Jeremy Morton wrote:
> Nelson B wrote:
>> Jeremy Morton wrote:
>>> Re: bugzilla bug #383183 comment #52:
>>>
>>> So just to confirm, you're saying that there is no difference in 
>>> security between submitting a username/password via HTTP and via HTTPS 
>>> with a self-signed SSL cert?
>> http is vulnerable to passive attack ("sniffers").
>> https with self-signed certs is not vulnerable to passive attack.
>> That is the only essential difference.
>> Both are vulnerable to active attack.
>> Both are *trivially* attacked by MITM attackers.
> 
> Right, I realise all of that.
> 
> I guess my question is whether you have any reliable statistics as to 
> what kind of number of passive attackers there are out there vs active 
> attackers.  Are there literally virtually no passive attackers?  If so, 
> not distinguishing HTTPS w/ self-signed in the chrome would make sense. 
>   However if there are a significant number, that 'essential difference' 
> is still important, no?

No.

The vast majority of attacks today are active.  One of the few types of
places where passive snooping opportunities still exist is at WiFi hot spots.

15 years ago, Ethernet networks (the most common kind in corporate settings)
all used "hubs" (technically: multi-port repeaters) that retransmitted all
packets on the network to all systems connected to the network.  Sniffing
was rampant in those days.  But today, Nearly all "hubs" have been replaced
by switches, which selectively route packets based on IEEE 802 MAC addresses
to their next hop, and most systems with Ethernet connections see only
their own traffic and true broadcast packets.  Unicast packets just aren't
sniffable in most Ethernets today.  Yes, some switches can be programmed to
copy all traffic to a single port for sniffing purposes, but that's an
active attack - it requires control of a network node.

Most users of cryptography (all forms, not just https or SSL) mistakenly
assume that "encrypted" means that no one but the intended recipient can
read the traffic in the clear.  (Many mozilla developers even make that
mistaken assumption.)  But we know that's simply not true for
unauthenticated encryption.

If we give the users a sign (an indicator) that the traffic is encrypted,
even when it is unauthenticated, the vast majority of users will think
"Oh, my traffic is encrypted, so I have no worries; no one can read my
traffic except the intended recipient".  We want to avoid misleading our
users in that way.

Since the users tend to understand any such indicator as meaning that
their traffic cannot be read in the clear except by the intended
recipient, we want the indicators to mean exactly that.  That is why
we do not propose to offer an indication of encryption without authentication.

-- 
Nelson B

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to