[Pidgin] #9971: Invalid Certificate Chain For Self-Signed Certs

Pidgin trac at pidgin.im
Fri Aug 21 03:37:07 EDT 2009


#9971: Invalid Certificate Chain For Self-Signed Certs
---------------------------------------------+------------------------------
 Reporter:  rhpt                             |        Owner:  darkrain42
     Type:  defect                           |       Status:  closed    
Milestone:                                   |    Component:  XMPP      
  Version:  2.6.1                            |   Resolution:  duplicate 
 Keywords:  invalid certificate self signed  |  
---------------------------------------------+------------------------------

Comment(by darkrain42):

 Replying to [comment:9 Dymaxion]:
 > So in cases where the administrative contact for a service is not
 available to refresh the certificate, but a service is still providing a
 useful function, users deserve to be annoyed, despite being completely
 aware of the situation?

 I don't think users should be annoyed at all. But users should also be
 wary of using a service where there is no administrator maintaining the
 service.

 >  This seems like an unnecessarily hostile attitude to take toward your
 user base.  Users, not the developers, deserve to be allowed to make the
 choice of whether or not they wish to continue assigning trust to a
 certificate.

 To be honest, I disagree with this ''to an extent''. X.509 and security in
 general are usability disasters.  If most users are presented with a
 dialog that says "Something might be wrong. <possible details here> Do you
 want to continue? [Yes] [No]", they might first select "No". However, when
 (in the case of Pidgin) that fatally terminates that connection, they'll
 restart it and select "Yes", because they '''do''' want to connect to
 Google Talk or AIM or whatever it is. This is compounded by the number of
 things that can be "wrong" with a certificate.

 My personal opinion is that users should be prompted only for
 subjectAlternativeName/CN/hostName mismatches (and even that is a
 compromise). I acknowledge that this can inconvenience more advanced users
 who have a better understanding of X.509 certificates, but I still
 maintain that the correct solution is for server operators to fix their
 certificates.

 >  Ensuring that they're appropriately informed of the situation is quite
 reasonable, but repeatedly doing so is neither useful nor necessary.
 There is a reason that every major browser and almost every other system
 which uses X.509 allows users to make these trust assignments.

 I don't have any experience with ''expired'' certificates in Firefox, but
 I know for a fact that Thunderbird prompts every single time I open the
 program because it was doing that when my mail server was using an old
 certificate (and before you ask, if Thunderbird fatally refused to connect
 to the mail server, it simply would have caused me to stop procrastinating
 on replacing the certificate). Conversely, Apple's Mail.app ''never''
 warned about the exact same certificate, which is wholly unacceptable.

 >  The ability of users to make these assignments in a hassle free manner,
 once informed, does not materially harm the security of their users.

 >  Rather, by making SSL more inconvenient to use, you're actively
 encouraging users not to use it.

 If that is true, it's an unintended side-effect of attempts to get server
 operators to ''fix'' their certificates.

-- 
Ticket URL: <http://developer.pidgin.im/ticket/9971#comment:11>
Pidgin <http://pidgin.im>
Pidgin


More information about the Tracker mailing list