elkoraco":15aiywk4 said:BUT WHY NO IIS!!!
doornail":g2e6cjyq said:I wish there was a happy medium with self-signed certificates. It seems contrary to the open web that you have to ask the permission of third parties in order to offer your visitors encryption without having their browsers throw a conniption fit.
doornail":3ofth6f9 said:I wish there was a happy medium with self-signed certificates. It seems contrary to the open web that you have to ask the permission of third parties in order to offer your visitors encryption without having their browsers throw a conniption fit.
pancakesandbeyond":2of55b4u said:doornail":2of55b4u said:I wish there was a happy medium with self-signed certificates. It seems contrary to the open web that you have to ask the permission of third parties in order to offer your visitors encryption without having their browsers throw a conniption fit.
visitor: are you doornail?
pancakes: yes I am doornail.
visitor: okay! where do i sign?
I think we should get 1 more opinion....![]()
pancakesandbeyond":2o9zdks2 said:doornail":2o9zdks2 said:I wish there was a happy medium with self-signed certificates. It seems contrary to the open web that you have to ask the permission of third parties in order to offer your visitors encryption without having their browsers throw a conniption fit.
visitor: are you doornail?
pancakes: yes I am doornail.
visitor: okay! where do i sign?
I think we should get 1 more opinion....![]()
owdi":3k5cbs3e said:The point doornail made was "are you doornail?" is the wrong question. There are other ways to verify identity than with a certificate.
portent":2fa78njd said:The thing is, we currently have three basic modes:
(1) No SSL
- DOES NOT PROVIDE encryption
- DOES NOT PROVIDE authentication
Result: browser connects and acts normally, no warnings, no lock icon
(2) SSL with valid certificate
- Provides encryption
- Provides authentication
Result: browser connects and acts normally, no warnings, shows lock icon
(3) SSL with self signed certificate
- Provides Encryption
- DOES NOT PROVIDE authentication
Result: browser raises holy hell, big red warning dialogs, Danger, Will Robinson! FRAUD! HACKING! SCAMS! SPYING! RUN! HIDE!
I'll accept that Case 3 is no more secure than Case 1, but I reject the notion that it is any less secure than Case 1. Yet the browser treats one as no big deal and the other as the end of the world.
portent":3j2a7vod said:I'll accept that Case 3 is no more secure than Case 1, but I reject the notion that it is any less secure than Case 1. Yet the browser treats one as no big deal and the other as the end of the world.
pancakesandbeyond":1m1z13dy said:doornail":1m1z13dy said:I wish there was a happy medium with self-signed certificates. It seems contrary to the open web that you have to ask the permission of third parties in order to offer your visitors encryption without having their browsers throw a conniption fit.
visitor: are you doornail?
pancakes: yes I am doornail.
visitor: okay! where do i sign?
I think we should get 1 more opinion....![]()
doornail":1ju98mol said:As Owdi mentioned, we're collapsing two separate problem domains. We have encryption based on open standards. Your browser supports it, my server supports it. The quality of this encryption does not suffer because I generated the certificate myself. Heck, I could argue it's higher because only *I* have a copy of it and it's never transmitted by whatever medium.
Authentication definitely has value -- but, IMHO, I think it makes an in-elegant conjoined twin.
dlp":28us1v3v said:I know they aren't the only one, but given StartSSL had issues last year (http://www.theregister.co.uk/2011/06/21/startssl_security_breach/), is it a good idea to suggest them when talking about security?
The hackers behind the attack on StartCom failed to obtain any certificates that would allow them to spoof websites in a similar fashion, and they were also unsuccessful in generating an intermediate certificate that would allow them to act as their own certificate authority, Nigg said in an email. The private encryption key at the heart of the company's operations isn't stored on a computer that's attached to the internet, so they didn't get their hands on that sensitive document, either, he said.
doornail":3dalrxb4 said:I wish there was a happy medium with self-signed certificates. It seems contrary to the open web that you have to ask the permission of third parties in order to offer your visitors encryption without having their browsers throw a conniption fit.
StillNotATroll":3e8v7wd6 said:Why use Linux? You could do this much more sanely and securely with FreeBSD
I get that. I'm not saying that an encrypted, unauthenticated connection should be presented as being equivalent to an encrypted, authenticated one. It should not display the "lock" icon or the "green bar" or any of the other reassuring hints that browsers give users that a site is secure.pancakesandbeyond":3e2vh1k0 said:portent":3e2vh1k0 said:The thing is, we currently have three basic modes:
(1) No SSL
- DOES NOT PROVIDE encryption
- DOES NOT PROVIDE authentication
Result: browser connects and acts normally, no warnings, no lock icon
(2) SSL with valid certificate
- Provides encryption
- Provides authentication
Result: browser connects and acts normally, no warnings, shows lock icon
(3) SSL with self signed certificate
- Provides Encryption
- DOES NOT PROVIDE authentication
Result: browser raises holy hell, big red warning dialogs, Danger, Will Robinson! FRAUD! HACKING! SCAMS! SPYING! RUN! HIDE!
