[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20120224100153.GB16320@suse.de>
Date: Fri, 24 Feb 2012 11:01:53 +0100
From: Marcus Meissner <meissner@...e.de>
To: David C Frier <david.frier+isc2@...il.com>
Cc: FunSec List <funsec@...uxbox.org>,
Full Disclosure <full-disclosure@...ts.grok.org.uk>
Subject: Re: [funsec] Trustwave and Mozilla (Resolved)
On Thu, Feb 23, 2012 at 07:11:53AM -0500, David C Frier wrote:
> On Wed, Feb 22, 2012 at 19:12, Jeffrey Walton <noloader@...il.com> wrote:
> > It appears to be official.
> >
> > Trustwave issued MitM certificates, which is deceptive, unethical, and
> > contrary to its agreement for inclusion.
> >
> > Mozilla just rewarded their violations of trust by continuing their
> > inclusion. Apparently, agreements between Mozilla and CAs have no
> > veracity as both are more than happy to violate the end user.
>
> This is not the simplistic issue with clear moral blacks and whites
> that you seem to think it is.
>
> Companies need MitM certs to fully implement DLP and protect
> proprietary data - HR info, trade secrets, unpublished financials.
> Without them, SSL-protected external sites are potentially
> back-channels for the leakage of anything someone decides to leak.
> Workers don't understand what the lines are between work-related and
> personal network usage. Companies would be suicidal to just give up
> on this.
>
> So, what would you propose as an alternative?
That they install their machines with their own CA added to the CA store
and use this internal CA for MitM cert signing.
Ciao, Marcus
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists