Le 26/03/2015 01:39, Paul Rogers a écrit :
Paul, your tone is super aggressive, or so it looks like in
written form.
I'm sorry, Emanuele, that isn't my intent.  I'm just very, very
frustrated.  I do like to run a secure, hardened, but still usable
system.  It's not my habit to put things out that invite mischief.

All the responses have been dismissive "don't worry about it".  The
direct question I asked, "Does anyone know of a legitimate reason a user
would need to do this, e.g. like having a private key ring," has never
been addressed.

The point is, if the certificates used by the browser are in a read-
only location, then the script is harmless, and if the browser can
For the record: I get all that!  I completely understand.  OK?  I don't
need to be told, again.  It only adds to the frustration.

But let me point out an assumption you're making: "if the certificates
used by the browser are in a read-only location".  What's the "if not",
"otherwise", part of it?  In fact, are those the ONLY certificates a
browser/email client would use?  What if the user had his/her own
"certificates"?  I don't know for sure.  I don't think I want a user to
have any certificates--if they might be used they're dangerous, if
they'd never be used, there's no reason to have them.


Hi Paul,

Thanks for clarifying your point, and sorry if I did not understand sooner: my regular language is not English...

I think the beginning of the wikipedia entry is a good place to start:
"Trusted certificates are typically used to make secure connections <http://en.wikipedia.org/wiki/Transport_Layer_Security> to a server over the Internet. A certificate is required in order to avoid the case that a malicious party which happens to be on the path to the target server pretends to be the target. Such a scenario is commonly referred to as a man-in-the-middle attack <http://en.wikipedia.org/wiki/Man-in-the-middle_attack>. The client uses the CA certificate to verify the CA signature on the server certificate, as part of the checks before establishing a secure connection. Usually, client software—for example, browsers—include a set of trusted CA certificates. That makes sense in as much as users need to trust their client software: A malicious or compromised client can skip any security check and still fool its users into believing otherwise."

There are three places I know where client applications look for CA certificates. On BLFS systems they are: - /etc/ssl (used by applications using ssl, such as openssX, gnutls, and some mail programs)
- $JAVA_HOME/jre/lib/security (for java apps, as you might have guessed)

Both are read-only locations for normal users, of course. Unless client applications are themselves malicious (see above), there is no way to have them look into other places. If users have the programming skills to modify clients like firefox or java, they can as well write simple scripts to manipulate certificates: that is not the hard part, and they would not need ours...

- The third place (I know) is a file in Berkeley DB format in $HOME/.mozilla/firefox/.../cert8.db. In that file, the user can include certificates using the "preference" menu of firefox. He or she does not need the scripts on the "Certificate authority certificates" page... I do use it to include certificates for the CNRS (French national center for scientific research) web sites. I do not know whether a site can access that file to include its own certificate, without the user knowing. But certainly, the user can include any certificate in it, and this is desirable...

I am not sure, but it seems to me that the weakness in the ca-certificate (and PKI more generally) system, is if a publicly accessible repository is compromised, or if a company with a trusted certificate does things that show we should not have trusted them (as described in the link you have given).

Actually, this is what Debian says about its ca-certificate packages:
"Please note that Debian can neither confirm nor deny whether the certificate authorities whose certificates are included in this package have in any way been audited for trustworthiness or RFC 3647 compliance. Full responsibility to assess them belongs to the local system administrator."

But they do not tell how to assess...

Pierre
--
http://lists.linuxfromscratch.org/listinfo/blfs-support
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to