Re: TLS server keys in DNS: client policy proposal

2011-02-12 Thread Eddy Nigg
On 02/12/2011 05:44 AM, From Steve Schultze: Not that many phishing attacks rely on HTTPS. That report also details phishing attacks *on people seeking to purchase SSL certificates* in which the phishing happens over plaintext. If there's any community that would require an HTTPS connection

Re: TLS server keys in DNS: client policy proposal

2011-02-12 Thread Stephen Schultze
On 2/12/11 7:03 AM, Eddy Nigg wrote: If anybody else on this list would like to present a more compelling argument than you have as if your arguments are more convincing and the only ones that count :-) Not at all. I was inviting others to voice their support of your position as well,

Re: TLS server keys in DNS: client policy proposal

2011-02-12 Thread Steve Schultze
Zack, I think having some kind of statement from the Moz community could be helpful, and a good excuse for Moz folks to get up to speed on the spec. With respect to the Section 3 text, it may be best simply to voice your thoughts directly on the DANE list. I don't think the current text is

Re: certutil -D corrupting NSS database...

2011-02-12 Thread Nelson B Bolyard
On 2011-01-25 13:07 PDT, Michael H. Warfield wrote: [...] Instead of having a cert in the database with the name I specified in creating the .p12 file, I ended up with a cert in the database with the name of the E-Mail address in the cert. Not sure where that problem is (openssl or the