See:
https://bz.apache.org/bugzilla/show_bug.cgi?id=62570

On Wed, Jul 25, 2018 at 10:14 PM, Philippe Mouawad <
philippe.moua...@gmail.com> wrote:

> Hello,
> For now I increase validity to 3 months as there is a majority that agrees.
>
> I guess in the future, Felix's proposal i better, but meanwhile, let's
> increase usability.
>
> Regards
>
> On Thu, Jul 19, 2018 at 8:11 PM, Felix Schumacher <felix.schumacher@
> internetallee.de> wrote:
>
>> Would the addition of such a message remove the need for a longer default
>> period?
>>
>> Or should we even let the user decide on generation how long it should be
>> valid? (with a short default like the seven days we currently have.)
>>
>> Felix
>>
>>
>>
>> Am 19.07.2018 um 15:06 schrieb Philippe Mouawad:
>>
>>> What ????
>>> You didn't read the manual :-) ?????
>>>
>>>
>>> Just kidding :-)
>>>
>>> Thanks for your ideas
>>>
>>> On Thu, Jul 19, 2018 at 3:05 PM, Srijon Das <srijon...@gmail.com> wrote:
>>>
>>> I was not aware that it is a configuration.
>>>>
>>>> Usually I see a pop-up which mentions that certificate is valid for 7
>>>> days. Maybe we could mention that changing the config
>>>> proxy.cert.validity
>>>> will change the validity of the certificate.
>>>>
>>>> Sent from my iPhone
>>>>
>>>> On Jul 19, 2018, at 5:53 AM, Philippe Mouawad <
>>>>>
>>>> philippe.moua...@gmail.com> wrote:
>>>>
>>>>> Hello,
>>>>> See:
>>>>> http://jmeter.apache.org/usermanual/properties_
>>>>>
>>>> reference.html#test_script_recorder_cert
>>>>
>>>>> The property is:
>>>>> proxy.cert.validity
>>>>>
>>>>> How would you like it improved ?
>>>>>
>>>>> Thanks
>>>>>
>>>>> On Thu, Jul 19, 2018 at 2:50 PM, Srijon Das <srijon...@gmail.com>
>>>>>>
>>>>> wrote:
>>>>
>>>>> As a longtime jmeter user, I would like the option to decide how long
>>>>>> my
>>>>>> certificates will be valid, 1 week, 2 weeks, 3 weeks etc.  And
>>>>>> perhaps a
>>>>>> warning describing the consequences of the security vulnerabilities.
>>>>>>
>>>>>> Most jmeter users, I feel will be in a position to judge the security
>>>>>>
>>>>> risk
>>>>
>>>>> themselves and use the certificate accordingly.
>>>>>>
>>>>>> Sent from my iPhone
>>>>>>
>>>>>> On Jul 19, 2018, at 4:06 AM, Milamber <milam...@apache.org> wrote:
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> On 19/07/2018 11:03, Philippe Mouawad wrote:
>>>>>>>>> On Thu, Jul 19, 2018 at 11:56 AM, sebb <seb...@gmail.com> wrote:
>>>>>>>>>
>>>>>>>>> On 19 July 2018 at 10:34, Philippe Mouawad <
>>>>>>>>>
>>>>>>>> philippe.moua...@gmail.com
>>>>
>>>>> wrote:
>>>>>>>>>
>>>>>>>>>> On Thu, Jul 19, 2018 at 11:31 AM, sebb <seb...@gmail.com> wrote:
>>>>>>>>>>>
>>>>>>>>>>> On 19 July 2018 at 10:28, Philippe Mouawad <
>>>>>>>>>>>
>>>>>>>>>> philippe.moua...@gmail.com>
>>>>>>
>>>>>>> wrote:
>>>>>>>>>>>
>>>>>>>>>>>> Hello sebb,
>>>>>>>>>>>>
>>>>>>>>>>>> Yes users can change, but once again, it means adjusting
>>>>>>>>>>>> defaults,
>>>>>>>>>>>>
>>>>>>>>>>> knowing
>>>>>>>>>>>
>>>>>>>>>>>> they can be adjusted and which property it is.
>>>>>>>>>>>>
>>>>>>>>>>> That can be documented.
>>>>>>>>>>>
>>>>>>>>>>> Which means all users read the whole documentation, do you think
>>>>>>>>>>
>>>>>>>>> they
>>>>
>>>>> do
>>>>>>
>>>>>>> ?
>>>>>>>>>
>>>>>>>>>> I guess you know the famous RTFM :-)
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> Why not make defaults better for usability ?
>>>>>>>>>>>>
>>>>>>>>>>> Because it compromises security.
>>>>>>>>>>>
>>>>>>>>>>> Can you give more details ?
>>>>>>>>>>
>>>>>>>>> The point of a CA is to certify that a certificate chain is valid.
>>>>>>>>> Locally generated CA certs do not do this.
>>>>>>>>> Once the cert has been approved by the browser, it can be used to
>>>>>>>>> certify anything, including a spoof bank site etc.
>>>>>>>>>
>>>>>>>>> JMeter users may not understand that, and so may not take
>>>>>>>>> sufficient
>>>>>>>>> care of the certificate and its password.
>>>>>>>>> Or they may forget that the cert has been added to the browser.
>>>>>>>>>
>>>>>>>>> Even some official CAs have inadvertently exposed their certs.
