Re: reduce default OCSP timeouts.

2013-10-11 Thread Eddy Nigg
On 10/11/2013 11:50 PM, From Wan-Teh Chang: I would use a timeout of 5 seconds. 3 seconds seem a little short. I agree 10 seconds are too long. +1 -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com

Re: Removal of generateCRMFRequest

2013-09-28 Thread Eddy Nigg
a need for such a functionality, go to the standards bodies and propose one, then implement and remove the non-standard functions. I believe there are a few smart card related functions that could do some good. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.or

Re: Removal of generateCRMFRequest

2013-09-28 Thread Eddy Nigg
certificate without having to restart the browser. Actually FF does a full handshake, what kind of error you get depends on what bits the server said. If you pass request not require, then the handshake completes with the server getting no cert for the connection. Right, but I don't like this real

Re: Removal of generateCRMFRequest

2013-09-27 Thread Eddy Nigg
cation controlled session. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: Removal of generateCRMFRequest

2013-09-27 Thread Eddy Nigg
discussed here for removal. I assume it was put into the capabilities of FF exactly for this purpose in first place. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypt

Re: Removal of generateCRMFRequest

2013-09-27 Thread Eddy Nigg
plementing a dedicated UI. And client certificates (which may be used on smart cards) are part of the browser capabilities. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto ma

Re: Removal of generateCRMFRequest

2013-09-27 Thread Eddy Nigg
r-specific solutions that are not standardized, interoperable behaviour? No, since it works for us there was never a desire for such a punishment. Besides that I'm not a browser vendor really. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startc

Re: Removal of generateCRMFRequest

2013-09-27 Thread Eddy Nigg
ted with can trigger session termination and/or authentication. Whereas without it the card could be removed and the session would stay valid like any other session. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://t

Re: Removal of generateCRMFRequest

2013-09-27 Thread Eddy Nigg
alues, and all of window.pkcs11.* (smart card events). Just for the record, we are using the window.crypto.enableSmartCardEvents and friends - also note that IE provides a similar functionality for that. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blo

Re: test signed message

2013-05-19 Thread Eddy Nigg
(note that I'm using the newsgroup and not email). -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.or

Re: Mozilla Team-about the upcoming branding changes at Symantec/VeriSign, and working to implement them in Mozilla/Firefox

2012-03-09 Thread Eddy Nigg
erisign root with the correct organization field. Just a small warning - they should not attempt to use "Norton" in the organization field, this would clearly violate the Mozilla policy and Baseline Requirements. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startc

Re: Google about to fix the CRL download mechanism in Chrome

2012-02-10 Thread Eddy Nigg
ble belts. Which type of revocation are you? Make your choice -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: Google about to fix the CRL download mechanism in Chrome

2012-02-08 Thread Eddy Nigg
dy else is doing it and we don't want to look less secure. Well, in fact the Mozilla based browsers were one of the first to successfully support OCSP. Most, if not all other browsers either didn't even exist at that time or didn't support OCSP (and CRL checking was not turned

Re: Google about to fix the CRL download mechanism in Chrome

2012-02-08 Thread Eddy Nigg
top 500 sites and leave the rest to the CAs. There would be probably also the highest gains. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list dev-tech-crypto@li

Re: Google about to fix the CRL download mechanism in Chrome

2012-02-08 Thread Eddy Nigg
, expired or revoked. A revoked certificate is not valid, no matter the reason (which does not have to be present in the CRL). -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto

Re: Firefox: Partial Encryption Information

2011-12-19 Thread Eddy Nigg
ively somewhere not encrypted - making any other encryption somewhat useless. For SSL to work correctly, the entire content must be encrypted, otherwise important information can be obtained to exploit the session. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org

Re: For discussion: MECAI: Mutually Endorsing CA Infrastructure

2011-10-21 Thread Eddy Nigg
t's the browsers which fail to use the full potential. For CAs that don't provide sufficient alternatives (multiple OCSP URIs, CRLs), redundant servers etc., subscribers will find better sources for their certificates. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP

Re: Question about pathlen extension checked

2011-09-19 Thread Eddy Nigg
On 09/19/2011 08:34 PM, From Robert Relyea: If you really want pathlen of '0', then just set the isCA bit to FALSE;). Well wellNSS (or PSM) doesn't even accept an end user certificate with CA=TRUE as we found out recently. And that's very good IMO. -- Regards

