Not e10s compatible Noté 2 sur 5 étoiles
Very usefull, but sadly not comaptible with e10s. At least for me, I don't get the popups :(Cette critique concerne une version précédente du module (188.8.131.52-signed.1-signed).
Good app that needs just a few updates Noté 4 sur 5 étoiles
For all the negative reviews about sites that change their certificates too often or use multiple certificates: the app has an option to check just the Certificate Authority (CA) that issued the certificates to make sure it hasn't changed. You just have to check the box on the warning popup so it can't get much easier. For sites that use multiple certificates from different CAs there is the "nuclear" option of ignoring a host completely. I wish websites were consistent and used the same certificate on all servers for all subdomains. That being said, it would be REALLY nice if the app allowed the approval of multiple certificates for a domain.
As others have noted there are a lot of warning popups because many sites are prematurely updating their certificates because SHA-1 has been deprecated (superseded and discouraged since it is no longer considered safe) and the SHA-2, variant SHA-256, is the new minimum. (I wish the new minimum was SHA-3 so we won’t have to repeat this later when SHA-2 is deprecated.) Since Firefox, Chrome, Microsoft, and others have generally set the deadline for 2016 most websites should have upgraded by now and the popups will be greatly reduced.
As I said earlier, the most helpful feature to add would be to store multiple certificates for a domain. Most importantly it needs to be updated to be e10 compatible for multiprocess or it will no longer be compatible with newer versions of Firefox.
Good idea but... Noté 3 sur 5 étoiles
Good add-on, i have used it for sometime now and it has been useful. Though Certificate Patrol seems to be lacking support most recently. Could improve as all things. Provides good informations about certificates.
Popups now stealing focus in windows... very annoying.
some additional functionality would be helpful.
Edit (for teh lulz): go figure... exactly one year from the previous post.
Good idea but limited usefulness Noté 3 sur 5 étoiles
At first I thought this is great, but now I have been made aware because of this addon that sites like google, twitter and amazon seem to change certificates at a rapid rate, I dont know why these companies have unusual certificate policies but it makes the purpose of this addon void, it becomes only useful for non mainstream sites that are not changing their certificate every 5 minutes.
So really it needs a whitelist function for twitter and co, then it may be a must use addon. As it stands I may turn it off due to all the prompts.
smarter comment on prematurely issued new certificates now with SHA2 or SHA256 signatures Noté 3 sur 5 étoiles
Since SHA1 signatures are deprecated, a lot of certificates are re-issued pre-maturely by the CAs signed with SHA2 or SHA256. (e.g. ssllabs asks for this).
If the issuing organization is the same, and this change is visible, do not label the change yellow, but green!
P.S.: BTW, do you have an issue-tracker?
Possibly downgrades TLS? Noté 2 sur 5 étoiles
I used this addon for several years and recently disabled it. I believe it was interfering with TLS in some way. Recently, if I tried to connect to https://www.google.com, I received an error "The server rejected the handshake because the client downgraded to a lower TLS version than the server supports". With the same version of Firefox in a VM that didn't have Certificate Patrol I was able to connect without the error. After disabling Certificate Patrol I could connect to Google fine.
The error appears to be a security step on Google's part to prevent POODLE attacks - if the client (browser) tries to negotiate a connection with a POODLE-vulnerable version of TLS, the server (Google) refuses. It's not clear why Certificate Patrol would cause problems there, but the issue went away when I disabled CP. The implication is that CP is in some way negotiating a lower version of TLS, which if true would ironically reduce SSL security.
unusable now Noté 1 sur 5 étoiles
That's it, Google has killed this extension now.
I've made an attempt to use it for the last couple of years (because something like this is really needed to be able to trust https), and it was almost OK initially, but these days it's unusable, mostly due to Google. Looks like they use hundreds (thousands?) of certificates, with their own CAs, so even checking the CA-only box doesn't help much. And now they're generating certificates valid for only 90 days. And with their ad network you get their warnings not only on Google's own sites, but *everywhere* (including here, addons.mozilla.org).
No updates for 3 years, when the landscape is changing this quickly, is inexcusable. This extension is dead.
Noté 3 sur 5 étoiles
This is nice, sure. But in the current form, unfortunatley also greatly annoying. Generally there are just too many sites that change certificates like people change clothes, and just too few sites that need the special attention that this addon provides.
