Re: [TLS] Eleven out of every ten SSL certs aren't valid

=JeffH <Jeff.Hodges@KingsMountain.com> Thu, 01 July 2010 02:11 UTC

Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: tls@core3.amsl.com
Delivered-To: tls@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BEC773A687D for <tls@core3.amsl.com>; Wed, 30 Jun 2010 19:11:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.23
X-Spam-Level:
X-Spam-Status: No, score=0.23 tagged_above=-999 required=5 tests=[AWL=-0.105, BAYES_50=0.001, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7q60VpdkSUo0 for <tls@core3.amsl.com>; Wed, 30 Jun 2010 19:11:33 -0700 (PDT)
Received: from cpoproxy2-pub.bluehost.com (cpoproxy2-pub.bluehost.com [67.222.39.38]) by core3.amsl.com (Postfix) with SMTP id D47A33A6821 for <tls@ietf.org>; Wed, 30 Jun 2010 19:11:32 -0700 (PDT)
Received: (qmail 11212 invoked by uid 0); 1 Jul 2010 02:11:44 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by cpoproxy2.bluehost.com with SMTP; 1 Jul 2010 02:11:44 -0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=kingsmountain.com; h=Received:Message-ID:Date:From:User-Agent:MIME-Version:To:Subject:Content-Type:Content-Transfer-Encoding:X-Identified-User; b=aKdODvABm2v6I+SrABPeV+70AfKKeP4IYIHYe3ZBHZiAp1Qj4pO9guOS/Y4i5HlJ5mrwam76TJKU0r0yaVE6nqZSLDA6hXy1FnTmXQO5DjUChFK0GaDMWp99ZW9mvVUS;
Received: from c-24-4-122-173.hsd1.ca.comcast.net ([24.4.122.173] helo=[192.168.11.10]) by box514.bluehost.com with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.69) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1OU9Ff-000366-PF; Wed, 30 Jun 2010 20:11:44 -0600
Message-ID: <4C2BF95E.6010301@KingsMountain.com>
Date: Wed, 30 Jun 2010 19:11:42 -0700
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Thunderbird 2.0.0.24 (X11/20100411)
MIME-Version: 1.0
To: Peter Gutmann <pgut001@cs.auckland.ac.nz>, tls@ietf.org
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 24.4.122.173 authed with jeff.hodges+kingsmountain.com}
Subject: Re: [TLS] Eleven out of every ten SSL certs aren't valid
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Jul 2010 02:11:34 -0000

Hi Peter,

 > the figure is very meaningful
 > because it supports the analysis of the effects of externalities on web site
 > security done by some guys at Microsoft Research a few months ago which
 > pointed out that since certificate warnings are close to one hundred percent
 > false positives (they were aware of no known cases in which someone had been
 > saved from being phished by a cert warning), the effect of a true positive is
 > rendered void.


Might you please post a link to the particular paper you're citing here (or 
authors & title at least)?

thanks,

=JeffH