On 23.02.15 22:39, John Nagle wrote:
    With the Lenovo and Comodo disclosures, the restrictions
on loading new certificates into Firefox clients need to be tightened.

The MITM-Ad/Malware installed via the Windows Certificate Store and not into browsers, so I cannot follow your conclusion.

My conclusion is that, after the 2011 incident[*] and now PrivDog, Comodo cannot be trusted and their Root Certificates need to be removed from browsers.

We still need to be able to install (in a controlled way) our own, self-signed certificates for our own CAs into browsers and operating systems. CAcert is one example. And besides our public CA Fraunhofer uses a private, self-signed CA in a well-regulated way for less sensitive, internal authentication, for example. And last but not least I personally use a private one myself to allow authenticated access to family members and friends to a private server.

Regards, JC

[*] https://nakedsecurity.sophos.com/2011/03/24/fraudulent-certificates-issued-by-comodo-is-it-time-to-rethink-who-we-trust/

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to