[182480] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: SEC webpages inaccessible due to Firefox blocking servers with

daemon@ATHENA.MIT.EDU (Michael O Holstein)
Fri Jul 17 15:14:21 2015

X-Original-To: nanog@nanog.org
From: Michael O Holstein <michael.holstein@csuohio.edu>
To: Geoffrey Keating <geoffk@geoffk.org>, Robert Drake <rdrake@direcpath.com>
Date: Fri, 17 Jul 2015 19:14:17 +0000
In-Reply-To: <m2twt2a9u0.fsf@localhost.localdomain>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

>making 99% of the web secure is better than keeping an old 1% working

A fine idea, unless for $reason your application is among the 1% .. nevermi=
nd the arrogance of the "I'm sorry Dave" sort of attitude.

As an example .. we have a vendor who, in the current release (last 3 month=
s) still requires "weak" ciphers in authentication responses. That was most=
ly okay until another vendor (with more sense) wanted to auth the same way =
but only permitted strong ciphers.=20

My $0.02

Michael Holstein
Cleveland State University=

home help back first fref pref prev next nref lref last post