Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 5 Apr 2011 06:57:05 +1000
From:      Peter Jeremy <peterjeremy@acm.org>
To:        Miguel Lopes Santos Ramos <mbox@miguel.ramos.name>
Cc:        freebsd-security@freebsd.org
Subject:   Re: SSL is broken on FreeBSD
Message-ID:  <20110404205705.GA52172@server.vk2pj.dyndns.org>
In-Reply-To: <1301729856.5812.12.camel@w500.local>
References:  <AANLkTin_zZgHRg7QtEwH2V8WOd=nvBcKdYvJkshGCt-R@mail.gmail.com> <1301729856.5812.12.camel@w500.local>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
On 2011-Apr-02 08:37:36 +0100, Miguel Lopes Santos Ramos <mbox@miguel.ramos.name> wrote:
>The only root CAs that could be included by default would be those of
>governments (but which governments do you trust?) and things like
>CAcert.org.

Actually, there was a certificate port that included CAcert.org but
the port was dropped for various reasons.  And Mozilla doesn't
currently trust CAcert.org so why should FreeBSD?  (Note that Mozilla
has defined an audit process to verify CAs and CAcert.org is slowly
working towards compliance).

It has occurred to me that maybe the FreeBSD SO should create a root
cert and distribute that with FreeBSD.  That certificate would at
least have the same trust level as FreeBSD.

-- 
Peter Jeremy

[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.17 (FreeBSD)

iEYEARECAAYFAk2aMKEACgkQ/opHv/APuIfRFgCglW0Sh1pCJV+N7oC/oTREIWKY
WgAAn1XM+OGNSG50uB3CWqKfxYHIAAri
=2R1w
-----END PGP SIGNATURE-----

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20110404205705.GA52172>