On Wed, July 16, 2014 11:42 pm, Falcon Darkstar Momot wrote:
>  When it comes to key material, it's an outstanding idea to err on the
>  side of caution.
>
>  Does anyone actually require this feature in a non-debug build?  If not,
>  then it's completely unreasonable to leave it in such builds, even if
>  it's not the weakest link and even if it doesn't break compliance.
>
>  --Falcon Darkstar Momot
>  --Security Consultant, Leviathan Security Group

Quite a few people, especially users of Chrome and Firefox, especially
those working to implement or deploy SPDY or HTTP/2.0 (which are over TLS,
ergo Wireshark/pcap can be a pain).

Given that the threat model requires a local attacker with same-privileges
as either of these applications (or influence over NSS environment), can
you describe a threat that could not be equally accomplished through
other, similarly trivial means (e.g. binary compromise)

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to