Re: How to determine V8 vs. V9 DB at runtime

2011-08-19 Thread Eddy Nigg
ds Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: XPI signing certificate authority recomendations

2011-03-29 Thread Eddy Nigg
used and applied at signing. Is this what you did? Maybe this helps: http://adblockplus.org/blog/trying-to-get-rid-of-author-not-verified-or-signing-extensions-with-sitecom-certificate -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org

Re: XPI signing certificate authority recomendations

2011-03-17 Thread Eddy Nigg
e bag. The client doesn't have to have the intermediate CA certificates, it only must chain to a valid root however. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailin

Re: Google's Chrome. Was: Root certificate authorities

2011-03-13 Thread Eddy Nigg
ectly usable request. :-( -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: TLS server keys in DNS: client policy proposal

2011-02-13 Thread Eddy Nigg
w DANE could be useful with CA issued certificates. The above is a non-starter (at least for me) and rather dangerous for any third party relying on it. But those are my opinions at least if and until this gets implemented anywhere and I can prove my point. -- Regards Signer: Eddy Nigg, Sta

Re: TLS server keys in DNS: client policy proposal

2011-02-12 Thread Eddy Nigg
more compelling argument than you have as if your arguments are more convincing and the only ones that count :-) but I don't think that the two of us will make any progress with more back-and-forth. Full agreement this time between us. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP

Re: TLS server keys in DNS: client policy proposal

2011-02-11 Thread Eddy Nigg
we police our own policy differently in first place? -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: TLS server keys in DNS: client policy proposal

2011-02-11 Thread Eddy Nigg
should continue to let them insert themselves into a process that could be run far more securely and efficiently without a third party. I believe that CAs provide exactly the value necessary to make a difference which you think is superfluous. I don't buy it. Fine with me.

Re: TLS server keys in DNS: client policy proposal

2011-02-11 Thread Eddy Nigg
7;t revoke their own certificate and it's not meant to be that way. The issuer is obviously not the same entity as the end user - surprise. It's the assertion by a third party that provides the value. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startc

Re: TLS server keys in DNS: client policy proposal

2011-02-11 Thread Eddy Nigg
ly trusting DNS, as I originally stated. Well, you can call white black and vice versa and we'll probably will not convince each other. Also not necessary. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitt

Re: TLS server keys in DNS: client policy proposal

2011-02-10 Thread Eddy Nigg
ikely entirely meaningless. Instead I believe that CAs should take the best out of DNSSEC for their validation procedures and this is my intention too. Time will tell if I'm right. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.start

Re: TLS server keys in DNS: client policy proposal

2011-02-10 Thread Eddy Nigg
On 02/11/2011 12:36 AM, From Eddy Nigg: I didn't say DV doesn't rely on DNS, almost everything on the *NET* uses DNS. Corrected. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_ni

Re: TLS server keys in DNS: client policy proposal

2011-02-10 Thread Eddy Nigg
ke certificates by a responsible third party is however probably a strong point in favor for CA issued certificates, CA provided warranties on top yet another. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.c

Re: TLS server keys in DNS: client policy proposal

2011-02-10 Thread Eddy Nigg
en if you deny it. I'm not ranting against you. I'm trying to focus the discussion on actual claims and verifiable facts. Good. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg

Re: TLS server keys in DNS: client policy proposal

2011-02-10 Thread Eddy Nigg
which you want them to give up partly. Or in addition. Or a combination of those. I just mentioned in the previous mail a couple of arguments, perhaps you've got some answer to those instead of ranting against me? -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startco

Re: Two-factor auth for Bugzilla

2011-02-06 Thread Eddy Nigg
On 02/06/2011 05:38 PM, From Florian Weimer: The IP address restriction is a pretty strong factor. Florian, tell me what your IP is and I'll log into Bugzilla next time with that IP. Getting to know your IP is fairly easy too. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:

Re: TLS server keys in DNS: client policy proposal

2011-02-06 Thread Eddy Nigg
ng a CA take responsibility is obviously not only a technical solution to a certain problem. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list dev-tech-

Re: TLS server keys in DNS: client policy proposal

2011-02-05 Thread Eddy Nigg
st likely this is not what the Anti-CA crowd wants to achieve, but nevertheless might get in the end. :-) -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list dev-

Re: Two-factor auth for Bugzilla

2011-02-02 Thread Eddy Nigg
r possible usability issues. Considering the technically more experienced users of Bugzilla could benefit from such an option. My experience is that if they know how to obtain a client cert, they'll know to handle its use usually as well. -- Regards Signer: Eddy Nigg, StartCom Ltd.

