[159267] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Gmail and SSL

daemon@ATHENA.MIT.EDU (William Herrin)
Wed Jan 2 20:52:21 2013

In-Reply-To: <CAL9jLaZmqdS6obcmRAzSXCO23br0hsu7MYZ6NFH6e9Rkywddfw@mail.gmail.com>
From: William Herrin <bill@herrin.us>
Date: Wed, 2 Jan 2013 20:51:51 -0500
To: Christopher Morrow <christopher.morrow@gmail.com>
Cc: John Levine <johnl@iecc.com>, nanog list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Wed, Jan 2, 2013 at 8:39 PM, Christopher Morrow
<christopher.morrow@gmail.com> wrote:
> On Wed, Jan 2, 2013 at 8:03 PM, Christopher Morrow
> <christopher.morrow@gmail.com> wrote:
>> On Jan 2, 2013 7:36 PM, "William Herrin" <bill@herrin.us> wrote:
>>> A "reputable" SSL signer would have to get outed just once issuing a
>>> government a resigning cert and they'd be kicked out of all the
>>> browsers. They'd be awfully easy to catch.
>>
>> Oh! You mean like cyber trust and etilisat? Right... That's working just
>> perfectly...
>
> should have included this reference link:
> <https://www.eff.org/deeplinks/2010/08/open-letter-verizon>

Hi Christopher,

That was nearly 30 months ago. At the time there were no reports of
fake Etilisat certs, merely concern that the UAE's regulatory
environment was "institutionally hostile to the existence and use of
secure cryptosystems." Has the EFF's SSL Observatory project detected
even one case of a fake certificate under Etilisat's trust chain since
then?

There's a reason Etilisat's cert is still valid and it isn't Honest Achmed's.

https://bugzilla.mozilla.org/show_bug.cgi?id=647959


Regards,
Bill Herrin

-- 
William D. Herrin ................ herrin@dirtside.com  bill@herrin.us
3005 Crane Dr. ...................... Web: <http://bill.herrin.us/>
Falls Church, VA 22042-3004


home help back first fref pref prev next nref lref last post