Could we dispense with the ego-clanking, please?  Really?  Keep in mind that 
EVERYONE has the same problem regardless of your IQ level: for everything you 
know there are three to five things you do not know and at least one that you 
do not know you do not know.  Accept that fact and life gets somewhat clearer.  
If I had known that this was the normal board-of-faire I would not have 
subscribed to this.

Jeff Fisher
Omaha, NE

-----Original Message-----
From: Christopher Schultz [mailto:ch...@christopherschultz.net] 
Sent: Tuesday, March 19, 2013 9:52 AM
To: Tomcat Users List
Subject: Re: SSL Best Practices

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Martin,

On 3/19/13 7:34 AM, Martin Gainty wrote:
> 1)Have you ever tried to coerce IE to accept a self-signed cert

This is a trust issue, not a security issue. They are related, but not 
equivalent.

> 2)if you purchase a pfx with a self-signed certificate sold to you by 
> chris_is_a_hacker.com for 1.00 then who do you think can break it

I'm not sure what a PFX is, but the certificate itself is as strong as the key 
used to create it. If you generate a 1-bit key, you'll be hacked in 0 minutes. 
But nobody does that: we all create 4096-bit keys which, theoretically, can't 
be broken even by a well-funded adversary with unreasonably-limited computing 
power before the sun gets tired of shining.

> The cert allows browser to contact the sites SSL connector..by 
> presenting credentials usually from a Name Server such as ADS or LDAP

Woah, your algorithm has started to bring-in random bits of search results from 
the Internet. Time to re-set your learning tree and start again.

> the real work involves breaking the algorithm implemented by the key

Yup. Good luck with RSA and friends.

> in order  to establish Key exchange on a SSLv2 transport

Anyone using SSLv2 is vulnerable, which is why it's no longer used.
For a long time, now.

> I sincerely doubt even chris_is_a-hacker can break any of the RSA 
> algorithms implemented by the key inside a versign.pfx

While true, it's also true of your own self-signature. Verisign uses a 2048-bit 
key to sign everything. Most sites these days use 4096-bit keys (at least those 
I configure, apache.org, etc.). (Oddly enough, Facebook uses a 1024-bit key.) 
If you create a server cert with a 4096-bit key, you are creating a fairly 
secure certificate no matter who signs it. And, if you sign it yourself and 
keep the key secure (which is kind of impossible unless you are using a 
different key for signing than you do for the server's key) then you are doing 
better than any CA out there.

Again, the CA is only there to provide a trusted 3rd-party: they have nothing 
to do with the security of the connection, the hackability of the server, etc.

- -chris
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEAREIAAYFAlFIe4cACgkQ9CaO5/Lv0PBlOQCbBMGVp6wcP9aBJUunxWXNzmNz
YRAAnjrY4vSZSX8KlE7mER287II6l6w9
=ADG9
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to