>>>>>>>>>
>>>>>>>>> I don't think we should ship JMeter with deliberately weak
>>>>>>>>> settings.
>>>>>>>>>
>>>>>>>>> Yes it may be inconvenient, but it is deliberately done to minimise
>>>>>>>>> the effects of accidental certificate exposure.
>>>>>>>>>
>>>>>>>>> Users that understand the risks can override the setting, but that
>>>>>>>>> is
>>>>>>>>> at their own risk.
>>>>>>>>>
>>>>>>>>> Remember that once the browser has stored the CA, it will be active
>>>>>>>>> regardless of whether JMeter is actually being used.
>>>>>>>>> So the sooner it expires, the safer it is.
>>>>>>>>> Maybe a week is too *long*.
>>>>>>>>>
>>>>>>>>> I am aware of that, but it means attacker has accessed the machine
>>>>>>>> of
>>>>>>>>
>>>>>>> user
>>>>>>
>>>>>>> to get the CA.
>>>>>>>> So the JMeter side is only a consequence, not root cause
>>>>>>>>
>>>>>>>
>>>>>>> The risk is the same if the duration is 7 days or 3 months, because
>>>>>>> the
>>>>>>>
>>>>>> attacker need to have access to the private key of the temp JMeter CA
>>>>>>
>>>>> root
>>>>
>>>>> to generate some fake cert signed by the CA. This private key is on the
>>>>>> machine (keystore.jks)
>>>>>>
>>>>>>> And if an attacker have already an access to the machine, it's can
>>>>>>> add
>>>>>>>
>>>>>> directly another CA (not JMeter CA) into the certs vault on the
>>>>>>
>>>>> machine, to
>>>>
>>>>> made some malicious opérations...
>>>>>>
>>>>>>> 3 months seems good for me (this is the mean duration for my load
>>>>>>> test
>>>>>>>
>>>>>> missions)
>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> It looks like 3 months would be good for Bruno, Antonio, me.
>>>>>>>>>>>> Is it really a blocker for you ? if yes why ?
>>>>>>>>>>>>
>>>>>>>>>>> As above.
>>>>>>>>>>>
>>>>>>>>>>> @Others what's your opinion ?
>>>>>>>>>>>>
>>>>>>>>>>>> Thanks
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> On Thu, Jul 19, 2018 at 10:55 AM, sebb <seb...@gmail.com>
>>>>>>>>>>>>> wrote:
>>>>>>>>>>>>>
>>>>>>>>>>>>> It's a trade-off between convenience and security.
>>>>>>>>>>>>>
>>>>>>>>>>>>> It's risky adding the certificate to the browser.
>>>>>>>>>>>>>
>>>>>>>>>>>>> I don't think the default should be changed.
>>>>>>>>>>>>>
>>>>>>>>>>>>> Users can always change it themselves if they accept the risks.
>>>>>>>>>>>>> E.g. if they use a separate browser installation that has
>>>>>>>>>>>>>
>>>>>>>>>>>> certificate,
>>>>>>>>>
>>>>>>>>>> then a longer validity is more sensible.
>>>>>>>>>>>>> It's too easy to forget that the cert has been added to the
>>>>>>>>>>>>>
>>>>>>>>>>>> browser.
>>>>>>
>>>>>>> S.
>>>>>>>>>>>>> On 19 July 2018 at 09:35, Antonio Gomes Rodrigues <
>>>>>>>>>>>>>
>>>>>>>>>>>> ra0...@gmail.com>
>>>>>>
>>>>>>> wrote:
>>>>>>>>>>>>>
>>>>>>>>>>>>>> +1 for me
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Le jeu. 19 juil. 2018 à 10:27, Philippe Mouawad <
>>>>>>>>>>>>>> p.moua...@ubik-ingenierie.com> a écrit :
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> Hello,
>>>>>>>>>>>>>>> Currently :
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>    - proxy.cert.validity=7
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> This is annoying for users who must remember to add the ROOT
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>> JMeter
>>>>>>>>>
>>>>>>>>>> certificate to browser every week .
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> I would suggest setting it to 1 year or at least 1 month.
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Regards
>>>>>>>>>>>>>>> Philippe
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>
>>>>>>>>>>>> --
>>>>>>>>>>>> Cordialement.
>>>>>>>>>>>> Philippe Mouawad.
>>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>> --
>>>>>>>>>> Cordialement.
>>>>>>>>>> Philippe Mouawad.
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>
>>>>>
>>>>> --
>>>>> Cordialement.
>>>>> Philippe Mouawad.
>>>>>
>>>>
>>>
>>>
>>
>
>
> --
> Cordialement.
> Philippe Mouawad.
>
>
>


-- 
Cordialement.
Philippe Mouawad.

Reply via email to