<?xml version="1.0" encoding="utf-8"?>
<rss version="0.92">
<channel>
<title>SecuObs.com</title>
<link>http://www.secuobs.com</link>
<description>Observatoire de la securite Internet</description>
<language>fr</language>
<webMaster>webmaster@secuobs.com</webMaster>
 <item><title>Mixed-Content Warnings == SSLFail</title><description>2009-06-26 07:48:52 - .SSLFail. : Jay posted on this previously and we had a brief discussion surroundingit in the comments, but I wanted to bring this up again because I’mreally not a fan of it, and I wanted to make sure people are payingattention Oh yeah and discuss, discuss, discuss — let’s have somechatter I </description><link>http://www.secuobs.com/revue/news/113970.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/113970.shtml</guid></item>
<item><title>SSL Site Check Tool</title><description>Secuobs.com : 2009-06-04 17:42:08 - .SSLFail. - I came across a useful tool on a Dutch Hosting Site: Networking4all SSLSite Check Tool Try it outhttp://wwwnetworking4allcom/en/support/tools/site+check/report/fqdn=wwwcibccom</description><link>http://www.secuobs.com/revue/news/105851.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/105851.shtml</guid></item>
<item><title>BofA ssl fails</title><description>Secuobs.com : 2009-04-21 07:20:51 - .SSLFail. -  Thanks to Mike A</description><link>http://www.secuobs.com/revue/news/85929.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/85929.shtml</guid></item>
<item><title>JobScore ssl fails</title><description>Secuobs.com : 2009-04-21 04:17:02 - .SSLFail. -  Thanks to Jim Manico</description><link>http://www.secuobs.com/revue/news/85888.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/85888.shtml</guid></item>
<item><title>The Middler *FINALLY* Released</title><description>Secuobs.com : 2009-02-09 07:28:27 - .SSLFail. - I really wish I’d be at ShmooCon for this, but getting news of it is morethan enough I had first mentioned the Middler when I attended Jay’stalk at SecTor Following the presentation I had a chance to sit downand further discuss the tool with Jay and I was really excited thatthe </description><link>http://www.secuobs.com/revue/news/59793.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/59793.shtml</guid></item>
<item><title>SSLv3 Traces Part 2</title><description>Secuobs.com : 2009-02-08 06:46:49 - .SSLFail. - This SSL Packet Trace is based on the Server View found here My goal isto add useful hash information to the packet dump which in itsoriginal form only contained the state register values These are thestarting values for your MD5 and SHA-1 Hash Objects State = uselessHash = digest of all handshake data seen </description><link>http://www.secuobs.com/revue/news/59639.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/59639.shtml</guid></item>
<item><title>Potentially 219K Expired SSL Certs</title><description>Secuobs.com : 2009-02-06 07:05:45 - .SSLFail. - Royal Pingdom has a post up mention that Netcraft has announced there arenow one million sites that are using SSL That’s valid certs, trustedby a third party, not expired and where the common name matches thehostname That’s a far cry from the 3293 found in Netcrafts first SSLsurvey Does this survey catch </description><link>http://www.secuobs.com/revue/news/59135.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/59135.shtml</guid></item>
<item><title>Blogger mixed content</title><description>Secuobs.com : 2009-01-28 00:48:48 - .SSLFail. - </description><link>http://www.secuobs.com/revue/news/55742.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/55742.shtml</guid></item>
<item><title>SSLFailcom == SSL FAIL</title><description>Secuobs.com : 2009-01-27 20:00:32 - .SSLFail. - We just recieved a link to our own site It would appear that someone waslooking and discovered that we don’t have a SSL Enabled site This isvery true, but we’re not a large company with tons of visitors infact we’re still at less than 1000 unique visitors and we’re notasking you </description><link>http://www.secuobs.com/revue/news/55657.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/55657.shtml</guid></item>
<item><title>Verisign FAIL - We are all doomed</title><description>Secuobs.com : 2009-01-22 23:14:06 - .SSLFail. - </description><link>http://www.secuobs.com/revue/news/54270.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/54270.shtml</guid></item>
