Richard Stallman wrote:
> I know nothing about this; I might not know how to do it.
> I hope you are not saying that people like me are unimportant
> when we judge what Savannah should do.

No, not at all.  It's perfectly OK not to know or bother (but we
provide simple instructions for those who care nevertheless).  In
which case it does not matter if the certificate is issued by a CA in
the browser's certificate store or whatever.

For years, we've been using self-signed certificate generated by
Sylvain (first with openssl, then with gnutls-cli) and there were no
problems.  When the Firefox developers implemented this nefarious
behavior in Gecko 1.9, we switched to a certificate issued by the most
popular CA in the free world.  Now faithful Firefox users are
blackmailing various sites to switch to a CA approved by them in order
to avoid the unpleasant warnings, instead of complaining to the
Mozilla developers.

So the question is whether we should accept to be blackmailed or not.
I don't care, personally, although I think it is a step behind if we
surrender to the trend.

Perhaps it's worth mentioning that CAcert's root certificate is
included in most major distros, and all browsers are modified to check
the system's certificate store.  So in practice it does not matter
much that it's not included in Mozilla, as most people use packaged
browsers provided by the distro.  (And I still don't understand why a
particular Mozilla decision should influence us.  Our certificate is
absolutely valid on all counts.)


Reply via email to