Re: Support for SSL False Start in Firefox

2010-10-05 Thread Eddy Nigg
med in the article. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-21 Thread Eddy Nigg
On 05/21/2010 05:51 PM, From Gervase Markham: On 21/05/10 12:11, Eddy Nigg wrote: And your whole arguing starts to become ridiculous. Not at all. He is saying that the browser cannot tell whether a certificate problem is the result of an attack or the result of a misconfiguration. And

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-21 Thread Eddy Nigg
On 05/21/2010 09:49 AM, From Matt McCutchen: Once again, I make no such claim. I said that if there is in fact no impersonation, then the error is a false positive.*Of course the browser cannot determine that.* And your whole arguing starts to become ridiculous. -- Regards Signer: Eddy

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-21 Thread Eddy Nigg
understanding as to how this all works. I could have saved myself a response - you've said that way better. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing lis

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-21 Thread Eddy Nigg
cate is valid and this is, if you trust the issuer. Feel free to add any CA root to your trusted authorities, but don't expect that Mozilla will add any of them without proper vetting and compliance procedure. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Bl

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-21 Thread Eddy Nigg
end-user as to the differences between those classes? I believe that it's not the CAs but the software vendors which refuse to do so. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- de

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-20 Thread Eddy Nigg
On 05/21/2010 03:23 AM, From Matt McCutchen: On May 19, 11:28 am, Eddy Nigg wrote: Well, just for the record, lets get this strait - there are no false positives. I have NEVER encountered an error with a web site and there was no reason for it. Either the certificate was not trusted or the

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-20 Thread Eddy Nigg
On 05/19/2010 07:44 PM, From Marsh Ray: Perhaps one identifiable improvement here is that this ability to get acceptable certs easily could be made more widely known? Yes, perhaps...but it might be difficult for Mozilla to do so too openly...not sure. -- Regards Signer: Eddy Nigg

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-19 Thread Eddy Nigg
xpired certificate, which often is just a bad manipulation when the cert is *shortly* expired. The browser could be smarter about that. Yes, I agree with that. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.c

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-19 Thread Eddy Nigg
On 05/19/2010 01:30 PM, From Jean-Marc Desperrier: Eddy Nigg wrote: Isn't this actually a sign that the technology works? I mean, 100% false positives means literally 100% success. Shit no ! The higher the false positive rate, the more acute the failure. Well, just for the record, let

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-18 Thread Eddy Nigg
nts. That's why we hang out here in first place. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-18 Thread Eddy Nigg
ng exposed to attack should be "we failed", not "users have poor judgment". I think I start to agree with you - so what is it that you are proposing? -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ T

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-18 Thread Eddy Nigg
it's a problem for those which want the "freedom" to use their home-grown weed. Except that security ends there. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypt

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-18 Thread Eddy Nigg
dge, laziness or stubbornness, but has little to do how browsers treat such errors. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozil

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-17 Thread Eddy Nigg
On 05/17/2010 09:25 PM, From Marsh Ray: This is half in jest, but half serious too. There may be something here. Imagine how fast sites would fix their certs if the scary page proposed keyword alternative sites that did not have cert issues. Truly evil :-) -- Regards Signer: Eddy Nigg

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-17 Thread Eddy Nigg
ining paragraph starts: Apparently there are some that prefer dancing pigs, so what?! But lets not start this debate all over again... :-( -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-c

Re: Can I add more than one e-mail addresses as subjAltName extionsion in X.509 cert

2010-05-17 Thread Eddy Nigg
On 05/17/2010 06:22 PM, From Jean-Marc Desperrier: Eddy Nigg wrote: - Do other applications (like thunderbird and other mail), would make sure that they search through all the e-mail addresses to look for a match? Yes, this appears to be the case. IIRC, they do but they are some place

Re: Can I add more than one e-mail addresses as subjAltName extionsion in X.509 cert

2010-05-15 Thread Eddy Nigg
ds Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: Alerts on TLS Renegotiation

2010-04-14 Thread Eddy Nigg
pgrade. When that will happen, who knows... -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: Alerts on TLS Renegotiation

2010-04-13 Thread Eddy Nigg
On 12/04/2010 15:29, Eddy Nigg wrote: updated servers need updates clients and break older ones, whereas old servers will not allow new clients. I haven't seen one yet, that doesn't have a flag to accept older clients. If you set that flag, *and* disable renegotiation at least

Re: What is this?

