LoRd_MuldeR wrote:Please get rid of the idea that an IP address gives you any guarantees of any kind
Please re-read what I wrote: "If I have two computers sitting in a lab, not connected to the Internet, and I'm sending from one to the other - I know for a certainly what the receiving machine is and what the sender is." Tell me how, in that case, having a signed certificate offers any benefit to me - or that the IP addresses, in that case, don't tell me something about the sender and the receiver? And, before you say that that has nothing to do with reality, I'm trying to get you away from 100% absolutes where "always" and "never" are thrown around and there isn't room for discussion of all possibilities.
LoRd_MuldeR wrote:Conclusion: An IP address is 100% useless for authentication!
That's too extreme of a statement - because you aren't qualifying yourself. In some contexts, it's quite correct; in others, it's wrong. I would say that an IP address is 70% useful for authentication. (With the remaining bits negated by security holes and infrastructure.) That's just where I rate it without really analysing everything. I'm sure that number will vary based on the subjective position of each person. You're trying to set up an hermetic environment where if there is any chance of a security breach then it should be considered useless and unusable. That's a self-defeating position because no such condition exists, nor do I believe it will ever exist. For any lock made, there will always be somebody who comes up with a way to get around it.
Instead, you have to assign variables of risk to everything you do, calculate your current situation, then ask yourself if things are secure enough for you or not.
LoRd_MuldeR wrote:It's worse in the sense that it pretends a "security" to the user that doesn't exist!
You're beating a dead horse here. LOL I've already acknowledged this point. Shouting about it again isn't going strengthen your argument in any way. As I've already responded, if the sender is aware of the insecurity of the receiver, then they still have to do (or not do) something from there.
LoRd_MuldeR wrote:You are not forced to do anything.
Okay, maybe not "forced". But some action (or inaction) needs to be taken on your part about the situation.
LoRd_MuldeR wrote:If you understand what an invalid certificate means (that means you are aware that the connection will not be "secure" in fact) then you can add the "invalid" certificate to your Exception list and proceed. SeaMonkey doesn't prevent you from doing that!
Quite. That's exactly what we're saying. Given the fact that we are going to proceed - it's surely better to proceed with an encrypted connection (to prevent additional risks) than a non-encrypted connection. An encrypted connection isn't just about the verifiability of the receiver. It offers additional benefits too.
LoRd_MuldeR wrote:Also encryption takes additional CPU overhead
Well, that's just another factor in your decision to encrypt or not.
LoRd_MuldeR wrote:But it shouldn't be automatic for the reasons explained enough. Also it shouldn't be reachable too easy, because that would encourage the users to take a security risks they don't even understand. People just shouldn't accept invalid certificated, unless they know exactly what that means..."
Oh, I totally agree.
Which makes me wonder why this whole discussion got started in the first place. Rather than trying to argue johndoe32102002 out of using encryption at all, surely it could have just been explained to him that all he needs to do is add an exception? I see that you mentioned it at the end of your original reply to him - but maybe he didn't know how to actually do that, and the heated opposition to doing so de-railed things.
johndoe32102002, here's what you need to do to be able to access a site that SeaMonkey is blocking (I'm not sure how Firefox works, but I expect that it's similar):
1. You'll get a Web page that says you're blocked.
2. Click the "Add Exception..." button. (Depending on the specific build of SeaMonkey nightly that you're running, you may need to first click on the text "I Understand the Risks" in order to get this button to appear.)
3. A new window will pop up. Click on the "Get Certificate" button.
4. You can view the certificate if you wish by clicking the "View" button.
5. If you want to always get access to this specific site, just click the "Confirm Security Exception" button.
6. If you only want to get access to it this one time, first uncheck "Permanently store this exception" and then click on the "Confirm Security Exception" button.
If you find that this doesn't work for you, please report back. (And my apologies for not addressing your question here first.)