On 08/26/2011 06:46 PM, Justin Wood (Callek) wrote:
> On 8/26/2011 8:49 PM, NoOp wrote:
>> On 08/26/2011 01:33 PM, Robert Kaiser wrote:
>>> David E. Ross schrieb:
>>>> Is there an official, end-user release of SeaMonkey 2.3.1?  I've seen
>>>> some discussion about it, but there has been no announcement here.
>>>
>>> The surroundings have already been pointed out by Callek et al., and
>>> http://www.seamonkey-project.org/ has it listed.
>>>
>>> This is a very small update to 2.3, but important to install as the only
>>> change is to ensure that we can still send future updates even once the
>>> current certificate of our update server expires.
>>>
>>> Robert Kaiser
>>>
>>>
>>
>> That's more than a little disconcerting: "we can still send future
>> updates even once the current certificate of our update server expires".
>>
>> If your certificate has expired then you *shouldn't* be sending *updates
>> at all*. You should *fix* your certificate instead!
>>
>> Are you stating that SeaMonkey doesn't adhere to these:
>> http://www.mozilla.org/projects/security/certs/policy/
>> <http://www.mozilla.org/projects/security/certs/policy/EnforcementPolicy.html>
>>
>> <http://www.mozilla.org/projects/security/certs/policy/MaintenancePolicy.html>
>>
> 
> A bit overdramatic, (our release notes for 2.3.1 explicitly say what 
> change we made, with a link to the bug). But it was not in KaiRo's mail. 
> Let me briefly explain.

Actually *not* overdramatic at all given kairo's statement:

"we can still send future updates even once the current certificate of
our update server expires"

If the statement is in dispute then chastise Robert.

Actually it's the 'Changes' page that points to the bug report *not* the
release notes:

http://www.seamonkey-project.org/releases/
click 'release notes':
http://www.seamonkey-project.org/releases/seamonkey2.3/
<quote>
What's New in SeaMonkey 2.3.1

SeaMonkey 2.3.1 contains the following major changes relative to
SeaMonkey 2.2:

    Several fixes when importing email from Microsoft Outlook
</quote>

"certificate" is nowhere to be found on that page.

It's actually the 'changes' page that links to the bug report;

http://www.seamonkey-project.org/releases/seamonkey2.3/changes
[Add more app.update.certs.* possibilities to SeaMonkey (bug 679677).]

And that bug has *no* mention of "we can still send future updates even
once the current certificate of our update server expires".

You may think this trivial. However when one the former driver of
SeaMonkey makes a statement like this I do not consider it to be
"overdramatic" at all.

> 
> Our current certificate will expire soon.
> We have a new certificate that we would have already switched to if not 
> for this issue.
> 
> The two (old and new) certificates have a different CA Root.
> SeaMonkey currently only accepts the *old* CA Root (and thus the new 
> certificate would never give current "SeaMonkey 2.1+" an update offer).
> We are unable to renew the old certificate with the same CA Root, as 
> they no longer issue new certs with that root.
> 
> The change is simply *adding* our new root (and another backup root) to 
> our "acceptable certificate" list for our updates, we are *not* simply 
> serving updates without a certificate.

Sounds like a planning issue:
https://bugzilla.mozilla.org/show_bug.cgi?id=679677
[Add more app.update.certs.* possibilities to SeaMonkey]
<quote>
Robert Kaiser (:[email protected]) 2011-08-17 05:55:07 PDT

SeaMonkey currently only has one CA possibility for update:
http://mxr.mozilla.org/comm-central/source/suite/browser/browser-prefs.js?mark=516-517#504

Firefox has two:
http://mxr.mozilla.org/comm-central/source/mozilla/browser/app/profile/firefox.js?mark=136-137,139-140#124

We should add one or two in addition, so we have more freedom of where
to get our certs from. Restricting them is good for security, but only
one choice is bad again, giving us no possibilities to switch if one CA
has a problem.

fox2mike: Which CA(s) would Mozilla prefer us to add there?


(Note that it will take quite some time until we have a so high audience
on new versions that we could abandon the current one, but the sooner we
introduce other pref values, the sooner we'll be actually able to have a
choice.)
</quote>

What happened to the tow the Firefox line? You guys don't have your own
certs?

    1.12 +pref("app.update.certs.2.issuerName", "CN=GeoTrust SSL
CA,O=\"GeoTrust, Inc.\",C=US");

http://support.mozilla.com/en-US/questions/750116

    1.13 +pref("app.update.certs.2.commonName",
"aus2-community.mozilla.org");
    1.14 +pref("app.update.certs.3.issuerName", "CN=Thawte SSL
CA,O=\"Thawte, Inc.\",C=US");

<http://mike.kaply.com/2011/07/12/firefox-4-doesnt-recognize-new-thawte-code-signing-cert/>

<quote>
Tony Mechelynck July 13, 2011 at 11:56 am #

Per the Thawte instructions, I use on IE on Windows to manage my certs.
Does this means that anyone running on a Mac or on Linux is left out in
the cold?

Right... Does mozilla.org not have a valid cert? You guya are now adding
GeoTrust & Thawte certs so that you can do SeaMonkey updates?

_______________________________________________
support-seamonkey mailing list
[email protected]
https://lists.mozilla.org/listinfo/support-seamonkey

Reply via email to