1)Have you ever tried to coerce IE to accept a self-signed cert
2)if you purchase a pfx with a self-signed certificate sold to you by 
chris_is_a_hacker.com for 1.00 then who do you think can break it

The cert allows browser to contact the sites SSL connector..by presenting 
credentials usually from a Name Server such as ADS or LDAP

the real work involves breaking the algorithm implemented by the key

in order  to establish Key exchange on a SSLv2 transport

I sincerely doubt even chris_is_a-hacker can break any of the RSA algorithms 
implemented by the key inside a versign.pfx 
 
'Nuf Said
Martin 
______________________________________________ 
Verzicht und Vertraulichkeitanmerkung/Note de déni et de confidentialité

Diese Nachricht ist vertraulich. Sollten Sie nicht der vorgesehene Empfaenger 
sein, so bitten wir hoeflich um eine Mitteilung. Jede unbefugte Weiterleitung 
oder Fertigung einer Kopie ist unzulaessig. Diese Nachricht dient lediglich dem 
Austausch von Informationen und entfaltet keine rechtliche Bindungswirkung. 
Aufgrund der leichten Manipulierbarkeit von E-Mails koennen wir keine Haftung 
fuer den Inhalt uebernehmen.
Ce message est confidentiel et peut être privilégié. Si vous n'êtes pas le 
destinataire prévu, nous te demandons avec bonté que pour satisfaire informez 
l'expéditeur. N'importe quelle diffusion non autorisée ou la copie de ceci est 
interdite. Ce message sert à l'information seulement et n'aura pas n'importe 
quel effet légalement obligatoire. Étant donné que les email peuvent facilement 
être sujets à la manipulation, nous ne pouvons accepter aucune responsabilité 
pour le contenu fourni.

  


> From: jeffrey.har...@mantech.com
> To: users@tomcat.apache.org; ch...@derham.me.uk
> Date: Tue, 19 Mar 2013 06:04:52 -0400
> Subject: RE: SSL Best Practices
> 
> 
> 
> > -----Original Message-----
> > From: cjder...@gmail.com [mailto:cjder...@gmail.com] On Behalf Of chris
> > derham
> > Sent: Tuesday, March 19, 2013 1:58 AM
> > To: Tomcat Users List
> > Subject: Re: SSL Best Practices
> >
> > > If the system is only for testing, or communicates with a limited
> > > number of systems (i.e., it is a firewalled backend system that only
> > > communicates with a front-end system), then again, a self-signed
> > certificate would be fine.
> >
> > +1
> >
> > > I do agree that if this is a public facing system, or one in an
> > > organization with a large number of users that does not have its own
> > > CA infrastructure, then a commercial certificate would be the best
> > choice.
> >
> > Commercial certificate authorities are actively targeted by hackers,
> > and when they are broken into, the trust each os has configured of such
> > certificates can cause issues. The recent google ssl certificate issue
> > shows what happens when things go wrong. If users will access the site
> > via a browser, then the browser warning will confuse them/make them
> > used to ignoring security warnings. For applications communicating with
> > each other, a self signed certificate will actually be more secure than
> > a certificate authority issued certificate - assuming you trust your
> > internal security more than you trust that of a commercial certificate
> > authority. It all depends on what the certificate will be used for.
> >
> > Chris
> >
> 
> What you say is all true, but if the public is accessing the site,
> there is no real alternative to a commercial certificate, because there will
> be no way to ascertain the trust of the site at all, and as you say users 
> will be
> confused by the browser warnings.
> 
> Unfortunately, the security of the Internet is dependent on a relatively 
> handful
> of commercial certificate authorities, several of whom have either been 
> hacked,
> or who have not properly vetted requesters for certificates.
> 
> Jeffrey Harris
> 
> This e-mail and any attachments are intended only for the use of the 
> addressee(s) named herein and may contain proprietary information. If you are 
> not the intended recipient of this e-mail or believe that you received this 
> email in error, please take immediate action to notify the sender of the 
> apparent error by reply e-mail; permanently delete the e-mail and any 
> attachments from your computer; and do not disseminate, distribute, use, or 
> copy this message and any attachments.
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
> 
                                          

Reply via email to