My proposal is to only check certificates that:
a) come from sites that are on a force-check-list (the opposite of the current ignore-list)
b) are signed by root certificates that are not in the trust-store
c) are self-signed
Noté 2 sur 5 étoiles
Way too many warnings. I mostly get notified about cert changes that the add-on says are "harmless" - why is there no option to turn them off?Cette critique concerne une version précédente du module (184.108.40.206-signed.1-signed).
Noté 4 sur 5 étoiles
Great security extension. Sadly with Firefox 31 and the new key verifier changes it stopped working.Cette critique concerne une version précédente du module (220.127.116.11-signed.1-signed).
Noté 4 sur 5 étoiles
Great extension. Much more useful than just green indicator in the address bar or other extensions which track just the main page without third-party content.
But it's still hard to validate certificate which Patrol is suspicious about.
It would be a great feature to add on-demand (button?) validation via "https://www.grc.com/fingerprints.htm" or Perspectives notaries in the "certificate changed" dialog.
Great job, but needs upgrades Noté 4 sur 5 étoiles
Great job, but the add-on needs more features to not be annoying to the user. Spamming the user with messages defeats the main purpose of the add-on, because after a while one stops paying attention to them. It becomes similar to banner blindness.
There are few things that should be added ASAP.
1. Configuration option to check embedded content certificates only if the webste itself is using HTTPS. It's not really important if an image comes from trusted source if whole website in which it is embedded is served via plain HTTP. Also the user will not spend time on verifying certificate of some image hotlinked on a forum from random hosting, but just accept the certificate to get rid of an annoying message. This is worse than not being notified at all.
2. Ability to not store each domain covered by wildcard certificate in the database. Instead only one entry for such certificate should be stored. The reason is that some providers (for example Google) uses randomly-generated subdomain names, which pollute the database quite fast.
Rejected certificates should stay rejected Noté 3 sur 5 étoiles
When I see a suspect certificate change I reject the new certificate but it just comes back again. If I reject a changed certificate the new certificate should stay rejected.
I generally always reject a certificate change if the new certificate has an older start/end date than the old certificate or if both the authority and domain change at the same time.
5/5 Thanks !!!! Noté 5 sur 5 étoiles
i will give it 5/5 !!!! great tool for advanced users thanks a lot !!!
did not had the time to review the code hope the addon is clean :)
May i suggest you to add a feature to colorize the notification on new CA or non Root CA
Noté 3 sur 5 étoiles
Needs updating and needs to be smarter (I have to keep clicking to accept even when using the host option - Google uses a million certificates apparently). But useful. Four stars if it had been kept up to date.Cette critique concerne une version précédente du module (18.104.22.168-signed.1-signed).
Noté 5 sur 5 étoiles
Great , props to devCette critique concerne une version précédente du module (22.214.171.124-signed.1-signed).
Useless Noté 2 sur 5 étoiles
It only displays alerts for HTTPS connections - in which world is this an useful Thunderbird extension? Maybe for people who use it as an RSS reader, hence 2 stars.Cette critique concerne une version précédente du module (126.96.36.199-signed.1-signed).
Noté 5 sur 5 étoiles
Security on the web is impossible, but the attempt here is awareness and education. For those that don't care, nothing will help them. Others however, value information, especially when it can save them from massive headache like identity theft, or getting their bank account cleaned out from being careless online.
This add-on is not hard to use, and the popups, while a nuisance, can be tolerated. If taking a moment to scrutinize a new certificate, or one that has changed for no reason is too much hassle for you, then skip it. Good luck to you.
If however, you realize just how broken the concept of "trust" on the internet is, you will find this add-on a useful tool in gaining a little of that most elusive and valuable commodity, knowledge.
Trust nothing on the internet, not your ISP, especially not your government, nothing. Question everything. Good luck to you, as well.
Noté 4 sur 5 étoiles
Mostly good. The "CA Only" checkbox on the popup isn't working for me.
Having only a webchat for submitting problems borders on FAIL.
Almost There.. Just not yet Noté 3 sur 5 étoiles
Certificate Patrol fills a gap in browser security, but does so at the cost of frightening popups that are far beyond most users. After recommending Certificate Patrol as part of a security overhaul, 0 out of 8 users are still using the software after 1 week. This is entirely due to the number of type and number of alerts for popular websites such as Twitter.
Adopting a strategy such as SSLEverywhere's observatory to verify certificates or just including IDs with the extension to verify like Chrome would go a long way to improving usability. As it stands, I would love to recommend or use the plugin, but it just isn't there yet.