We have moved to a new Sailfish OS Forum. Please start new discussions there.
1 | initial version | posted 2014-01-06 18:47:21 +0200 |
This is a suggestion for handling self-signed and optionally (via a setting in UI) also other certificate acceptance.
Nowadays web browser, mail applications and mobile platforms in general have too many CA certificates enabled and make it too hard to install or accept self-signed certificates even if these would be more secure to be used than the public well-known CA signed certificates. Some of these issues can be solved with builtin certificate manager (See: https://together.jolla.com/question/11198/certificate-manager/ ), but it is useful to provide user a way to accept server certificates also while using the device.
The suggested process follows the SSH style acceptance of the host key:
This process is not polished (written in one evening when I had time) and there probably exist better and more accurate description of it in the Internet (IETF etc.). There also exists alternative ways to verify certificates for example via IPSEC like DANE (http://www.internetsociety.org/articles/dane-taking-tls-authentication-next-level-using-dnssec), which could be used for the purpose, but as DNSSEC and trust router infrastructure are not there yet, a reasonably good way to handle self-signed certificates would help until better can be used.
Feel free to comment this suggestion, point out possible security flaws in it and improve it.
This is a suggestion for handling self-signed and optionally (via a setting in UI) also other certificate acceptance.
Nowadays web browser, mail applications and mobile platforms in general have too many CA certificates enabled and make it too hard to install or accept self-signed certificates even if these would be more secure to be used than the public well-known CA signed certificates. Some of these issues can be solved with builtin certificate manager (See: https://together.jolla.com/question/11198/certificate-manager/ ), but it is useful to provide user a way to accept server certificates also while using the device.
The suggested process follows the SSH style acceptance of the host key:
This process is not polished (written in one evening when I had time) and there probably exist better and more accurate description of it in the Internet (IETF etc.). There also exists alternative ways to verify certificates for example via IPSEC like DANE (http://www.internetsociety.org/articles/dane-taking-tls-authentication-next-level-using-dnssec), which could be used for the purpose, but as DNSSEC and trust router infrastructure are not there yet, a reasonably good way to handle self-signed certificates would help until better can be used.
Feel free to comment this suggestion, point out possible security flaws in it and improve it.
This is a suggestion for handling self-signed and optionally (via a setting in UI) also other certificate acceptance.
Nowadays web browser, mail applications and mobile platforms in general have too many CA certificates enabled and make it too hard to install or accept self-signed certificates even if these would be more secure to be used than the public well-known CA signed certificates. Some of these issues can be solved with builtin certificate manager (See: https://together.jolla.com/question/11198/certificate-manager/ ), but it is useful to provide user a way to accept server certificates also while using the device.
The suggested process follows the SSH style acceptance of the host key:
This process is not polished (written in one evening when I had time) and there probably exist better and more accurate description of it in the Internet (IETF etc.). There also exists alternative ways to verify certificates for example via IPSEC DNSSEC like DANE (http://www.internetsociety.org/articles/dane-taking-tls-authentication-next-level-using-dnssec), which could be used for the purpose, but as DNSSEC and trust router infrastructure are not there yet, a reasonably good way to handle self-signed certificates would help until better can be used.
Feel free to comment this suggestion, point out possible security flaws in it and improve it.