So how do we add this to safaris list of trusted certificates?

Sent from my iPhone

> On Jul 6, 2014, at 11:20 AM, Kayaker <sea...@me.com> wrote:
> 
> Hi,
> 
> Certificates are not as intuitive as they should be. If you get a certificate 
> warning from a web site, it doesn't mean it is an invalid certificate. I will 
> attempt to simplify what is happening at the cost of some technical accuracy, 
> but I think this will help you all understand what is going on.
> 
> The HTTPS is basically HTTP over what is called SSL/TLS. This tries to 
> protect against two things: first, ensuring the site you are connecting to is 
> in fact the site you expect and second providing a secure encrypted 
> connection for data between you and the server.  This oversimplification of 
> how this works is by having a server you connect to send you a certificate. 
> This certificate contains a lot of information. It contains information about 
> the domain, the date the certificate was issued, how long the certificate is 
> valid for, and most important, the public key for the server. It also 
> includes information about who issued the certificate. Certificates are 
> usually issued by a Certificate Authority or CA. A CA is a trusted company 
> like Verisign and your web browser has a list of valid CA companies it 
> recognizes. When you first connect to a server via HTTPS, your browser tries 
> to validate the certificate with the CA. If your browser doesn't recognize 
> your CA as a trusted one, it will warn you. It doesn't mean the CA is bad, or 
> the certificate is bad, it means the browser doesn't know the validity of the 
> CA. It is perfectly valid to generate your own certificate and public and 
> private keys without using a CA. One would do this because one cares more 
> about encryption than validating the site as the one your are trying to 
> connect to. If you remotely connect to your Mac with ssh, you have sort of 
> done this with your own self signed certificate. 
> 
> Now a bank wants a certificate that can validate who it is. They will pay a 
> big deal of cash to have a CA issue them a certificate. The CA validates the 
> request by looking up business address, calling the main phone number, and 
> some other basic private investigation work. This prevents some hacker in 
> eastern Europe from obtaining a valid certificate from a CA. This is good if 
> you are a bank.
> 
> The take away is that some certificates are more trusted than others. I want 
> to trust my bank a whole lot more than online mom and pop shop.
> 
> So, you need a certificate for HTTPS. Now, what errors can the browser give 
> you and where are the holes. As I said, the first warning comes if the 
> browser doesn't have the CA in it's trusted list of CAs. This varies from 
> browser to browser. This is a warning because you might know more than the 
> browser's developer. The second error is if the CA rejects the validity of 
> the certificate, like the fingerprints don't match. Another error can be the 
> certificate has expired. Apple actually made this mistake recently on the app 
> store. 
> 
> Now, here is one huge hole in the process. Remember the heart bleed bug? 
> Well, certificates also have a private key. This private key is the most 
> important piece of secret data and is never given out publicly. The private 
> key is needed to decrypt the data. If a bad guy gets the private key, this 
> means that anyone could make a public key from the private and spoof a web 
> site. So, Owners of a certificate can revoke a certificate if it thinks the 
> private key has been compromised or for any other reason. No big deal right? 
> Well, turns out it is. The mechanism for checking a revoked certificate is 
> off by default in most all browsers. Google's chrome doesn't even really 
> bother to check if a certificate has been revoked. Safari is not much better 
> in checking. So until a certificate truly expires, a revoked certificate will 
> often work without warning the user.
> 
> More than you wanted to know, probably, but knowing why your browser warns 
> about a certificate is important so you can judge the validity of the risk. 
> In the case of NFB, I'd worry a little less, looks like the CA is not trusted 
> by the browser. However, since you went to the site yourself, validating that 
> nfb is nfb is a little less important. It's when you click on that link from 
> your email to your bank that it becomes critical. 
> 
> So, what do I do as best practice? If I get a warning like that, I look to 
> see who issued the certificate. If it is self signed, and I went to site, I 
> don't worry about it at all if it's a small shop or non profit.
> 
> Hope this helps a little and didn't confuse you all more.  Again, some 
> details were left out for simplicity sake in the hopes to make this a bit 
> less daunting.
> 
> Best,
> --k
> Faith doesn't give you the answers, it merely stops you from asking the 
> questions.
> 
> 
> 
> 
> 
> 
> 
> 
>> On Jul 4, 2014, at 9:20 AM, Littlefield, Tyler <ty...@tysdomain.com> wrote:
>> 
>> You really shouldn't ignore that. It means that the certificate is invalid. 
>> If this is something on the NFB side, they should really really renew it. If 
>> you're paying for anything with a credit card, the last thing you want is an 
>> insecure connection.
>> 
>> Sincerely,
>> the Constantly sock-footed me, Still a very happy windows, mac and IPhone 
>> user!
>> Sent from my toaster (TM): the only toaster with full accessibility built in 
>> without a vm!
>> 
>> -- 
>> You received this message because you are subscribed to the Google Groups 
>> "MacVisionaries" group.
>> To unsubscribe from this group and stop receiving emails from it, send an 
>> email to macvisionaries+unsubscr...@googlegroups.com.
>> To post to this group, send email to macvisionaries@googlegroups.com.
>> Visit this group at http://groups.google.com/group/macvisionaries.
>> For more options, visit https://groups.google.com/d/optout.
> 
> -- 
> You received this message because you are subscribed to the Google Groups 
> "MacVisionaries" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to macvisionaries+unsubscr...@googlegroups.com.
> To post to this group, send email to macvisionaries@googlegroups.com.
> Visit this group at http://groups.google.com/group/macvisionaries.
> For more options, visit https://groups.google.com/d/optout.

-- 
You received this message because you are subscribed to the Google Groups 
"MacVisionaries" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to macvisionaries+unsubscr...@googlegroups.com.
To post to this group, send email to macvisionaries@googlegroups.com.
Visit this group at http://groups.google.com/group/macvisionaries.
For more options, visit https://groups.google.com/d/optout.

Reply via email to