I'll accept that Case 3 is no more secure than Case 1, but I reject the notion that it is any less secure than Case 1. Yet the browser treats one as no big deal and the other as the end of the world.
From the browser's point of view. If the site requires encryption, then the information being transmitted is probably important and sensitive. If that's the case then the identity of the site should be verified. The user may get lulled into a false sense of security thinking that just because their traffic is encrypted that the site is who it says it is.
That turns into a sticky issue, though. The ultimate purpose of encryption isn't to hash your data, but rather to ensure that it's not going to be read by anyone other than the intended recipient. Encryption without end-to-end authentication means that you're sending your scrambled bits to...someone. The connection may or may not have an eavesdropper; there might or might not be a man-in-the-middle.portent":247q8402 said:I just think that it should not be treated as somehow more dangerous than an unencrypted, unauthenticated one. It's certainly not secure, but it's not any more dangerous than a "normal" non-SSL connection.
Or, if you only need a few (known) subdomains, you can get a UCC certificate, which covers up to 5 hosts, and are a little cheaper than wildcards.Well, the "correct" way to do is is to pay for the identity validation, and then get a wildcard certificate. That's actually what I did--I have one for *.bigdinosaur.org which covers all my hosts there, and one for *.chroniclesofgeorge.com for the hosts there.
A wildcard cert is actually crazy-useful--in addition to web sites, I'm also using my *.bigdinosaur.org cert for my firewall's web interface (so it doesn't throw SSL errors when I access it) and also for my domain's Openfire instant messaging server. Once you get a wildcard certificate, it starts being useful in all sorts of places.
That, though, is the entire purpose of a Certificate Authority. They must verify you are who you say you are. Their validation of you in turn enables everyone else to trust the certificates they issue. A CA vouches for the identify of the people behind the certificates, and a CA is only a trustworthy CA when they actually do those things.Smeghead":3nejutx9 said:The problem I have with ID validation for wildcard certs is that it's personal validation that requires exchanging a lot of private information. I can see why they want to do it, but sending photocopies of my passport and driver's licence to some company doesn't exactly fill me with warm and fuzzies.
And yet the browser displays no warning whatever if I connect to an unencrypted plain-HTTPsite, which does neither scrambling nor authentication.Pokrface":3s4iah2y said:That turns into a sticky issue, though. The ultimate purpose of encryption isn't to hash your data, but rather to ensure that it's not going to be read by anyone other than the intended recipient. Encryption without end-to-end authentication means that you're sending your scrambled bits to...someone. The connection may or may not have an eavesdropper; there might or might not be a man-in-the-middle.portent":3s4iah2y said:I just think that it should not be treated as somehow more dangerous than an unencrypted, unauthenticated one. It's certainly not secure, but it's not any more dangerous than a "normal" non-SSL connection.
Ensuring you know who you're talking to is just as important as the actual scrambling of the data, and some kind of warning really is necessary.
I disagree with you (and cite every phishing site in my spambox as my evidence) but thank you for at least challenging my position without assuming I don't understand what CAs do.brodie":lhrspw40 said:Even my 86 year-old grandma knows how to look for the little lock in the corner.
So yes, there is a certain expectation of privacy if a connection is encrypted. If the connection is not verified, that expectation is not necessarily true, so it bears calling attention to it.
With HTTP, there is no expectation of privacy (or there shouldn't be), so there's no reason to call attention to it.
It's because encryption carries with it the promise of security. It's sort of the difference between saying, "Don't take your pants off and walk in front of that window, everyone will see you naked!" versus, "Oh, yeah, you can totally take your pants off in front of that window because it's painted over." You're free to take your pants off and walk in front of the window either way, but the expectation is there in the second case that no one will see you doing it, and you'd be more likely to go for it. With CA-validated cert, you've at least got the word of a certified window painter that the window is painted over, whereas a self-signed cert could be signed by, well, anyone.portent":39z2v7ud said:I am not trying to say that Self Signed is equivalent to CA Signed. I'll even readily accept the proposition that Self-signed is effectively no better than unencrypted.
My only beef is with the idea that self-signed is somehow more dangerous than unencrypted. Yet this is the stance that browser UIs take.
How does a phishing site's attempts have any bearing on people's awareness of SSL?portent":ucr4vlbj said:I disagree with you (and cite every phishing site in my spambox as my evidence) but thank you for at least challenging my position without assuming I don't understand what CAs do.brodie":ucr4vlbj said:Even my 86 year-old grandma knows how to look for the little lock in the corner.
So yes, there is a certain expectation of privacy if a connection is encrypted. If the connection is not verified, that expectation is not necessarily true, so it bears calling attention to it.
With HTTP, there is no expectation of privacy (or there shouldn't be), so there's no reason to call attention to it.