New ZeroConf Spec

Silvan Gebhardt pcdog at pcdog.ch
Fri Jul 28 19:13:26 BST 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

the problem for everybody bypassing that ist the huge amount of self
certified certificates, so there are always warnings and then the
ignores the whole message, and doesnt care what it's about. but i never
had the problem like this with zeroconf. you shall use that always in
secured environments!

Dan Kegel schrieb:
> On 7/28/06, Chris Jones <cmsj at tenshu.net> wrote:
>> On 1:17:05 pm 28/07/2006 Jan Claeys <lists at janc.be> wrote:
>> > Now please explain to "normal" users how they can check that they are
>> > safe and why they should do that...   ;-)
>>
>> well ssh will refuse to log you in and tell you that the host key has
>> changed. https (or rather, your browser) will tell you the certificate is
>> invalid.
> 
> And both apps give you a way to bypass the warning,
> and guess what?  *everybody does*.
> 

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFEylOOC82WwYR1u2oRAurfAKCl75uafvjFGrRNvAJnAtLkoJ++hACeNoCQ
rpjk/xE80zfMklJWUyfq8yM=
=E0c0
-----END PGP SIGNATURE-----



More information about the ubuntu-devel mailing list