First a bit of good news: The overall trend line for SHA-1 errors is not
spiking (yet).  Bin 6 of SSL_CERT_VERIFICATION_ERRORS corresponds to
ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED, which is what you get when you
reject a bad SHA-1 cert.

https://ipv.sx/telemetry/general-v2.html?channels=beta%20release&measure=SSL_CERT_VERIFICATION_ERRORS&target=6

Now for the bad news: Telemetry is actually useless for the specific case
we're talking about here.  Telemetry is submitted over HTTPS (about:config
/ toolkit.telemetry.server), so measurements from affected clients will
never reach the server.

So we can't get any measurements unless we revert the SHA-1 intolerance.
Given this, I'm sort of inclined to do that, collect some data, then maybe
re-enable it in 45 or 46.  What do others think?

--Richard


On Mon, Jan 4, 2016 at 1:43 PM, Richard Barnes <rbar...@mozilla.com> wrote:

>
>
> On Mon, Jan 4, 2016 at 12:31 PM, Bobby Holley <bobbyhol...@gmail.com>
> wrote:
>
>> On Mon, Jan 4, 2016 at 9:11 AM, Richard Barnes <rbar...@mozilla.com>
>> wrote:
>>
>>> Hey Daniel,
>>>
>>> Thanks for the heads-up.  This is a useful thing to keep in mind as we
>>> work
>>> through the SHA-1 deprecation.
>>>
>>> To be honest, this seems like a net positive to me, since it gives users
>>> a
>>> clear incentive to uninstall this sort of software.
>>>
>>
>> By "this sort of software" do you mean "Firefox"? Because that's what 95%
>> of our users experiencing this are going to do absent anything clever on
>> our end.
>>
>> We clearly need to determine the scale of the problem to determine how
>> much time it's worth investing into this. But I think we should assume that
>> an affected user is a lost use in this case.
>>
>
> I was being a bit glib because I think in a lot of cases, it won't be just
> Firefox that's affected -- all of the user's HTTPS will quit working,
> across all browsers.
>
> I agree that it would be good to get more data here.  I think Adam is on
> the right track.
>
> --Richard
>
>
>>
>> bholley
>>
>>
>>
>>>
>>> --Richard
>>>
>>> On Mon, Jan 4, 2016 at 3:19 AM, Daniel Holbert <dholb...@mozilla.com>
>>> wrote:
>>>
>>> > Heads-up, from a user-complaint/ support / "keep an eye out for this"
>>> > perspective:
>>> >  * Starting January 1st 2016 (a few days ago), Firefox rejects
>>> > recently-issued SSL certs that use the (obsolete) SHA1 hash
>>> algorithm.[1]
>>> >
>>> >  * For users who unknowingly have a local SSL proxy on their machine
>>> > from spyware/adware/antivirus (stuff like superfish), this may cause
>>> > *all* HTTPS pages to fail in Firefox, if their spyware uses SHA1 in its
>>> > autogenerated certificates.  (Every cert that gets sent to Firefox will
>>> > use SHA1 and will have an issued date of "just now", which is after
>>> > January 1 2016; hence, the cert is untrusted, even if the spyware put
>>> > its root in our root store.)
>>> >
>>> >  * I'm not sure what action we should (or can) take about this, but for
>>> > now we should be on the lookout for this, and perhaps consider writing
>>> a
>>> > support article about it if we haven't already. (Not sure there's much
>>> > help we can offer, since removing spyware correctly/completely can be
>>> > tricky and varies on a case by case basis.)
>>> >
>>> > (Context: I received a family-friend-Firefox-support phone call today,
>>> > who this had this exact problem.  Every HTTPS site was broken for her
>>> in
>>> > Firefox, since January 1st.  IE worked as expected (that is, it happily
>>> > accepts the spyware's SHA1 certs, for now at least).  I wasn't able to
>>> > remotely figure out what the piece of spyware was or how to remove it
>>> --
>>> > but the rejected certs reported their issuer as being "Digital
>>> Marketing
>>> > Research App" (instead of e.g. Digicert or Verisign).  Googling didn't
>>> > turn up anything useful, unfortunately; so I suspect this is "niche"
>>> > spyware, or perhaps the name is dynamically generated.)
>>> >
>>> > Anyway -- I have a feeling this will be somewhat-widespread problem,
>>> > among users who have spyware (and perhaps crufty "secure browsing"
>>> > antivirus tools) installed.
>>> >
>>> > ~Daniel
>>> >
>>> > [1]
>>> >
>>> >
>>> https://blog.mozilla.org/security/2014/09/23/phasing-out-certificates-with-sha-1-based-signature-algorithms/
>>> > _______________________________________________
>>> > dev-platform mailing list
>>> > dev-platform@lists.mozilla.org
>>> > https://lists.mozilla.org/listinfo/dev-platform
>>> >
>>> _______________________________________________
>>> dev-platform mailing list
>>> dev-platform@lists.mozilla.org
>>> https://lists.mozilla.org/listinfo/dev-platform
>>>
>>
>>
>
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to