From: Vincent Bernat <bernat@luffy.cx>
To: ding@gnus.org
Subject: Re: Builtin GnuTLS support and certificate verification
Date: Sun, 08 Dec 2013 09:39:23 +0100 [thread overview]
Message-ID: <87y53v7n44.fsf@guybrush.luffy.cx> (raw)
In-Reply-To: <87vbz0vun4.fsf@flea.lifelogs.com> (Ted Zlatanov's message of "Sat, 07 Dec 2013 23:22:55 -0500")
❦ 8 décembre 2013 05:22 CET, Ted Zlatanov <tzz@lifelogs.com> :
>>> Verification options could be:
>>>
>>> - `expired-certificate`
>>> - `revoked-certificate`
>>> - `untrusted-certificate`
>>> - `hostname-mismatch`
>
> I'm not sure this granularity is necessary. I just have :trustfiles and
> :hostname as options right now. Anyone else with an opinion?
I thought you wanted something granular, hence the proposition. I don't
know of any other software proposing granular verification. So, no
problem with dropping this.
> My concern is that suddenly connections will start failing for our users
> and bug reports will flow, and I don't have time to explain to everyone
> why their self-signed certificates need exceptions. This can be really,
> really annoying. But logging in *Messages* is not very useful either,
> users don't read it. So what's the right thing? How about a default
> behavior of flashing a warning, then sit-for 3 seconds? A hard error
> can be optional but not the default.
For a first release, just default to the previous behaviour. However,
some day, it would be nice to be "secure by default".
> I'm also not sure I like the look and feel of the `gnutls-verify-error'
> defcustom. It's kind of awkward.
I am don't know defcustom enough to know if this would give something
like this:
'((".*\\.internal" :hostname)
(".*" :trustfiles :hostname))
If yes, this seems fine for me. Just add the possible values for tags in
the document string.
> I'd like to get this done before the Emacs code freeze next week or so.
> Please give me your opinions and test the code.
I'll try to test later this day.
--
panic("aha1740.c"); /* Goodbye */
2.2.16 /usr/src/linux/drivers/scsi/aha1740.c
next prev parent reply other threads:[~2013-12-08 8:39 UTC|newest]
Thread overview: 21+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-11-02 11:22 Vincent Bernat
2013-11-02 11:27 ` Julien Danjou
2013-11-02 17:40 ` Vincent Bernat
2013-11-02 21:09 ` Vincent Bernat
2013-11-03 11:53 ` Ted Zlatanov
2013-11-04 19:54 ` Vincent Bernat
2013-11-04 21:10 ` Ted Zlatanov
2013-11-04 22:38 ` Vincent Bernat
2013-11-11 15:45 ` Ted Zlatanov
2013-11-16 11:18 ` Vincent Bernat
2013-11-16 13:11 ` Julien Danjou
2013-12-08 4:22 ` Ted Zlatanov
2013-12-08 8:39 ` Vincent Bernat [this message]
2013-12-08 16:08 ` Ted Zlatanov
2013-12-14 18:06 ` Ted Zlatanov
2013-12-16 1:39 ` Katsumi Yamaoka
2013-12-16 6:31 ` Herbert J. Skuhra
2013-12-16 13:51 ` Tassilo Horn
2013-12-16 15:25 ` Ted Zlatanov
2013-12-16 15:24 ` Ted Zlatanov
2013-12-16 15:27 ` Ted Zlatanov
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=87y53v7n44.fsf@guybrush.luffy.cx \
--to=bernat@luffy.cx \
--cc=ding@gnus.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).