I really hope they would -- it'd be extremely nice for vanilla Windows Server installs to be able to provision themselves a default certificate.
Of course, Mozilla are the asshats that innovated the draconian dialog maze for self-signed certificates, and as such have made it impossible to ship appliances with HTTPS web interfaces. I hope their heads fall off.
Don't you really want WiFi access point config pages to be HTTPS-only?
I think it's great that Mozilla made it difficult to use self-signed certs. Most people don't use them correctly, and making self-signed essentially off limits to people is a great increase in security.
You should try using ettercap. It's surprisingly easy to intercept all traffic going to and from a self-signed site.
Is there any problem with buying a certificate and using the same certificate for your postfix TLS email authentication that you use for your web server authentication?
I would like to have authenticated email, to minimize the chance of my emails bouncing, and I was hoping to only purchase one certificate. I can't find anybody talking about mail server TLS email authentication on the certification websites. They only talk about web authentication and a bit about email client authentication.
Yep, you can use the same certificate for email (IMAP, POP, TLS). Only works without warnings if your clients connect to the same hostname as the certificate is for (so I usually register something other than www.domain.com for the SSL site)
Does any mainstream browser include the CACert root? Without it, you might as well just use no certificate; self-signed certs add no additional security to TLS in the HTTPS case.
At the moment, no, but CACert is working on it. Certificates issued by CACert are still more valuable than self-signed because the owner's identity has been verified and, if the user installs the CACert root once, they can all be checked against it.
Without the root cert installed, they add zero additional security, because the browser can't verify them. They might as well be self-signed.
CACert has been working on this for a long time, and the outlook does not seem positive. If they can't even get past Mozilla's audit requirements, how well do you think they'll fare with Microsoft?
That's like saying that SSH host keys add no additional security. If I add the self-signed cert to my certificate store, if anyone ever tries to present me a fake one, I'll know.
Doesn't help with public sites, but does with personal administrative ones.
SSH and TLS use two totally different trust models. With SSH, you deliberately accept an insecure first connection, but then rely on key continuity so that subsequent connections won't be any less secure than the first. This happens automatically; users don't have to think about it.
TLS has no key continuity. Browsers talk to tens of thousands of different sites. TLS doesn't work unless you can verify public key signatures all the way back to a trusted root.
Yes, you can manually manage certificates, but you can just as easily add the CACert root to your certificate manager and use TLS the way it's meant to be used. Which, fine, do that. But for the other 99.999% of your users, CACert is no better than a self-signed cert.
Doesn't this sound like something they would already be doing?