[Fwd: Warning: Your SSL Certificate on trust-value.com is expiring soon. Upgrade to 2048-bit today]

2009-02-27 Thread Eddy Nigg
More spam from ComodoI wonder if this really behooves a certification authority claiming to be number two. The links go to infosecuritynews.com which is protected by whoisguard (sick), but continuing the promotion one lands at the instanssl site of Comodo. I suggest to Micorosoft and Mozil

Unblock Adult Movie With Web Proxy

2009-02-27 Thread Gelonian
Those url bellow contains web proxy list for Unblock Adult Movie http://HideIP.co.nr Regard Gelonian -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: ComSign Root Inclusion Request

2009-02-27 Thread Frank Hecker
Nelson B Bolyard wrote re hexadecimal error codes in Firefox/PSM: Can MoFo or MoCo PLEASE contribute some man-hours to fixing this? This requires no crypto expertise. It's a trivial GUI issue. NSS supplies all the error strings. There's no excuse left for FF displaying error codes in unsigned h

Re: Work-around for Moxie Marlinspike's Blackhat attack

2009-02-27 Thread Daniel Veditz
Didn't notice my follow-up didn't include m.d.t.crypto, and this warning is perhaps important enough to warrant a repost for this audience since the thread did continue on here despite Jean-Marc's followup-to header. Jean-Marc Desperrier wrote: > Until a better solution is deployed, here is the wo

[Fwd: New W3C XML Security Specifications]

2009-02-27 Thread Arshad Noor
FYI. Original Message Subject: New W3C XML Security Specifications Date: Fri, 27 Feb 2009 14:10:04 -0500 From: Sean Mullan Reply-To: security-...@xml.apache.org To: security-...@xml.apache.org The W3C XML Security Working Group has just released 7 first public working drafts o

Re: Work-around for Moxie Marlinspike's Blackhat attack

2009-02-27 Thread Paul Hoffman
At 6:32 AM -0800 2/27/09, Kyle Hamilton wrote: >The Unicode standard actually cross-references each character and >visually-indistinct glyph. No, it doesn't. Foisting this off on other bodies such as the the Unicode Consortium is only a good idea when they actually are willing to take on the wor

Re: Work-around for Moxie Marlinspike's Blackhat attack

2009-02-27 Thread Kaspar Brand
Kyle Hamilton wrote: > The Unicode standard actually cross-references each character and > visually-indistinct glyph. It might be useful to go through it (I'm > away from my hardcopy of the Unicode 5.0 Standard at the moment, else > I'd look). You can also find the code charts online, in this cas

Re: Work-around for Moxie Marlinspike's Blackhat attack

2009-02-27 Thread Kyle Hamilton
The Unicode standard actually cross-references each character and visually-indistinct glyph. It might be useful to go through it (I'm away from my hardcopy of the Unicode 5.0 Standard at the moment, else I'd look). -Kyle H On Fri, Feb 27, 2009 at 2:15 AM, Jean-Marc Desperrier wrote: > Until a b

Re: ECC SSL client

2009-02-27 Thread David Stutzman
Nelson B Bolyard wrote: tstclnt is able to support protocols in which the client speaks first, and protocols in which the server speaks first. By default, it supports protocols in which the server speaks first. To make it support protocols in which the client speaks first, use the -f command li

Re: Work-around for Moxie Marlinspike's Blackhat attack

2009-02-27 Thread Eddy Nigg
On 02/27/2009 12:15 PM, Jean-Marc Desperrier: - Click to modify the network.IDN.blacklist_chars preference - Click inside the preference content and paste the character from you clipboard. Do not overwrite any of the characters already present ! Very useful. Besides that the original site cou

Work-around for Moxie Marlinspike's Blackhat attack

2009-02-27 Thread Jean-Marc Desperrier
Until a better solution is deployed, here is the work around to make Moxie Marlinspike's attack ineffective. - select and copy in your clipboard the character inside the " below : "╱" This character looks similar to / but is not the same ! This message is sent in unicode to allow for pro