Skip to content
GitLab
  • Menu
Projects Groups Snippets
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
  • Trac Trac
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Issues 246
    • Issues 246
    • List
    • Boards
    • Service Desk
    • Milestones
  • Monitor
    • Monitor
    • Metrics
    • Incidents
  • Analytics
    • Analytics
    • Value stream
  • Wiki
    • Wiki
  • Activity
  • Create a new issue
  • Issue Boards
Collapse sidebar
  • Legacy
  • TracTrac
  • Issues
  • #13607
Closed
Open
Created Oct 30, 2014 by sajolida@sajolida

TorBirdy should have an option to distrust all certificate authorities

The certificate authorities (CA) mechanism for validating TLS has proven to be rotten to the core in several occasions. While browsing the web, not relying on it is quite hard as you might be presented a different certificate on each webpage that you are visiting. But in the case of email, you basically always use the same and only one: the certificate from your email provider. So trusting all those CAs by default and allowing so many possible man-in-the-middle attacks is not really needed for usability.

TorBirdy could have an option to distrust all CA authorities by default and only rely on custom certificates (exceptions).

Users could, in the worse case, do TOFU authentication (trust on first use) and be guided on how to do so. At best their provider can give them better ways of authenticating their certificates. Riseup is proposing this on their website for example: https://help.riseup.net/en/certificates.

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Time tracking