I don’t dispute your claims if the attacker is ‘on the wire’; what I dispute is 
that that is actually the case most of the time.  I’d think a far more common 
case is one in which I receive an email, purportedly from my bank, but 
containing a URL that isn’t the one I recognize as my bank’s.  Usually that’s a 
scam, but sometimes it’s a legit separate domain they have for the credit card 
rewards program or something like that.  Or a case where I am typing a known 
URL and I fat-finger something and stumble onto a scammer’s site.  The 
immediate absence of the EV organization name is going to help me detect that 
I’m not where I want to be.

BTW, I looked at these things long before I was in the CA business, so if I was 
“conditioned” it must have been by the outside world.  ☺

From: Ryan Sleevi <[email protected]>
Reply-To: "[email protected]" <[email protected]>
Date: Wednesday, December 13, 2017 at 1:18 PM
To: Tim Shirley <[email protected]>
Cc: Nick Lamb <[email protected]>, "[email protected]" 
<[email protected]>, Jakob Bohm <[email protected]>
Subject: Re: On the value of EV



On Wed, Dec 13, 2017 at 12:58 PM, Tim Shirley via dev-security-policy 
<[email protected]<mailto:[email protected]>>
 wrote:
As an employee of a CA, I’m sure many here will dismiss my point of view as 
self-serving.  But when I am making trust decisions on the internet, I 
absolutely rely on both the URL and the organization information in the “green 
bar”.  I relied on it before I worked for a CA, and I’m pretty sure I’ll still 
rely on it after I no longer work in this industry (if such a thing is even 
possible, as some in the industry have assured me it’s not).

I think the focus on the edge cases has been because even the case you raise 
here (and below), can be demonstrated as technically flawed.

You believe you're approaching a sense of security, but under an adversarial 
model, it falls apart.

The historic focus has been on the technical adversary - see Nick Lamb's 
recently reply a few minutes before yours - and that's been thoroughly shown 
that EV is insufficient under an attacker model that is 'on the wire'. However, 
EV proponents have still argued for EV, by suggesting that even if its 
insufficient for network adversaries, it's sufficient for organizational 
adversaries. Ian's and James' research shows that's also misguided.

So you're not wrong that, as a technically skilled user, and as an employee of 
a CA, you've come to a conclusion that EV has value, and conditioned yourself 
to look for that value being expressed. But under both adversarial models 
relative to the value EV provides, EV does not address them. So what does the 
UI provide, then, if it cannot provide either technical enforcement or 
"mental-model" safety.

Are you wrong for wanting those things? No, absolutely not. They're perfectly 
reasonable to want. But both the technical means of expressing that (the 
certificate) and the way to display that to the user (the UI bar), neither of 
these hold up to rigor. They serve as placebo rather than panacea, as tiger 
repelling rocks rather than real protections.

Since improving it as a technical means is an effective non-starter (e.g. 
introducing a new origin for only EV certs), the only fallback is to the 
cognitive means - and while users such as yourself may know the jurisdictional 
details for all the sites they interact with, and may have a compelling desire 
for such information, that doesn't necessarily mean it should be exposed to 
millions of users. Firefox has about:config, for example - as well as 
extensions - and both of those could provide alternative avenues with much 
greater simplicity for the common user.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to