2010-04-12 Thread Eddy Nigg
On 04/12/2010 11:27 PM, Nelson B Bolyard: Yup, just test files used by the automated QA scripts run in Tinderbox. They must be replaced every year or so. http://tinderbox.mozilla.org/showbuilds.cgi?tree=NSS Nice :-) and thanks. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start

Re: What is this?

2010-04-12 Thread Eddy Nigg
On 04/12/2010 08:18 PM, Eddy Nigg: http://bonsai.mozilla.org/cvsview2.cgi?command=DIRECTORY&subdir=mozilla/security/nss/tests/libpkix/certs&files=OCSPCA1.cert:OCSPCA1.p12:OCSPCA2.cert:OCSPCA2.p12:OCSPCA3.cert:OCSPCA3.p12:OCSPEE11.cert:OCSPEE12.cert:OCSPEE13.cert:OCSPEE14.cert:

What is this?

2010-04-12 Thread Eddy Nigg
OCSPEE23.cert:OCSPEE31.cert:OCSPEE32.cert:OCSPEE33.cert:OCSPRoot.cert:OCSPRoot.p12&root=/cvsroot -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list dev

Re: Alerts on TLS Renegotiation

2010-04-12 Thread Eddy Nigg
cally if not the whole Internet moves to the new protocol in one day, there is going to be nightmare. It's starting already with updated clients or updated servers, we'll have always a group which isn't served. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startc

Re: Difference between Firefox and Thunderbird in Supplied Root Certificates

2010-04-09 Thread Eddy Nigg
certificate is signed by the above CA certificate. If I navigate to the same website with Firefox 3.6.3, the SSL handshake is successful because the CA certificate is present. What needs to be done to get this remedied? I suspect that might be because the server doesn't send the complet

Re: Difference between Firefox and Thunderbird in Supplied Root Certificates

2010-04-09 Thread Eddy Nigg
certificate is signed by the above CA certificate. If I navigate to the same website with Firefox 3.6.3, the SSL handshake is successful because the CA certificate is present. What needs to be done to get this remedied? I suspect that might be because the server doesn't send the complet

Re: import key pairs but un-exportable private key

2010-04-08 Thread Eddy Nigg
t; Enable FIPS. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: Domain-validated name-constrained CA certificates?

2010-04-06 Thread Eddy Nigg
gards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: Exploitability of the TLS renegotiation prefix-injection attack

2010-04-04 Thread Eddy Nigg
See this article, section 4.2, conclusion #1: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.140.2584&rep=rep1&type=pdf Where exactly? I haven't see that this information is not subject to user modification. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:sta

Re: Alerts on TLS Renegotiation

2010-04-04 Thread Eddy Nigg
rsh Ray wears a white hat! Unfortunately we don't know how many times this has been used successfully. Thanks for the explanations, it broadened my understanding about its potential misuse. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http

Re: Different services on the same server - RFC 4985

2010-04-04 Thread Eddy Nigg
e next steps to include it in the certificates. Peter has been working with us for the XMPP certificates, but unfortunately we haven't come about to actually do that. It's still on my plate though... -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:

Re: Different services on the same server - RFC 4985

2010-04-04 Thread Eddy Nigg
://tools.ietf.org/html/draft-saintandre-tls-server-id-check-02 -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org

Re: Exploitability of the TLS renegotiation prefix-injection attack

2010-04-04 Thread Eddy Nigg
ntributing fact which obviously shouldn't happen, but even without it it's certainly no guaranty for protection for this kind of coding. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -

Re: Alerts on TLS Renegotiation

2010-04-03 Thread Eddy Nigg
ier? Isn't it amazing that such a fairly trivial exploit existed for such a long time? Yourself know the SSL protocols in and out and never thought about it? -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://

