HggdH [2008-05-07 19:34 -0500]:
> On Thu, 2008-05-08 at 00:45 +0200, Martin Pitt wrote:
> 
> > This doesn't have anything to do with power users/n00bs. An invalid
> > SSL certificate isn't any better or worse depending on the type of
> > user. If a site sets up SSL with an invalid certificate, then this
> > buys the user nothing but a false sense of security.
> 
> Sorry. What *is* an invalid certificate? A certificate that does not
> carry the fully-qualified host name in its Common Name?

It doesn't need to have the FQDN as far as I know. The domain name is
sufficient, so that it matches for all hosts in that domain. I don't
particularly mind if I am talking to banking.mybank.com or
svr23.mybank.com. 

The domain name should really match, otherwise the certificate does
not fit for the host name. However, I personally consider non-matching
host names a much lesser evil than non-verifiable certificates.

> An invalid certificate is a certificate that is outside its timeframe
> (not valid before/after), or that does not verify against the root (all
> the way through the chain), or that is used outside its specified
> capabilities (but *this* one is oh so very tricky...), for example.

Right, but also self-signed certificates (since they prove nothing).

> But not matching the FQHN does *NOT* make a certificate invalid. At all.
> Even more because there is no standard requiring it. Well, there is the
> common use, but it is common use also for most users to accept any
> certificate received on the wire. Common use does not cut it.

Agreed, although it is very confusing. For large companies which do
have several host names and have a lot of customers which interact
with it (banks, major email providers, etc.) it shouldn't be a problem
to get a properly signed certificate, and for small companies and
private persons cacert is appropriate (much less strong
authentication, but compared to today's practice it's much better.)

> 100% with you. But it all has to start with education, not just forcing
> a new feature down the user's throat. For most casual users, this
> education is -- from my own experience with casual and theoretically
> technical users -- not easy. And I do understand X509 & friends.

I don't consider it a new feature, but a better UI. Firefox has always
complained about invalid certificates, but until version 2 it was just
the well-known 'SSL yadayada cannot be verified mumblemumble click
here to shut me up' popup dialog, and really everyone just clicked
this away, right? Security click-through dialogs should be abolished,
since they achieve nothing and are really just an excuse for the
software provider: "I know it is unsafe, and cannot give you something
better. Of course you can't know either, but at least I can make it
your problem now."

Now you get at least a proper error message page. I don't doubt that
the text can be improved, and make more concise/clear, etc., but the
UI is much better IMHO.

Martin

-- 
Martin Pitt                        | http://www.piware.de
Ubuntu Developer (www.ubuntu.com)  | Debian Developer  (www.debian.org)

Attachment: signature.asc
Description: Digital signature

-- 
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss

Reply via email to