the flaw is in assigning FULL trust to the CA without the user's permission.    this results in "trusted" certificates being passed out like fliers at the fair with then end result being we really cannot be sure that such certificates are trustworthy.   you can't tell by looking at them: you have to verify the fingerprint.   and you ant to do that in order to reduce the attack surface available to the scammers.

On 09/23/2015 10:15 AM, Robert J. Hansen wrote:
ssl/tls is a mess: they pass out x.509 certificates like fliers at the
fair and there is no way to tell which are right and which are fake just
by looking at them.    everyone is told "don't worry; be happy; you CA
has your back"
Sure.  But where is this a flaw of TLS?  It isn't TLS's fault the
browser vendors trust too many CAs, or unreliable CAs.  Your objections
boil down to, "OS vendors and browser manufacturers give trust to CAs
that are not trustworthy, and end-users don't validate certificates."
Both of which are true, and neither of which has anything to do with TLS.

available.   but it isn't .   and we don't want to end up like ssl/tls:
we want to be able to retain control over what has been authenticated
and what is un-trusted .
You might.  Other people might not.  Remember that the Web of Trust is
completely compatible with a CA-style approach.  It was specifically
designed that way.



_______________________________________________
enigmail-users mailing list
[email protected]
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net

-- 
/Mike

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
enigmail-users mailing list
[email protected]
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net

Reply via email to