Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 6 Apr 2011 01:45:37 -0400
From:      jhell <jhell@DataIX.net>
To:        Dan Lukes <dan@obluda.cz>
Cc:        freebsd-security <freebsd-security@freebsd.org>
Subject:   Re: SSL is broken on FreeBSD
Message-ID:  <20110406054537.GA2332@DataIX.net>
In-Reply-To: <4D9BBB6A.9020200@obluda.cz>
References:  <AANLkTin_zZgHRg7QtEwH2V8WOd=nvBcKdYvJkshGCt-R@mail.gmail.com> <BANLkTi=zOG0_tWbkAOex4ojXHdC8f-1v1w@mail.gmail.com> <1302042612.3271.100.camel@linux116.ctc.com> <4D9BACF6.4060205@obluda.cz> <651452BB-74F3-4039-8E77-E332CC35A713@mac.com> <4D9BBB6A.9020200@obluda.cz>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
On Wed, Apr 06, 2011 at 03:01:30AM +0200, Dan Lukes wrote:
> On 6.4.2011 2:15, Chuck Swiger:
> >>2. Such link will affect all users of system. Decision "what CA is trustful" should remain personal decision, not the system administrator decision, by default
> >There are differences between your personal machine, for which you as an individual are welcome to make all of the decisions, and a managed box which is owned by a company which might have a specific PKI infrastructure which is needed for the machine to be usable for it's intended role.
> 
> I has been network administrator in bank. Be sure that "instalation
> of a data pack" is very different task that "change security related
> behavior of program that may/will affect all users".
> 
> In the environment you mentioned, e.g. company taking security
> questions seriously, the skilled administrator (and/or security
> officer) will evaluate the situation and will create the link that
> affect all users, if apropriate.
> 
> It will not be interested in blind "automagic" change.
> 
> As I said before. Instalation of CA bundle SHOULD NOT affect all
> users automatically. The "pkg_add" don't know who install such pack
> nor why such pack is installed for so it can't decide the answer.
> 

This is a lost cause, Just to add another .02 bringing the total to
somewhere in the 100's.

If you truss the command above before and after creating so said links
in /usr/local/etc/ssl and in /etc/ssl youll see that there is no default
CAfile or CApath searched for.

s_client(1)
   The s_client command implements a generic SSL/TLS client which
   connects to a remote host using SSL/TLS. It is a very useful
   diagnostic tool for SSL servers
[...]
Maybe there should be an emphasis on ``diagnostic''


Security is not something that should compromised by a default
configuration but something that should be taught by example for the
end-user if they so require it. So with that in mind it might not be
such a bad idea to add a "SSL The FreeBSD way." chapter to the handbook
that would assist in a security researchers final decision to implement
the correct changes they are looking for.


Food for thought.

-- 

  Regards,

  J. Hellenthal
  JJH48-ARIN
  0x89D8547E


[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.17 (FreeBSD)
Comment: http://bit.ly/0x89D8547E

iQEcBAEBAgAGBQJNm/4BAAoJEJBXh4mJ2FR+DCgH/1p3y3kXZYjEhaQqMIOZuQ/k
Kgx4xk9lmAxOPOYjagSo//tW+QGG1AIwy0e5rRheuT9vKXTlqAXaX1fBnG3YvjgP
rsqNIvIHjPOmKz2+oTZIOCJ4tGa8Wf/L4Gpyr5PIyObrhfkxxEF1yBNboZmxYbGu
xKrm9SzW3RQJY7tKDLTW3hCudSdJ7huyx17SA4DyxUmCeUIJ0jiBLXuFPsa4F4Y6
mRN00GL2jqspOHnEBXZ2gRT6rlBtR+x6DsfMXg5iW91alxtGMX3xD6feTvaCILKH
zlZradZa5QxdYolmnUEzRvDOjFyVKHUTawBBp0OGzuhxjlfiAkTLAT9dsX/7SS4=
=zKhM
-----END PGP SIGNATURE-----

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20110406054537.GA2332>