<item><title>rapidssl SSL Fail</title><description>Secuobs.com : 2009-01-22 23:14:06 - .SSLFail. - </description><link>http://www.secuobs.com/revue/news/54269.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/54269.shtml</guid></item>
<item><title>Wachovia Failing at more than Finance</title><description>Secuobs.com : 2009-01-22 23:14:06 - .SSLFail. - </description><link>http://www.secuobs.com/revue/news/54268.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/54268.shtml</guid></item>
<item><title>SSLv3 Traces Part 1</title><description>Secuobs.com : 2009-01-22 23:14:06 - .SSLFail. - This is Part 1 of a series of posts about Netscape’s SSLv3 spec Whenworking on my first SSL Client I went looking for the official RFC tocorrectly implement the SSLv3 protocol Near total FAIL The SSLv3protocol was created by Netscape back in 1995 The file that mostpeople continue to reference is:http://wwwnetscapecom/eng/ssl3/draft302txt Which is tragically</description><link>http://www.secuobs.com/revue/news/54267.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/54267.shtml</guid></item>
<item><title>Why ssl_error_bad_cert_domain is bad</title><description>Secuobs.com : 2009-01-22 23:14:06 - .SSLFail. - Since the site went live and our first ssl_error_bad_cert_domain errornote: I will be using the Firefox error message to identify most ofthese errors was posted, we’ve been receiving emails, comments andIMs regarding this SSL error and why it isn’t a security issue, andhow we shouldn’t be posting them There may be </description><link>http://www.secuobs.com/revue/news/54266.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/54266.shtml</guid></item>
<item><title>Twitter SSL Fail… Again</title><description>Secuobs.com : 2009-01-22 23:14:06 - .SSLFail. - Given my last post on ssl_error_bad_cert_domain error you probablywouldn’t expect me to post another one so soon, but I thought thatthis really demonstrated my point Mike Murray posted to twitterearlier today that something was up with their SSL and asked ifperhaps it was a compromise of sorts Tonight he sent us </description><link>http://www.secuobs.com/revue/news/54265.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/54265.shtml</guid></item>
<item><title>Microsoft/Phishing SSLFail</title><description>Secuobs.com : 2009-01-22 23:14:06 - .SSLFail. - </description><link>http://www.secuobs.com/revue/news/54264.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/54264.shtml</guid></item>
<item><title>A Great Example of Failing User Trust</title><description>Secuobs.com : 2009-01-22 23:14:06 - .SSLFail. - Update: apparently Romain and I posted the same image, so I've removedthe image from my comment We recently had a link submitted ThanksJirka that I think is a great example of betraying user trust in theSSL Realm The link in question belongs to Microsoft and links to noneother than their phishing filter </description><link>http://www.secuobs.com/revue/news/54263.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/54263.shtml</guid></item>
<item><title>Welcome to SSLFail</title><description>Secuobs.com : 2009-01-22 23:14:06 - .SSLFail. - Welcome to SSLFail Lately there seems to be a lot of SSL discussion, andnot just the recently released ‘Rogue CA‘ presentation There havebeen speakers at several cons, blog posts, and conversations latelyaround the subject of SSL Marcin and I were discussing some of therecent failures that we’ve seen and that others have mentioned </description><link>http://www.secuobs.com/revue/news/54262.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/54262.shtml</guid></item>
</channel>
</rss>
 
<?xml version="1.0" encoding="utf-8"?>
<rss version="0.92">
<channel>
<title>SecuObs.com</title>
<link>http://www.secuobs.com</link>
<description>Observatoire de la securite Internet</description>
<language>fr</language>
<webMaster>webmaster@secuobs.com</webMaster>
 <item><title>GeoTrustcom ssl_error_bad_cert_domain</title><description>2010-07-24 18:00:40 - . SSLFail . : This one came in via email from Philippe  You d think that a company with the page title  SSL Certificates from a Leading SSL Certificate Authority  could do a little better </description><link>http://www.secuobs.com/revue/news/243584.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/243584.shtml</guid></item>
