On 1 May 2013 18:52, Frank Lanitz frank@frank.uvena.de wrote:
Am 01.05.2013 10:47, schrieb Enrico Tröger:
On 30/04/13 03:06, Lex Trotman wrote:
On 30 April 2013 08:55, Chris Williams purplewelshy@googlemail.com
wrote:
Sorry I am a newbie and when I try to go to:
https://lists.geany.org/cgi-bin/mailman/listinfo/users
I get the following error:
This Connection is Untrusted
You have asked Firefox to connect
securely to lists.geany.org, but we can't confirm that your
connection is
secure. Normally, when you try to connect securely, sites will present trusted identification to prove that you are going to the right place. However, this site's identity can't be
verified.
What Should I Do? If you usually connect to
this site without problems, this error could mean that someone is trying to impersonate the site, and you shouldn't continu
lists.geany.org uses an invalid security certificate.
The certificate is not trusted because no issuer chain was provided.
(Error code: sec_error_unknown_issuer)
If you understand what's going on, you
can tell Firefox to start trusting this site's identification. Even if you trust the site, this error could mean that someone is tampering with your connection. Don't add an exception unless you know there's a good reason why this site doesn't use trusted identification.
Hi Chris,
Unfortunately this is an argument between firefox and the certificate provider such that firefox is unwilling to include the particular certificate provider. Other browsers such as chrome or even IE (I understand, I haven't tried myself) do include the certificate provider.
The best suggestion is to use another browser or install the certificate providers certificate yourself.
Which you can find here: https://www.cacert.org/index.php?id=3
A bit more information: Frank Lanitz created this certificate and it is signed by Cacert. To be able to do this, you first need to authenticate yourself to Cacert, in person including an identity check. Frank, and me also, did this. So, this is not just a self-signed certificate to have 'something' for SSL, but a qite good certificate. Even though Mozilla just doesn't consider it good enough to include the root certificate into their browser and other products :(.
Is it a correct time for a little SSL-Mozilla-Bashing?
I have gone totally to Chrome, is that bashing enough :) </you are not paranoid, on the internet they *are* out to get you>
Cheers Lex
They do not include CAcert with their Web-of-Trust-based method of authentification, but include root-certificates which are known to be very week PKI and there are rumors that some of them are ruled be the agencies. </paranoid>
Cheers, Frank
Users mailing list Users@lists.geany.org https://lists.geany.org/cgi-bin/mailman/listinfo/users