On Sun, Jan 8, 2012 at 11:01 AM, Rumoseh, Loros <rumosehlo...@postafiok.hu> wrote: > Good morning Everybody. > > Q1: Correct me If I'm wrong, but AFAIK the OpenBSD team is not trusting the > CA/HTTPS modell on security side. That's why www.openbsd.org isn't > available over HTTPS [?].
What exactly is private on OpenBSD page to have it over https? ;-) > > ---off--- > Q2: Then why is: > https://lists.openbsd.org/cgi-bin/mj_wwwusr?user=&passw=&func=lists-long-full &extra=misc > using an invalid certificate? :O > ---on--- Because services for certificates are mostly too much expensive without a reason. Doesn't provide real security and because OpenBSD is fun project so self-signed certificate is enough? > > ------------------------------------------------- > > The main questions/RFC's: > I recently heard about Convergence, the website that features a firefox > plugin (client code) and a notary (server code) is here: > http://convergence.io/ > > A starting video of this Idea from the Developer, Moxie Marlinspike (author > of sslstrip/sslsniff): > https://www.youtube.com/watch?v=Z7Wl2FW2TcA > [the main part is from 35m40sec, but the video is worth watching!] > > If there is no adobe flash installed on your machine, then visit this link: > https://addons.mozilla.org/en-US/firefox/search/?q=youtube+downloader&appver= 9.0.1&platform=linux > > About Moxie Marlinspike > https://www.blackhat.com/html/bh-us-11/bh-us-11-speaker_bios.html#Marlinspike > > Convergence: > It's explicitly not an SSL replacement. It's a replacement for CAs, with > the explicit design goal of not forcing some giant IPv6-like "change the > world" rollout. It's based in large part on earlier work on solving the SSH > Host Key validation problem - see > http://www.usenix.org/event/usenix08/tech/full_papers/wendlandt/wendlandt_htm l/- > http://security.stackexchange.com/a/5968/2212 > > Q3: So what does the OpenBSD team think about this great [?] idea? Is it a > viable solution? Is this the future or just a dead end? > > ------------------------------------------------- > > ps.: Also URL's regarding this topic: > http://security.stackexchange.com/a/6780/2212 > http://security.stackexchange.com/a/10334/2212 > http://security.stackexchange.com/questions/9945/does-https-everywhere-defend s-me-against-sslsniff-like-attacks > http://unix.stackexchange.com/a/28288/6960 > > ------------------------------------------------- > > ps.2: > http://security.stackexchange.com/questions/9946/when-will-the-webbrowsers-ha ve-tls-1-2-support > http://security.stackexchange.com/questions/10481/next-microsoft-patch-tuesda y-include-beast-ssl-fix > > B B The TLS support for browsers right now is: > > B B B B IE9 TLS 1.0, 1.1, 1.2 all supported via Schannel > B B B B IE8 TLS 1.0 supported by default, 1.1 and 1.2 can be configured > B B B B Opera - 10.x supports TLS 1.0, 1.1, 1.2 > > B B I don't count older versions of any of these browsers, since people > really should have auto-update on. if they don't they've probably got > bigger problems ( http://isc.sans.edu/diary.html?storyid=11527 ) > > B B B B Mozilla/Firefox - TLS 1.0 only > B B B B Chrome - TLS 1.0 only (though an update is rumoured) > B B B B Safari - TLS 1.0 > B B B B Cell phones - various support levels (webkit has tls 1.2 since Nov > 2010, but for individual phone browser implementations your mileage may > vary) > > ------------------------------------------------- > > Thank you for any comments on this idea/questions. > > Long live OpenBSD! :) > > Have a nice day! > > bye!