Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Lenovo pre-installs PCs with HTTPS hijacking adware

    Scheduled Pinned Locked Moved Off-Topic & Non-Support Discussion
    39 Posts 11 Posters 5.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      kejianshi
      last edited by

      I can agree with that - It is an issue.

      1 Reply Last reply Reply Quote 0
      • D
        doktornotor Banned
        last edited by

        @mikeisfly:

        But then you have to trust someone other wise you might as well live on a deserted Island.

        I'd rather trust myself than funding the CAs bullshit business.

        1 Reply Last reply Reply Quote 0
        • K
          kejianshi
          last edited by

          Same here

          1 Reply Last reply Reply Quote 0
          • D
            doktornotor Banned
            last edited by

            Superfish replaced with McAfee.

            ;D ;D ;D ;D ;D

            P.S. How To Uninstall McAfee Antivirus - featuring John McAfee himself

            1 Reply Last reply Reply Quote 0
            • K
              kejianshi
              last edited by

              Which is worse…  McAfee or viruses....  Damn its a tough call...

              1 Reply Last reply Reply Quote 0
              • ?
                Guest
                last edited by

                I think this article has a good view of the problem.
                http://www.computerworld.com/article/2894233/web-browsers-are-also-to-blame-for-lenovos-superfish-fiasco.html

                1 Reply Last reply Reply Quote 0
                • D
                  doktornotor Banned
                  last edited by

                  @Phishfry:

                  I think this article has a good view of the problem.
                  http://www.computerworld.com/article/2894233/web-browsers-are-also-to-blame-for-lenovos-superfish-fiasco.html

                  Nah. The browsers need to implement TLSA/DANE. Noone will ponder which CA is supposed to sign which certificate for whom; the server owner should tell the client behind the scenes. The average Joe does not understand the details and does not care.  CAs should provide enhanced validation and that's it. This BS about "oh baaad boy, you are using self-signed certificate/your own CA -> lets nag the shit out of anyone trying to use HTTPS with your website" needs to end.

                  1 Reply Last reply Reply Quote 0
                  • K
                    kejianshi
                    last edited by

                    Its designed to bilk people for as much money as possible…

                    1 Reply Last reply Reply Quote 0
                    • ?
                      Guest
                      last edited by

                      He makes good points about how differently certs look across the different browser landscapes, I thought. He didn't have to use the Nerd word so many times.

                      edit:fixed typo

                      1 Reply Last reply Reply Quote 0
                      • D
                        doktornotor Banned
                        last edited by

                        The BFU's understanding: Green lock == good. Anything else == bad. Cannot see this ever changing. (Frankly, when calling to some banks' helplines, I often have hard time getting someone on phone who knows what certificate fingerprint is. :()

                        1 Reply Last reply Reply Quote 0
                        • K
                          kejianshi
                          last edited by

                          The military and government here also uses self signed certs…  Its actually the way to go.

                          1 Reply Last reply Reply Quote 0
                          • ?
                            Guest
                            last edited by

                            I  never realized why my browser complained on first hookup to fresh pfsenses install. Then i learned about the CA tab. But only recently because i followed an openvpn setup guide. I had no idea what it was for. Maybe if you said- it is like Microsoft wallet -I would go ahaa. Now i am self signed.

                            1 Reply Last reply Reply Quote 0
                            • K
                              kejianshi
                              last edited by

                              Certs are a racket and the most a browser should say about certs its that "the website you are visiting isn't covered by your list of trusted roots".

                              Thats all it should say.  The bullshit "You aren't safe here!  Be afraid!  Run away!" messages are just stupid.

                              1 Reply Last reply Reply Quote 0
                              • H
                                Harvy66
                                last edited by

                                @doktornotor:

                                @Phishfry:

                                I think this article has a good view of the problem.
                                http://www.computerworld.com/article/2894233/web-browsers-are-also-to-blame-for-lenovos-superfish-fiasco.html

                                Nah. The browsers need to implement TLSA/DANE. Noone will ponder which CA is supposed to sign which certificate for whom; the server owner should tell the client behind the scenes. The average Joe does not understand the details and does not care.  CAs should provide enhanced validation and that's it. This BS about "oh baaad boy, you are using self-signed certificate/your own CA -> lets nag the shit out of anyone trying to use HTTPS with your website" needs to end.

                                DNSSEC has the same issue as HTTPS when it comes to validation when your cert store has been compromised. Not having the notion of a "CA" makes certs nearly useless except that you know it's the same cert, but you have no way of knowing how much to trust the cert. A web of trust CA that can "route around problems" would be ideal, but it needs to be turn-key simple for the average user.

                                Without a CA, all a cert can say is "I am me", but you're still left wondering who "me" is. With a CA, there's at least a bit more of hurdle to falsifying who "me" is, or at least pretending to be someone else where someone else is popular, like Google.

                                With the whole HTTPS everywhere and certs are free movement, we need a better way to indicate to the user what class of cert the remote device has. Is it a free anonymous cert or a well vetted high class cert that requires proper identification from the CA, like your real name, a home address, proof of residence, a copy of your license, etc.

                                1 Reply Last reply Reply Quote 0
                                • DerelictD
                                  Derelict LAYER 8 Netgate
                                  last edited by

                                  we need a better way to indicate to the user what class of cert the remote device has. Is it a free anonymous cert or a well vetted high class cert that requires proper identification from the CA, like your real name, a home address, proof of residence, a copy of your license, etc.

                                  Why?  We already have EV.

                                  What we need is a way to secure communications to prevent wholesale, government-scale eavesdropping, which is what I consider to be problem #1, while making it reasonably secure enough and cheap enough so users are NEVER presented with certificate errors.  If they are, they should freak out a little and stop immediately and NEVER click through it and call their IT people.

                                  The main problem is people with self-signed certs telling their users "just accept it and store it" conditioning users that that's what's normal.  Then it happens at a coffee shop and they click through it there too.

                                  StartSSL reduces the cost for solid, 2-year certificates to about $100/year for a business.  However many certificates they need.  Very reasonable.  Not perfect, but it eliminates cost as the driving factor against obtaining trusted-root-signed certificates for everything.

                                  Let's Encrypt will make it free, as I understand it, though I'm waiting to see what they deliver before deciding it it's acceptable.

                                  Chattanooga, Tennessee, USA
                                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                  1 Reply Last reply Reply Quote 0
                                  • D
                                    doktornotor Banned
                                    last edited by

                                    @Harvy66:

                                    Without a CA, all a cert can say is "I am me", but you're still left wondering who "me" is.

                                    Which is exactly the same like now, unless talking about EV certificates. Sorry, cannot see the reason to pay the racket.

                                    1 Reply Last reply Reply Quote 0
                                    • K
                                      kejianshi
                                      last edited by

                                      To make sheeples see green instead of red….

                                      1 Reply Last reply Reply Quote 0
                                      • First post
                                        Last post
                                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.