-
Notifications
You must be signed in to change notification settings - Fork 971
SHA1 signed certificates accepted with no warning #1164
Comments
I think we should display sha1 certs as non-secure. Right now there is no way to get cert info unless there's a certificate error but that is a todo for 1.0. |
Would you need an extra prop to check in in Or would you set a certificate error (which I think happens via an electron |
We would modify our fork of electron to send the cert info via IPC when the tls connection is established. |
Adding @bridiver for this. |
cert information could be made available in the |
it would be useful if electron could send the parsed x509 cert info in addition to the raw cert, so the browser doesn't have to re-parse it in JS. the only fields i can think of that the front-end needs to know about (for now) are whether there's a SHA1 signature in the chain and whether the end cert is Extended Validation. though if the user wants to inspect the cert, it's handy to show them both the raw cert and the parsed fields. |
it is available from AtomSecurityStateModelClient and we could fire an event when it changes with SecurityStyleChanged |
Setting 1.0 milestone based on the comment by @diracdeltas above. |
As of 0.12.9, Brave will show the insecure UX for sha1 certs that expire after 2017. Hooray! Test Plan:
|
Web sites using the SHA-1 Signature hash algorithm are displayed in the browser without even a warning. (Brave 0.8.2). I believe Brave should block connections to such sites as Firefox already does, and Chrome, IE and Edge by Jan 01 2017.
The text was updated successfully, but these errors were encountered: