<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>firefox &#8211; Phocean.net</title>
	<atom:link href="/tag/firefox/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Computer Security Blog</description>
	<lastBuildDate>Fri, 24 Feb 2017 21:17:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.10</generator>
	<item>
		<title>A relative got hacked for scamming activities</title>
		<link>/2013/01/20/a-relative-got-hacked-for-scamming-activities.html</link>
		<pubDate>Sun, 20 Jan 2013 16:40:03 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Forensic]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[firefox]]></category>
		<category><![CDATA[Forensics]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[scammer]]></category>
		<category><![CDATA[scamming]]></category>
		<category><![CDATA[sqlite]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=1474</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=1474</guid>
		<description><![CDATA[One of my relative got hacked. After a phone conversation with him, I realized that his computer was hacked a few days before. He told me that he saw the mouse moving by itself, but what happened then was not clear to him. Anyway, he did not feel the urge to call me immediately. Needless to...<br><i class="icon-right-hand"></i> <span class="read-more"><a href="/2013/01/20/a-relative-got-hacked-for-scamming-activities.html">Continue Reading</a></span>]]></description>
				<content:encoded><![CDATA[<p>One of my relative got hacked.</p>
<p>After a phone conversation with him, I realized that his computer was hacked a few days before. He told me that he saw the mouse moving by itself, but what happened then was not clear to him. Anyway, he did not feel the urge to call me immediately. Needless to say that his knowledge on computers is low.<br />
I immediately started to investigate.</p>
<h2>How the computer was hacked</h2>
<p>The computer is running Ubuntu . I suspected a vulnerability, but I soon realized that it was much simpler than that: by mistake, a VNC session was left opened!</p>
<p><em><strong>x11vnc</strong></em> with <strong><em>no authentication</em></strong> and <em><strong>no logging</strong></em>&#8230; Damned!</p>
<h2>What the attacker did</h2>
<p>What he tried first was to create a user to maintain access. But the scammer was probably low tech and soon abandonned.</p>
<p>Here is his sequence in the shell history:</p>
<pre>261 adduser -u 0 -o -g 0 -G 0,1,2,3,4,6,10 -M xxxcx
262 useradd -d /home/xxxcx -m nokia00
263 passwd xxxcx</pre>
<p>Command <strong>#261</strong> failed, because of unproper syntax. I guess he meant useradd, as adduser on Debian/Ubuntu has totally different options. Note that what he was trying to do is create a new root user named xxxcx (with no home directory).</p>
<p>He probably did not realize his mistake, but yet tried this time useradd with fewer options in command <strong>#262</strong>. This time, he would create the home directory and name the user nokia00&#8230; Why not. Alas, the command can&#8217;t work as a standard user!</p>
<p>Then, command <strong>#263</strong>: he tried to change the current password, but again he failed as it is required to know it before updating it&#8230;</p>
<p>And that&#8217;s it. Pretty lame, isn&#8217;t it? He got quickly discouraged and started to use exclusively <em><strong>Firefox</strong></em>.</p>
<h2>On-line shopping</h2>
<p>With support of <a title="forensicswiki.org" href="http://www.forensicswiki.org/wiki/Mozilla_Firefox">forensicswiki.org</a>, I dumped the full Firefox profile on my computer and started to analyze it with the <a title="Sqlite Manager" href="https://addons.mozilla.org/fr/firefox/addon/sqlite-manager/">Sqlite Manager</a> extension.</p>
<blockquote><p>Sorry but I will be hiding private info and sensitive data that could be used for a legal action.</p></blockquote>
<p>I got most info from the files <em><strong>cookies.sqlite</strong></em> and <em><strong>places.sqlite</strong></em>.</p>
<div id="attachment_1482" style="width: 590px" class="wp-caption alignnone"><a href="/2013/01/20/a-relative-got-hacked-for-scamming-activities.html/cookies" rel="attachment wp-att-1482"><img class="size-medium wp-image-1482" alt="cookies.sqlite: a lot of info: email and billing info used by the attacker" src="/wp-content/uploads/2013/01/cookies-580x345.png" width="580" height="345" srcset="/wp-content/uploads/2013/01/cookies-580x345.png 580w, /wp-content/uploads/2013/01/cookies-940x560.png 940w, /wp-content/uploads/2013/01/cookies-500x298.png 500w, /wp-content/uploads/2013/01/cookies.png 1394w" sizes="(max-width: 580px) 100vw, 580px" /></a><p class="wp-caption-text">cookies.sqlite: a lot of info: email and billing info used by the attacker</p></div>
<div id="attachment_1483" style="width: 590px" class="wp-caption alignnone"><a href="/2013/01/20/a-relative-got-hacked-for-scamming-activities.html/places" rel="attachment wp-att-1483"><img class=" wp-image-1483 " title="places.sqlite" alt="places" src="/wp-content/uploads/2013/01/places-580x345.png" width="580" height="345" srcset="/wp-content/uploads/2013/01/places-580x345.png 580w, /wp-content/uploads/2013/01/places-940x560.png 940w, /wp-content/uploads/2013/01/places-500x298.png 500w, /wp-content/uploads/2013/01/places.png 1394w" sizes="(max-width: 580px) 100vw, 580px" /></a><p class="wp-caption-text">places.sqlite: attacker&#8217;s browsing history, with interesting purchase references in GET parameters</p></div>
<p>The guy didn&#8217;t loose time, he knew precisely what he wanted and what to do.</p>
<ol>
<li>He first visited two websites to localize the computer: <a title="ip2location.com" href="http://ip2location.com">ip2location.com</a> and <a title="ip-tracker.org" href="http://www.ip-tracker.org">ip-tracker.org</a>. You may think that it is a strange first move, but I will come back on that later as I have a theory.</li>
<li>Now that he knew in what country he was (country XXX), he started to do online shopping.</li>
</ol>
<p>It is interesting that his online shopping was all linked to web hosting:</p>
<ul>
<li>templates from dreamtemplates.com</li>
<li>a .net domain name (with however part of the prefix being localized accordingly to the country suffix).</li>
<li>hosting at netfirms.com and mg1host.com</li>
</ul>
<p>Note that the criminal used a online payment platform that I never heard about before: 2checkout.com aka 2co.com.</p>
<p>Unfortunately, when I investigated, all cookies were expired so I could not connect to the criminal&#8217;s account.</p>
<p>Yet, it still had some valuable info. The most interesting info I found was from a cookie from dreamtemplates.com. I got all the billing info used by the attacker:</p>
<ul>
<li>attacker&#8217;s gmail address (probably compromised or anonymous)</li>
<li>Name and address for the billing, that sounded real&#8230;</li>
</ul>
<p>Also, GET parameters in URLs were very interesting.</p>
<p>In some of them, you can guess the amount of the purchase he did. He for sure bought stuff for at least a total of 500$. But it is without counting the stuff that I cannot guess from URLs, so it is probably sensibly much more in reality.</p>
<p>But, even better, some had order ids. Hey, wait! Let&#8217;s have a look on the 2co website:</p>
<div id="attachment_1487" style="width: 474px" class="wp-caption alignnone"><a href="/2013/01/20/a-relative-got-hacked-for-scamming-activities.html/2co_order_review" rel="attachment wp-att-1487"><img class=" wp-image-1487 " alt="2co order review = order number + email" src="/wp-content/uploads/2013/01/2co_order_review-580x362.png" width="464" height="290" srcset="/wp-content/uploads/2013/01/2co_order_review-580x362.png 580w, /wp-content/uploads/2013/01/2co_order_review-480x300.png 480w, /wp-content/uploads/2013/01/2co_order_review.png 781w" sizes="(max-width: 464px) 100vw, 464px" /></a><p class="wp-caption-text">2co order review = order number + email</p></div>
<p>Hmmm&#8230; we have the email address and the order number&#8230; bingo!</p>
<p><a href="/2013/01/20/a-relative-got-hacked-for-scamming-activities.html/order" rel="attachment wp-att-1488"><img class="alignnone  wp-image-1488" alt="order" src="/wp-content/uploads/2013/01/order-580x911.png" width="406" height="638" srcset="/wp-content/uploads/2013/01/order-580x911.png 580w, /wp-content/uploads/2013/01/order-190x300.png 190w, /wp-content/uploads/2013/01/order.png 676w" sizes="(max-width: 406px) 100vw, 406px" /></a></p>
<p>Now, we have at least all info of the credit card owner, certainly the biggest victim in this mess.</p>
<h2>Conclusion</h2>
<p>That&#8217;s it for now. We are still in the process of transmitting the info to the police and alerting the victim.</p>
<p>Here are a few thoughts by the way:</p>
<ul>
<li>Logging, always logging! It is a pity that we know literally nothing about the scammer source ip address. All his actions were made from within a VNC session and it leaves no trace. He may have came from another proxy, but who knows&#8230; I still have a little hope that under legal request, the Internet provider of my relative will be able to provide some logs.</li>
</ul>
<ul>
<li>Nowadays, it is still difficult to report such a case to the police and to help the victim. The local police is at loss and does not really know what to do. The cyber section is slow to answer, probably crawling under requests (mostly spam stuff?).</li>
</ul>
<ul>
<li>Not every one has a computer specialist among friends or relatives. It must be a terrible experience to see the police coming to you for a fraud one hasn&#8217;t committed directly. Few people, even sometimes among IT professionals, understand that.</li>
</ul>
<ul>
<li>The criminal seemed low tech, but very organized at the same time.<br />
Here is my theory: he probably has a precise goal and is not loosing time.<br />
He follows a process: geo-localize the victim or target a country and choose accordingly financial data in his database.<br />
Then, he purchases stuff from a list of items he needs or he is requested.<br />
Finally, if he could not find a way to maintain access in seconds, he leaves. Mission done: this scammer is probably doing it full time, as a professional activity. Lame but efficient for the crime industry.</li>
</ul>
<ul>
<li>The credit card info was accompanied with private info: real name and address. We all know that but it is always shocking to think how it can easily obtained: compromised computer, hacked online shop or database, dishonest employee (e.g. at the hotel), etc.</li>
</ul>
<ul>
<li>The websites  will probably be used for more scamming and illegal activities. I am going to monitor the domain I got for a while.</li>
</ul>
<p>Keep wired for updates.</p>
]]></content:encoded>
			</item>
		<item>
		<title>CVE-2009-3555: Safari not yet patched ???</title>
		<link>/2012/06/10/cve-2009-3555-safari-not-yet-patched.html</link>
		<pubDate>Sun, 10 Jun 2012 18:17:59 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Mac OS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[browser]]></category>
		<category><![CDATA[chrome]]></category>
		<category><![CDATA[cve]]></category>
		<category><![CDATA[CVE-2009-3555]]></category>
		<category><![CDATA[firefox]]></category>
		<category><![CDATA[IE]]></category>
		<category><![CDATA[Opera]]></category>
		<category><![CDATA[Safari]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[TLS]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=1249</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=1249</guid>
		<description><![CDATA[The other day I was shocked to find this entry in my Apache logs: [error] SSL Library Error: 336068931 error:14080143:SSL routines:SSL3_ACCEPT:unsafe legacy renegotiation disabled It occurs appears when I try to use a SSL client certificate with Safari. Of course, authentication is broken as it just fails on an 403 error page. So it seems...<br><i class="icon-right-hand"></i> <span class="read-more"><a href="/2012/06/10/cve-2009-3555-safari-not-yet-patched.html">Continue Reading</a></span>]]></description>
				<content:encoded><![CDATA[<p>The other day I was shocked to find this entry in my Apache logs:</p>
<pre>[error] SSL Library Error: 336068931 error:14080143:SSL routines:SSL3_ACCEPT:unsafe legacy renegotiation disabled</pre>
<p>It occurs appears when I try to use a SSL client certificate with Safari. Of course, authentication is broken as it just fails on an 403 error page.</p>
<p>So it seems that Safari is the last browser which was not patched against <a href="/2009/11/28/openssl-cve-2009-3555-security-fix-and-mod_ssl-client-authentication-breakage.html">CVE-2009-3555</a> !</p>
<p>2009 !! At least, I quickly checked the other browsers I had around and they were fine: IE, Firefox, Chrome&#8230; I am having an issue with Opera also, but although I have not identified the problem yet, it seems unrelated (and does not throw the same error).</p>
<p>Note that I reported the issue to Apple, but I did not receive any answer. Silence on the wire.</p>
]]></content:encoded>
			</item>
		<item>
		<title>FFFjacking</title>
		<link>/2011/06/03/fffjacking.html</link>
		<pubDate>Fri, 03 Jun 2011 17:39:56 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[chrome]]></category>
		<category><![CDATA[FFFjacking]]></category>
		<category><![CDATA[firefox]]></category>
		<category><![CDATA[Hijacking]]></category>
		<category><![CDATA[IE]]></category>
		<category><![CDATA[iFrame]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[web browser]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=1085</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=1085</guid>
		<description><![CDATA[FFFjacking is new web browser hacking technique discovered by  Roman Kümmel (aka .cCuMiNn.). Even though it requires a little of social engineering, it is quite dangerous. Yet another string to add to the bow.]]></description>
				<content:encoded><![CDATA[<p><a title="FFFjacking" href="http://www.soom.cz/index.php?name=articles/show&amp;aid=550" target="_blank">FFFjacking</a> is new web browser hacking technique discovered by  Roman Kümmel (aka .cCuMiNn.).</p>
<p>Even though it requires a little of social engineering, it is quite dangerous. Yet another string to add to the bow.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Yet OpenSSL renegociation not fully fixed</title>
		<link>/2010/10/16/yet-openssl-renegociation-not-fully-fixed.html</link>
		<pubDate>Sat, 16 Oct 2010 07:35:59 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[chrome]]></category>
		<category><![CDATA[firefox]]></category>
		<category><![CDATA[openSSL]]></category>
		<category><![CDATA[Opera]]></category>
		<category><![CDATA[renegociation]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=924</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=924</guid>
		<description><![CDATA[How the hell is it possible that after so many months, the fix for OpenSSL renegociation has not been yet included in either Chrome (6.0.4) or Opera (10.61)? I haven&#8217;t tested other browsers though, except Firefox which at least has fixed the issue since several months.]]></description>
				<content:encoded><![CDATA[<p>How the hell is it possible that after so many months, <a title="OpenSSL renegociation issue" href="/2010/04/05/updates-about-openssl-cve-2009-3555-client-renegociation.html" target="_self">the fix for OpenSSL renegociation</a> has not been yet included in either Chrome (6.0.4) or Opera (10.61)? I haven&#8217;t tested other browsers though, except Firefox which at least has fixed the issue since several months.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Updates on OpenSSL CVE-2009-3555 (client renegociation)</title>
		<link>/2010/04/05/updates-about-openssl-cve-2009-3555-client-renegociation.html</link>
		<comments>/2010/04/05/updates-about-openssl-cve-2009-3555-client-renegociation.html#comments</comments>
		<pubDate>Mon, 05 Apr 2010 08:40:44 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Apache]]></category>
		<category><![CDATA[certificate]]></category>
		<category><![CDATA[chrome]]></category>
		<category><![CDATA[CVE-2009-3555]]></category>
		<category><![CDATA[firefox]]></category>
		<category><![CDATA[mod-ssl]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=773</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=773</guid>
		<description><![CDATA[So there are some news from the front of OpenSSL CVE-2009-3555 (see this and this for the history). Now the latest version of Apache mod_ssl (2.2) embeds an option to reactivate old way client renegociation : SSLInsecureRenegotiation on Check the official doc for more details. With this option activated, you can now safely upgrade openSSL...<br><i class="icon-right-hand"></i> <span class="read-more"><a href="/2010/04/05/updates-about-openssl-cve-2009-3555-client-renegociation.html">Continue Reading</a></span>]]></description>
				<content:encoded><![CDATA[<p>So there are some news from the front of OpenSSL CVE-2009-3555 (see <a title="SSL client authenticate breakage" href="/2009/11/28/openssl-cve-2009-3555-security-fix-and-mod_ssl-client-authentication-breakage.html" target="_self">this</a> and <a title="SSL/TLS RFC updated against CVE-2009-3555" href="/2010/01/09/ssltls-rfc-updated-against-cve-2009-3555.html" target="_self">this</a> for the history).</p>
<p>Now the latest version of Apache mod_ssl (2.2) embeds an <a title="mod_ssl client renegociation" href="http://httpd.apache.org/docs/2.2/mod/mod_ssl.html#sslinsecurerenegotiation" target="_blank">option to reactivate old way client renegociation</a> :</p>
<pre>SSLInsecureRenegotiation on</pre>
<p>Check the official doc for more details. With this option activated, you can now safely upgrade openSSL and mod_ssl without breaking your clients. They should have done it from the begining, shouldn&#8217;t they ?</p>
<p>The next step will be to move on to the new protocol definitely, to solve for good the CVE-2009-3555 vulnerability. For that we have to wait for the browsers to support it.</p>
<p>Firefox has started to <a title="Firefox and CVE-2009-3555" href="https://wiki.mozilla.org/Security:Renegotiation" target="_blank">work seriously on it</a> and we can expect some support in the next releases (some settings will be possible through about:config).</p>
<p>They even created a <a title="CVE-2009-3555 test page" href="https://ssltls.de/" target="_blank">test site</a>. This screenshot was taken from Google Chrome (5.0.366.2, <a title="openSUSE repos" href="http://en.opensuse.org/Additional_package_repositories" target="_blank">openSUSE repo</a>) which already has support for the SSL protocol :</p>
<p style="text-align: center;"><a href="/wp-content/uploads/2010/04/chrome-ssl.png" rel="lightbox[773]"><img class="aligncenter size-full wp-image-776" title="chrome-ssl" src="/wp-content/uploads/2010/04/chrome-ssl.png" alt="" width="455" height="473" /></a></p>
]]></content:encoded>
			<wfw:commentRss>/2010/04/05/updates-about-openssl-cve-2009-3555-client-renegociation.html/feed</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Anti-IE 6 campaign</title>
