[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #3555 [Tor bundles/installation]: TBB: hardcode SSL cert check to prevent MITM



#3555: TBB: hardcode SSL cert check to prevent MITM
----------------------------------------+-----------------------------------
 Reporter:  tagnaq                      |          Owner:  mikeperry                    
     Type:  defect                      |         Status:  assigned                     
 Priority:  blocker                     |      Milestone:  TorBrowserBundle 2.2.x-stable
Component:  Tor bundles/installation    |        Version:                               
 Keywords:  MikePerryIteration20110911  |         Parent:                               
   Points:  1                           |   Actualpoints:                               
----------------------------------------+-----------------------------------
Changes (by mikeperry):

 * cc: rransom (added)


Comment:

 I'm reading the code closer, and it appears that onLoad is only "pinning"
 the common name, the issuer string, and the builtin property. This will at
 least pin them to a specific builtin CA (I think), but it can't pin a
 specific cert.

 It also doesn't apply to addon updates: only Firefox updates. Addon
 updates are handled elsewhere.

 Sorry, rransom, but I think we're going to have to wait for proper pinning
 support in Firefox to be able to do this for our addon updates. :(

 Either that, or we begin signing the Torbutton XPI with that horrid McCoy
 tool?

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/3555#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs