Late to the thread, but I'll use this reply to say we're very
supportive of the proposal at CDT.

On Mon, Apr 13, 2015 at 4:48 PM,  <ipart...@gmail.com> wrote:
> I have given this a lot of thought lately, and to me the only way forward is 
> to do exactly what is suggested here: phase out and eventually drop plain 
> HTTP support. There are numerous reasons for doing this:
>
> - Plain HTTP allows someone to snoop on your users.
>
> - Plain HTTP allows someone to misrepresent your content to the users.
>
> - Plain HTTP is a great vector for phishing, as well as injecting malicious 
> code that comes from your domain.
>
> - Plain HTTP provides no guarantees of identity to the user. Arguably, the 
> current HTTPS implementation doesn't do much to fix this, but more on this 
> below.
>
> - Lastly, arguing that HTTP is cheaper than HTTPS is going to be much harder 
> once there are more providers giving away free certs (looking at StartSSL and 
> Let's Encrypt).
>
> My vision would be that HTTP should be marked with the same warning (except 
> for wording of course) as an HTTPS site secured by a self-signed cert. In 
> terms of security, they are more or less equivalent, so there is no reason to 
> treat them differently. This should be the goal.
>
> There are problems with transitioning to giving a huge scary warning for 
> HTTP. They include:
>
> - A large number of sites that don't support HTTPS. To fix this, I think the 
> best method is to show the "http://"; part of the URL in red, and publicly 
> announce that over the next X months Firefox is moving to the model of giving 
> a big scary warning a la self-signed cert warning if HTTPS is not enabled.
>
> - A large number of corporate intranets that run plain HTTP. Perhaps a 
> build-time configuration could be enabled that would enable system 
> administrators to ignore the warning for certain subdomains or the RFC 1918 
> addresses as well as localhost. Note that carrier grade NAT in IPv4 might 
> make the latter a bad choice by default.
>
> - Ad supported sites report a drop in ad revenue when switching to HTTPS. I 
> don't know what the problem or solution here is, but I am certain this is a 
> big hurdle for some sites.
>
> - Lack of free wildcard certificates. Ideally, Let's Encrypt should provide 
> these.
>
> - Legacy devices that cannot be upgraded to support HTTPS or only come with 
> self-signed certificates. This is a problem that can be addressed by letting 
> the user bypass the scary warning (just like with self-signed certs).
>
> Finally, some people conflate the idea of a global transition from plain HTTP 
> to HTTPS as a move by CA's to make more money. They might argue that first, 
> we need to get rid of CA's or provide an alternative path for obtaining 
> certificates. I disagree. Switching from plain HTTP to HTTPS is step one. 
> Step two might include adding more avenues for establishing trust and 
> authentication. There is no reason to try to add additional methods of 
> authenticating the servers while still allowing them to use no encryption at 
> all. Let's kill off plain HTTP first, then worry about how to fix the CA 
> system. Let's Encrypt will of course make this a lot easier by providing free 
> certs.
> _______________________________________________
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform



-- 
Joseph Lorenzo Hall
Chief Technologist
Center for Democracy & Technology
1634 I ST NW STE 1100
Washington DC 20006-4011
(p) 202-407-8825
(f) 202-637-0968
j...@cdt.org
PGP: https://josephhall.org/gpg-key
fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to