		<link>/2009/03/03/anti-ie-6-campaign.html</link>
		<pubDate>Tue, 03 Mar 2009 20:30:45 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[firefox]]></category>
		<category><![CDATA[IE]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=346</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=346</guid>
		<description><![CDATA[I found this initiative, apparently started in Sweden, quite funny but also educative. So I just set up the Shockingly Big IE6 Warning plugin in this blog. Then I became curious and checked the stats of this site : So there is still about 9% of our visitors that are running IE 6 and 3%...<br><i class="icon-right-hand"></i> <span class="read-more"><a href="/2009/03/03/anti-ie-6-campaign.html">Continue Reading</a></span>]]></description>
				<content:encoded><![CDATA[<p>I found <a title="anti-ie6 campaign" href="http://ie6.forteller.net/index.php?title=Main_Page#French">this initiative</a>, apparently started in Sweden, quite funny but also educative.</p>
<p>So I just set up the <a title="anti-ie6 plugin" href="http://wordpress.org/extend/plugins/shockingly-big-ie6-warning/">Shockingly Big IE6 Warning plugin</a> in this blog.</p>
<p>Then I became curious and checked the stats of this site :</p>
<p><a href="/wp-content/uploads/2009/03/browser-stats.png" rel="lightbox[346]"><img class="aligncenter size-medium wp-image-347" title="browser-stats" src="/wp-content/uploads/2009/03/browser-stats-300x256.png" alt="browser-stats" width="300" height="256" srcset="/wp-content/uploads/2009/03/browser-stats-300x256.png 300w, /wp-content/uploads/2009/03/browser-stats.png 802w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>So there is still about 9% of our visitors that are running IE 6 and 3% using some rather outdated versions of Firefox.</p>
<p>And, my god, I would have never imagined that Netscape would appear in the list !</p>
<p>Yes, there is still a lot of work to do about security awareness among users.</p>
]]></content:encoded>
			</item>
		<item>
		<title>How to stop Firefox from prompting for the client certificate</title>
		<link>/2008/11/16/how-to-stop-firefox-from-prompting-for-the-client-certificate.html</link>
		<comments>/2008/11/16/how-to-stop-firefox-from-prompting-for-the-client-certificate.html#comments</comments>
		<pubDate>Sun, 16 Nov 2008 22:46:33 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Apache]]></category>
		<category><![CDATA[firefox]]></category>
		<category><![CDATA[mode-ssl]]></category>
		<category><![CDATA[SSL]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=303</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=303</guid>
		<description><![CDATA[I am using a client certificate to authenticate against some Apache HTTPS website. By default, Firefox 3 has a very annoying setting : it will prompt you with a box to select your certificate, every time the browser access to a file. I quickly realized that there is not setting in the preference tab to...<br><i class="icon-right-hand"></i> <span class="read-more"><a href="/2008/11/16/how-to-stop-firefox-from-prompting-for-the-client-certificate.html">Continue Reading</a></span>]]></description>
				<content:encoded><![CDATA[<p>I am using a client certificate to authenticate against some Apache HTTPS website.</p>
<p>By default, Firefox 3 has a very annoying setting : it will prompt you with a box to select your certificate, every time the browser access to a file.</p>
<p>I quickly realized that there is not setting in the preference tab to change this behavior. That sucks, really !</p>
<p>Fortunately, it is possible to tweak it within the <strong>about:config</strong> page. Set the <strong>security.default_personal_cert entry</strong> with <em><strong>Select Automatically</strong></em> instead of <em><strong>Ask Every Time</strong></em>.</p>
<p>But what a dumb behavior !</p>
<p>It is like the alert page that Firefox displays every time a self-signed certificate is used. I am now wondering if the developers really understood well what a certificate is !</p>
<div id="attachment_304" style="width: 310px" class="wp-caption aligncenter"><a href="/wp-content/uploads/2008/11/capture-1.png" rel="lightbox[303]"><img class="size-medium wp-image-304" title="Setting Firefox properly for Client certificate" src="/wp-content/uploads/2008/11/capture-1.png" alt="Setting Firefox properly for Client certificate" width="300" height="187" /></a><p class="wp-caption-text">Setting Firefox properly for Client certificate</p></div>
]]></content:encoded>
			<wfw:commentRss>/2008/11/16/how-to-stop-firefox-from-prompting-for-the-client-certificate.html/feed</wfw:commentRss>
		<slash:comments>6</slash:comments>
		</item>
	</channel>
</rss>
