On Sat, 04 Sep 2010 01:59:17 +0200, fakessh <[email protected]> wrote:
> i am not running the MS systeme
> i use CentOS 5.5 and firefox
> 
> 
> On Fri, 03 Sep 2010 11:06:49 +0200, "Philipp Gühring"
> <[email protected]> wrote:
> 
>     Hi, You might be running into the Mixed Content problem, but I am 
> not sure. If that is the problem, then you can read here about possible 
> solutions: 
> http://www.google.com/search?hl=de&client=firefox-a&hs=DnS&rls=org.mozilla%3Aen-GB%3Aofficial&q=mixed+content+error+ssl&aq=f&aqi=&aql=&oq=&gs_rfai=
>
> Best regards, Philipp -----Original Message----- From: fakessh 
> <[email protected]> To: Users <[email protected]>, Openssl users 
> <[email protected]> Date: Thu, 02 Sep 2010 23:51:28 +0200 
> Subject: problem https with class 3 cert CACert
> 
>         hi folks hi all the people hi openssl users hi apache httpd 
> users t explain my problem i use CentOS 5.5 use httpd.i386 
> 2.2.3-43.el5.centos.3 rpm's centos use mod_ssl.i386 
> 1:2.2.3-43.el5.centos.3 rpms's centos I sometimes against this kind of 
> problem with certificates of type class 3, it was the color in the 
> address bar with the firefox the color in the address bar disappear 
> sometimes and a reload of web page was view again The padlock 
> disappears for the same occasion ... many return and welcome some ideas 
> are welcome 
> ______________________________________________________________________ 
> OpenSSL Project http://www.openssl.org User Support Mailing List 
> [email protected] Automated List Manager [email protected]
> 
> _______________________________________________
> List info: http://lists.roundcube.net/dev/
> BT/e81cb6e8


quote auteur
This is not an openssl question, nor even an Apache httpd question.  It
is more appropriately a Firefox question, and the symptoms match the
semantics of the "mixed content error".

If any media included on the page (image, audio, video, flash applet,
java applet, etc) is served from any insecure URL (http, ftp), the
padlock and address-bar color in Firefox go away.  This is because the
common belief on the browser user-interface is that a page loaded
without verifiable evidence that the content requested actually came
from where it was expected to come from renders the entire rendering of
the content suspect, partly due to the ability to invoke javascript and
other scripting from an insecure location which can change the
appearance and DOM content of even the parts loaded from secure
locations.  You can figure out which medium is being loaded from an
insecure location by using the Firebug extension.

(Also, if any URL is loaded from an insecure location that redirects to
an https location, the padlock and color go away as well.  It only stays
if the entire page-loading process is across SSL/TLS.)

You can verify this by viewing the page info (on Mac cmd+i; otherwise
Tools | Page Info > Security) and looking at the Technical Details pane.

There is no means for OpenSSL or Apache to change the processing path
for the display of the user interface -- that is rightly considered the
realm of the application, and the application simply takes what is
handed to it (the certificate, the evidence that the server provided
that it knew how to use the private key counterpart to the public key
included in the certificate, and the name of the site it expected) and
processes it to verify the certificate chain according to its local
rules.  Once the local application does this, the local application
determines how to display its own user interface.  OpenSSL implements
the protocol where the certificate is provided to and possession of the
private counterpart to the certified public key is evidenced to the
client -- called SSLv3 and TLSv1.  The things that that protocol can do
are the only things that OpenSSL can do, in regards to security
concepts, assertions, and evidence.

_______________________________________________
List info: http://lists.roundcube.net/dev/
BT/8f4f07cd

Reply via email to