I was not aware that it is a configuration. Usually I see a pop-up which mentions that certificate is valid for 7 days. Maybe we could mention that changing the config proxy.cert.validity will change the validity of the certificate.
Sent from my iPhone > On Jul 19, 2018, at 5:53 AM, Philippe Mouawad <philippe.moua...@gmail.com> > wrote: > > Hello, > See: > http://jmeter.apache.org/usermanual/properties_reference.html#test_script_recorder_cert > > The property is: > proxy.cert.validity > > How would you like it improved ? > > Thanks > >> On Thu, Jul 19, 2018 at 2:50 PM, Srijon Das <srijon...@gmail.com> wrote: >> >> As a longtime jmeter user, I would like the option to decide how long my >> certificates will be valid, 1 week, 2 weeks, 3 weeks etc. And perhaps a >> warning describing the consequences of the security vulnerabilities. >> >> Most jmeter users, I feel will be in a position to judge the security risk >> themselves and use the certificate accordingly. >> >> Sent from my iPhone >> >>> On Jul 19, 2018, at 4:06 AM, Milamber <milam...@apache.org> wrote: >>> >>> >>> >>>>> On 19/07/2018 11:03, Philippe Mouawad wrote: >>>>> On Thu, Jul 19, 2018 at 11:56 AM, sebb <seb...@gmail.com> wrote: >>>>> >>>>> On 19 July 2018 at 10:34, Philippe Mouawad <philippe.moua...@gmail.com >>> >>>>> wrote: >>>>>>> On Thu, Jul 19, 2018 at 11:31 AM, sebb <seb...@gmail.com> wrote: >>>>>>> >>>>>>> On 19 July 2018 at 10:28, Philippe Mouawad < >> philippe.moua...@gmail.com> >>>>>>> wrote: >>>>>>>> Hello sebb, >>>>>>>> >>>>>>>> Yes users can change, but once again, it means adjusting defaults, >>>>>>> knowing >>>>>>>> they can be adjusted and which property it is. >>>>>>> That can be documented. >>>>>>> >>>>>> Which means all users read the whole documentation, do you think they >> do >>>>> ? >>>>>> I guess you know the famous RTFM :-) >>>>>> >>>>>> >>>>>>>> Why not make defaults better for usability ? >>>>>>> Because it compromises security. >>>>>>> >>>>>> Can you give more details ? >>>>> The point of a CA is to certify that a certificate chain is valid. >>>>> Locally generated CA certs do not do this. >>>>> Once the cert has been approved by the browser, it can be used to >>>>> certify anything, including a spoof bank site etc. >>>>> >>>>> JMeter users may not understand that, and so may not take sufficient >>>>> care of the certificate and its password. >>>>> Or they may forget that the cert has been added to the browser. >>>>> >>>>> Even some official CAs have inadvertently exposed their certs. >>>>> >>>>> I don't think we should ship JMeter with deliberately weak settings. >>>>> >>>>> Yes it may be inconvenient, but it is deliberately done to minimise >>>>> the effects of accidental certificate exposure. >>>>> >>>>> Users that understand the risks can override the setting, but that is >>>>> at their own risk. >>>>> >>>>> Remember that once the browser has stored the CA, it will be active >>>>> regardless of whether JMeter is actually being used. >>>>> So the sooner it expires, the safer it is. >>>>> Maybe a week is too *long*. >>>>> >>>> I am aware of that, but it means attacker has accessed the machine of >> user >>>> to get the CA. >>>> So the JMeter side is only a consequence, not root cause >>> >>> >>> The risk is the same if the duration is 7 days or 3 months, because the >> attacker need to have access to the private key of the temp JMeter CA root >> to generate some fake cert signed by the CA. This private key is on the >> machine (keystore.jks) >>> And if an attacker have already an access to the machine, it's can add >> directly another CA (not JMeter CA) into the certs vault on the machine, to >> made some malicious opérations... >>> >>> 3 months seems good for me (this is the mean duration for my load test >> missions) >>> >>> >>> >>> >>> >>>> >>>>>>>> It looks like 3 months would be good for Bruno, Antonio, me. >>>>>>>> Is it really a blocker for you ? if yes why ? >>>>>>> As above. >>>>>>> >>>>>>>> @Others what's your opinion ? >>>>>>>> >>>>>>>> Thanks >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>>> On Thu, Jul 19, 2018 at 10:55 AM, sebb <seb...@gmail.com> wrote: >>>>>>>>> >>>>>>>>> It's a trade-off between convenience and security. >>>>>>>>> >>>>>>>>> It's risky adding the certificate to the browser. >>>>>>>>> >>>>>>>>> I don't think the default should be changed. >>>>>>>>> >>>>>>>>> Users can always change it themselves if they accept the risks. >>>>>>>>> E.g. if they use a separate browser installation that has >>>>> certificate, >>>>>>>>> then a longer validity is more sensible. >>>>>>>>> It's too easy to forget that the cert has been added to the >> browser. >>>>>>>>> >>>>>>>>> S. >>>>>>>>> On 19 July 2018 at 09:35, Antonio Gomes Rodrigues < >> ra0...@gmail.com> >>>>>>>>> wrote: >>>>>>>>>> +1 for me >>>>>>>>>> >>>>>>>>>> Le jeu. 19 juil. 2018 à 10:27, Philippe Mouawad < >>>>>>>>>> p.moua...@ubik-ingenierie.com> a écrit : >>>>>>>>>> >>>>>>>>>>> Hello, >>>>>>>>>>> Currently : >>>>>>>>>>> >>>>>>>>>>> - proxy.cert.validity=7 >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> This is annoying for users who must remember to add the ROOT >>>>> JMeter >>>>>>>>>>> certificate to browser every week . >>>>>>>>>>> >>>>>>>>>>> I would suggest setting it to 1 year or at least 1 month. >>>>>>>>>>> >>>>>>>>>>> Regards >>>>>>>>>>> Philippe >>>>>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> -- >>>>>>>> Cordialement. >>>>>>>> Philippe Mouawad. >>>>>> >>>>>> >>>>>> -- >>>>>> Cordialement. >>>>>> Philippe Mouawad. >>>> >>>> >>> >> > > > > -- > Cordialement. > Philippe Mouawad.