On 26.2.2021 2:07, John-Mark Gurney wrote:
Third party CA's are an untrusted automagical nightmare of global and
local MITM risk...

Do you delete all the CA's from your browsers then?

Yes, I'm cleaning them from browser, then I'm adding few CA as needed.

Despite of it, I'm not on grarpamp's side.

People are installing FreeBSD system on it's computer - it require a lot of trust. Most of users can trust even CA list that's part of FreeBSD system.

And those paranoid users like me ? We will check pre-installed CA list all the times. We do it now and we will do it even in the future. Because we trust no one. So we don't care what's content of file in stock install.

So I don't vote for grarpamp's proposal. It will decrease effective security of "standard user" and it will not help to the paranoid ones.

But it would be nice to know how it works. What CA are included into distributed bundle ? Who is making the final decision ? What rules he is obliged to follow ?

It should be documented somewhere.

Having tried to verify the certificate for a bank when verisign f'd
up their cert really doesn't work, trust me I've tried it, the
support has zero clue what you're talking about, and they have no
process to handle such a question...

My bank have defined process you are speaking of here. I has been IT security officer of such bank and I defined process in question. For about ten years, there has been one (!) call asking verification of the certificate. And it has been call from my friend that has been curious to verify if it works ...

Despite of it, it's not the argument related to the topic we are speaking of about. Certificates are just tool. It can be used properly or improperly. The proper use of tool depends on goal, so the goal needs to be discussed first.

Dan
_______________________________________________
freebsd-security@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to