSL (I read somewhere 1/3 of the web) should

Bug#744027: Please remove StartCom Certification Authority root certificate

2014-04-09 Thread Klemens Baum
Package: ca-certificates Following the OpenSSL CVE-2014-0160 "Heartbleed" vulnerability [1,2], any certificate that was used with an vulnerable version of OpenSSL (I read somewhere 1/3 of the web) should be handled as it is compromised. Compromised certificates have to be replaced with new ones (