Re: Alerts on TLS Renegotiation

2010-04-02 Thread Eddy Nigg
RSA key sizes above 1024 to mention only a few. This is not a mozilla unilateral decision. It's made in concert with other browser vendors. If all parties pull at the same string, this might work. So far this has seldom worked. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:star

Re: Alerts on TLS Renegotiation

2010-04-02 Thread Eddy Nigg
rs will do and when. When I did the risk assessment I came to the conclusion that when using an RFC 5746 compliant client, the risk for exploiting it, is incredible low. I believe the risks of SSLv2 were higher on a practical level. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP

Re: Alerts on TLS Renegotiation

2010-04-01 Thread Eddy Nigg
On 03/31/2010 06:48 PM, Eddy Nigg: On 03/31/2010 04:45 PM, Kai Engert: == snip quote begin == E.g., the attacker would send: GET /pizza?toppings=pepperoni;address=attackersaddress HTTP/1.1 X-Ignore-This: And the server uses the victim's account to send a pizza to the att

Re: Improper SSL certificate issuing by CAs

2010-04-01 Thread Eddy Nigg
On 04/01/2010 02:40 PM, Michael Ströder: You could also spend ~5000 EUR and have your own corporate sub-CA issuing certs for whatever DNS name you want. Which doesn't imply that no domain control validation is performed. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:

Re: Improper SSL certificate issuing by CAs

2010-04-01 Thread Eddy Nigg
We've been discussion this issue to death already and Verisign committed to it. Apparently they haven't done so, despite their commitment. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg

Re: Improper SSL certificate issuing by CAs

2010-04-01 Thread Eddy Nigg
r of the domain portugalmail.pt can not. I suggest to add another item to the Mozilla CA Policies that: A) CAs are required to accept revocation requests by third parties and investigate any request B) CAs are required to revoked certificates upon key comprise and wrongful issuance -- Regards Sig

Re: Improper SSL certificate issuing by CAs

2010-04-01 Thread Eddy Nigg
iming is a bit questionable ;-) -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: Improper SSL certificate issuing by CAs

2010-04-01 Thread Eddy Nigg (StartCom Ltd.)
Hi Kurt, Terrific! What's your next step now? Where do you intend to publish it? PS. I know a real person who's name is Marco Polo ;-) Regards Signer: Eddy Nigg, COO/CTO StartCom Ltd. <http://www.startcom.org> XMPP: start...@startcom.org Blog: Join the R

Re: Alerts on TLS Renegotiation

2010-03-31 Thread Eddy Nigg
n any case. Effectively, the attacker can execute a request on behalf of the user, without needing to know the user's credentials. Your assumptions are wrong and the whole thing is over-hyped as I mentioned in the bug. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start

Alerts on TLS Renegotiation

2010-03-31 Thread Eddy Nigg
concern IMO. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: Using of HTML keygen element

2010-03-30 Thread Eddy Nigg
flags possible to impose by the requesting web site. I prefer keygen because of it's simplicity and it simply works. Before we can add more sophisticated features, lets get to the point where browsers support something that works across the band. -- Regards Signer: Eddy Nigg, StartCom

Re: Using of HTML keygen element

2010-03-30 Thread Eddy Nigg
On 03/30/2010 01:23 PM, Jean-Marc Desperrier: And making more obvious that keygen is not a good long term solution is a very good thing. Only in case the alternative will be supported by all or most browsers. Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog

Re: A dedicated SSL MITM box on the market

2010-03-29 Thread Eddy Nigg
On 03/29/2010 10:41 PM, Peter Djalaliev: Matt Blaze seems to imply that this is already happening. I have not seen a confirmation of such a case. No such evidence exists. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org

Re: Improving SSL client auth and bad certificate reporting in non-browser applications

2010-03-26 Thread Eddy Nigg
cation for both "authenticated" and "not authenticated" icons.) My first thought was that this should be really where Larry is. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg

Re: Improving SSL client auth and bad certificate reporting in non-browser applications

2010-03-16 Thread Eddy Nigg
effort! I hope I'll find the time to study your documents a bit more, just browsed through them for now. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list

Re: Problems importing PKCS #12 client certs

2010-03-07 Thread Eddy Nigg
, the arguments were usually exactly the point I made. Firefox (and other applications) have their own crypto store, making it independent from what happens at the system level. There are obviously pros and cons for this approach. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start.

