If the government of Kazakhstan requires interception of TLS as a condition
of access, the real question being asked is whether or not Mozilla products
will tolerate being used in these circumstances.

Your options are to block the certificate, in which case Mozilla products
simply become unusable to those subject to this interception, or not block
the certificate.

I certainly think that Mozilla should not distribute the MiTM root or do
anything special to aid in its installation.  I believe policy already
makes clear that NO included root (commercial or government) is allowed for
use in MiTM scenarios and I believe that policy should be held firm.

I do believe that as it is manually installed rather than distributed as a
default that it should continue to override pinning policy.

This is an accepted corporate use case today in certain managed
environments.  The dynamic is quite different for an entire people under an
entire government, but the result is the same:

One has to choose whether to continue serving the user despite the adverse
and anti-privacy scenario, or if one simply won't have their products be
any part of that.

Much has been said about the TLS 1.3 design hoping to discourage use cases
like this, but the reality is what I always suspected: some enterprises or
governments actually will spend the money to do full active MiTM
interception.

Let's posit what might happen if Mozilla made their products intentionally
break for this use case.

Further, let's stipulate that every other major browser follows course and
they all blacklist this or any other nation-state interception certificate,
even if manually installed.

Isn't the logical outcome that the nation-state forks one of the
open-source browser projects, patches in their MiTM certificate, and
un-does the blacklisting?  I think that's exactly what would happen.  The
trouble is, there's no reason to expect that the fork will be maintained or
updated as security issues are discovered and upstream patches are issued.
We wind up with an infrequent release cycle browser being used by all these
users, who in turn get no privacy AND get their machines rooted
disproportionate to the global population.

I do definitely support a persistent UI indicator for MiTM scenarios that
emphasizes on-screen at all times that the session is being protected by a
non-standard certificate and some sort of link to explain MiTM and the
risks.

On Thu, Jul 18, 2019 at 12:04 PM Wayne Thayer via dev-security-policy <
[email protected]> wrote:

> On Thu, Jul 18, 2019 at 10:00 AM Ryan Sleevi <[email protected]>
> wrote:
>
> >
> > On Thu, Jul 18, 2019 at 12:50 PM Wayne Thayer via dev-security-policy <
> > [email protected]> wrote:
> >
> >> Finally, I'll point out that Firefox implements public key pinning via a
> >> preloaded list of sites, so the reported MITM will fail for those:
> >>
> >>
> https://wiki.mozilla.org/SecurityEngineering/Public_Key_Pinning#Implementation_status
> >
> >
> > Wayne,
> >
> > I don't believe this is correct. Locally-installed trust anchors bypass
> > pinning, as they're indicators of explicit user action (or coercion) to
> > configure. As a consequence, unless the pinning mode is set to 2. Strict
> > (which will typically preclude the use of a number of anti-virus
> products,
> > for better or worse), which it is not by default, the MITM will not fail.
> > From the Firefox point-of-view, it's completely transparent whether the
> > MITM is being done by local security software or a nation-state
> >
>
> Yes, I had just realized that - in the default state, pinning in Firefox
> will not block this type of MITM.
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy
  • Re: Nation State MITM CA'... starosekpd--- via dev-security-policy
    • Re: Nation State MIT... Wayne Thayer via dev-security-policy
      • Re: Nation State... Wayne Thayer via dev-security-policy
        • Re: Nation S... Matthew Hardeman via dev-security-policy
          • Re: Nati... Andrew via dev-security-policy
            • Re:... Matthew Hardeman via dev-security-policy
              • ... gewalopdrbat--- via dev-security-policy
              • ... healthyelijah--- via dev-security-policy
              • ... Corey Bonnell via dev-security-policy
                • ... Matthew Hardeman via dev-security-policy
                • ... jfb1776--- via dev-security-policy
                • ... whateverusernameforme--- via dev-security-policy
            • Re:... wolfgang.richter--- via dev-security-policy
              • ... mucius--- via dev-security-policy

Reply via email to