<item><title>ICICI Bank Canada SSLFail </title><description>Secuobs.com : 2010-05-27 23:53:35 - . SSLFail . - Michael submitted this SSL fail to us from the ICICI Bank Canada website Another interesting thing about this website is that with javascript blocked, the default page won t even load because they use a javascript redirect to send you to the main page  I suppose setting the DefaultDocuments directive  or rather the IIS equivalent  is    </description><link>http://www.secuobs.com/revue/news/226445.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/226445.shtml</guid></item>
<item><title>SSL Used in Spam</title><description>Secuobs.com : 2009-10-13 04:24:23 - . SSLFail . - SANS ISC is reporting that people are receiving spam indicating that a server upgrade is occurring and people will need to manually update their SSL certificates As if there weren t already enough problems with SSL I have to say, this is interesting and if anyone has any examples of the message  with mail headers  or a    </description><link>http://www.secuobs.com/revue/news/149842.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/149842.shtml</guid></item>
<item><title>Server Outage</title><description>Secuobs.com : 2009-10-11 21:56:21 - . SSLFail . - Anyone who tried to access SSLFailcom late last night or this morning would have noticed that it was down I apparently caused my own server outage with python Here s how it happened When sockstress was first discussed I was rather intrigued and thought about it for a bit, but then I quickly abandoned it  I just    </description><link>http://www.secuobs.com/revue/news/149463.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/149463.shtml</guid></item>
<item><title>SSLFail Panel Interview on DarkReading</title><description>Secuobs.com : 2009-10-09 03:30:10 - . SSLFail . - I just wanted to point to an awesome article from Kelly Jackson Higgins on DarkReading I can call it awesome because it s about the SSLFail panel at SecTOR and includes quite a bit of the information we shared with attendees, so for anyone not at SecTOR and not wanting to look at the raw data    </description><link>http://www.secuobs.com/revue/news/148831.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/148831.shtml</guid></item>
<item><title>SSLFailcom Panel Follow-up</title><description>Secuobs.com : 2009-10-08 22:50:00 - . SSLFail . - I want to call the SSLFailcom panel at SecTOR a great success We had a great time up there and if the audience participating was any indication  and it seems to be  then then it was a good time for everyone We ended up talking so long that we were kicked out of the room    </description><link>http://www.secuobs.com/revue/news/148763.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/148763.shtml</guid></item>
<item><title>SSLFail   SecTor</title><description>Secuobs.com : 2009-10-01 10:39:14 - . SSLFail . - I ve been a huge fan of SecTor since the first year it ran and have been fairly vocal about people attending This year there s an extra special reason to attend though, a couple of SSLFailcom bloggers will be doing a panel, we may even have a special guest join us You ll have to attend the    </description><link>http://www.secuobs.com/revue/news/146370.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/146370.shtml</guid></item>
<item><title>Rogers Webmail SSLFail Follow-up</title><description>Secuobs.com : 2009-07-22 11:14:06 - . SSLFail . - A while back we posted a screenshot of the Rogers Webmail SSLFail I decided to follow-up with Rogers to see if they were going to resolve the issue anytime soon I contacted Rogers and asked if they were going to fix the issue, a couple of days later  July 11th  I received a canned response    </description><link>http://www.secuobs.com/revue/news/123448.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/123448.shtml</guid></item>
<item><title>Temporary LinkedIn SSLFail </title><description>Secuobs.com : 2009-07-11 19:45:56 - . SSLFail . - We had an interesting screen shot sent in today from Sheldon  his post on the subject  It appears as though the SSL certificate on LinkedIn expired today and they waited until after the expiration to update their cert, leaving people with SSL errors temporarily This doesn t seem like a great way to foster user trust,    </description><link>http://www.secuobs.com/revue/news/119317.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/119317.shtml</guid></item>
</channel>
</rss>
 
