On Mon, Jan 4, 2016 at 9:31 AM, Bobby Holley <bobbyhol...@gmail.com> wrote:
> On Mon, Jan 4, 2016 at 9:11 AM, Richard Barnes <rbar...@mozilla.com> > wrote: > > > Hey Daniel, > > > > Thanks for the heads-up. This is a useful thing to keep in mind as we > work > > through the SHA-1 deprecation. > > > > To be honest, this seems like a net positive to me, since it gives users > a > > clear incentive to uninstall this sort of software. > > > > By "this sort of software" do you mean "Firefox"? Because that's what 95% > of our users experiencing this are going to do absent anything clever on > our end. > > We clearly need to determine the scale of the problem to determine how much > time it's worth investing into this. But I think we should assume that an > affected user is a lost use in this case. > I believe that Chrome will be making a similar change at a similar time -Ekr > bholley > > > > > > > --Richard > > > > On Mon, Jan 4, 2016 at 3:19 AM, Daniel Holbert <dholb...@mozilla.com> > > wrote: > > > > > Heads-up, from a user-complaint/ support / "keep an eye out for this" > > > perspective: > > > * Starting January 1st 2016 (a few days ago), Firefox rejects > > > recently-issued SSL certs that use the (obsolete) SHA1 hash > algorithm.[1] > > > > > > * For users who unknowingly have a local SSL proxy on their machine > > > from spyware/adware/antivirus (stuff like superfish), this may cause > > > *all* HTTPS pages to fail in Firefox, if their spyware uses SHA1 in its > > > autogenerated certificates. (Every cert that gets sent to Firefox will > > > use SHA1 and will have an issued date of "just now", which is after > > > January 1 2016; hence, the cert is untrusted, even if the spyware put > > > its root in our root store.) > > > > > > * I'm not sure what action we should (or can) take about this, but for > > > now we should be on the lookout for this, and perhaps consider writing > a > > > support article about it if we haven't already. (Not sure there's much > > > help we can offer, since removing spyware correctly/completely can be > > > tricky and varies on a case by case basis.) > > > > > > (Context: I received a family-friend-Firefox-support phone call today, > > > who this had this exact problem. Every HTTPS site was broken for her > in > > > Firefox, since January 1st. IE worked as expected (that is, it happily > > > accepts the spyware's SHA1 certs, for now at least). I wasn't able to > > > remotely figure out what the piece of spyware was or how to remove it > -- > > > but the rejected certs reported their issuer as being "Digital > Marketing > > > Research App" (instead of e.g. Digicert or Verisign). Googling didn't > > > turn up anything useful, unfortunately; so I suspect this is "niche" > > > spyware, or perhaps the name is dynamically generated.) > > > > > > Anyway -- I have a feeling this will be somewhat-widespread problem, > > > among users who have spyware (and perhaps crufty "secure browsing" > > > antivirus tools) installed. > > > > > > ~Daniel > > > > > > [1] > > > > > > > > > https://blog.mozilla.org/security/2014/09/23/phasing-out-certificates-with-sha-1-based-signature-algorithms/ > > > _______________________________________________ > > > dev-platform mailing list > > > dev-platform@lists.mozilla.org > > > https://lists.mozilla.org/listinfo/dev-platform > > > > > _______________________________________________ > > dev-platform mailing list > > dev-platform@lists.mozilla.org > > https://lists.mozilla.org/listinfo/dev-platform > > > _______________________________________________ > dev-platform mailing list > dev-platform@lists.mozilla.org > https://lists.mozilla.org/listinfo/dev-platform > _______________________________________________ dev-platform mailing list dev-platform@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-platform