Re: Problems importing PKCS #12 client certs

2010-03-07 Thread Eddy Nigg
On 03/07/2010 11:23 AM, aerow...@gmail.com: On Thu, Mar 4, 2010 at 6:42 AM, Eddy Nigg wrote: I think it would make much, much more sense to use the OS store for private keys across all Firefox versions ! Yes, and with a compromise of the system you'd also loose those installed at

Re: Problems importing PKCS #12 client certs

2010-03-04 Thread Eddy Nigg
much, much more sense to use the OS store for private keys across all Firefox versions ! Yes, and with a compromise of the system you'd also loose those installed at the Mozilla applications. Not nice :S -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.or

Re: Problems importing PKCS #12 client certs

2010-03-03 Thread Eddy Nigg
other major browser? :-) -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: Another protection layer for the current trust model

2010-02-22 Thread Eddy Nigg
ly do they do (it seems that certificate approval duty floats around between a few people). Currently Kathleen Wilson is module owner and in charge for CA issues. There are another few Mozilla employees involved from time to time. And a couple of volunteers performing the reviews. -- Regards Signer:

Re: Another protection layer for the current trust model

2010-02-21 Thread Eddy Nigg
On 02/21/2010 10:56 PM, Eddy Nigg: On 02/21/2010 09:34 AM, Nguyễn Đình Nam: The way to solve it is not to inform people of each potential attack, because there will be too many false positive, pushing people to just ignore it, rendering the scheme ineffective. The way to solve it is to let a

Re: Another protection layer for the current trust model

2010-02-21 Thread Eddy Nigg
#x27;s not feasible. -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: Another protection layer for the current trust model

2010-02-20 Thread Eddy Nigg
oblem in such an easy way, why isn't it already in use for more than a decade? Recent studies going at task with those accessing SSH servers have shown that most users simple edit their known_hosts file - those people are way more knowledgeable than the casual users. It doesn't work.

Re: Fix for the TLS renegotiation bug

2010-02-20 Thread Eddy Nigg
On 02/21/2010 03:10 AM, Jean-Marc Desperrier: On 20/02/2010 03:25, Eddy Nigg wrote: Apache performs a renegotiation when none is needed when configuring client authentication at a particular location, is there a logical explanation for that? Or even considered correct implementation? Yes

Re: Fix for the TLS renegotiation bug

2010-02-19 Thread Eddy Nigg
On 02/20/2010 12:22 AM, Eddy Nigg: On 02/19/2010 08:59 PM, Jean-Marc Desperrier: I just tried configuring a similar configuration, and thought more and more whilst doing that it doesn't make sense, that it can't fail in the way you described. And it doesn't (with tw

Re: Fix for the TLS renegotiation bug

2010-02-19 Thread Eddy Nigg
t that. Right. And does that omit renegotiation by the server? -- Regards Signer: Eddy Nigg, StartCom Ltd. XMPP:start...@startcom.org Blog:http://blog.startcom.org/ Twitter: http://twitter.com/eddy_nigg -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto

Re: Fix for the TLS renegotiation bug

2010-02-19 Thread Eddy Nigg
Eddy Nigg wrote: Trying the different sub domain trick doesn't work on the same server but different host and IP. Let me phrase this explicitly : - You use only one Apache instance Correct. - You configured two virtual hosts inside that instance - either each virtual host listens

Re: Fix for the TLS renegotiation bug

2010-02-18 Thread Eddy Nigg
On 02/18/2010 03:54 PM, Eddy Nigg: Which reminds me that we were at this stage already in the past. Basically the authenticated session would have to be relayed through to the second server, something I rather prefer not to do. I suspect that there is no other way around that. Trying the

Re: Fix for the TLS renegotiation bug

2010-02-18 Thread Eddy Nigg
On 02/18/2010 02:43 PM, Eddy Nigg: This requires that you split your content into two separate servers, jump to authent.secure.startcom as soon as a user wishes to use a cert, and remain at secure.startcom while you don't need the user to be authenticated. OK, now I got it...inde

  1   2   3   4   5   6   7   8   9   10   >