I am a user.  I am worried about MITM attacks.

Unlike most users, I'm technically and legally savvy enough to know:
1) Why to perform my due diligence
2) How to perform my due diligence
3) How to add the root into my store

However,  I have additional problems that I can't deal with through
the standard Mozilla user interface (or any browser that I have access
to's interface, realistically).

For example, I cannot easily see who issued a given certificate, or
what root it chains up to.  I cannot apply an attribute to a root
certificate saying "not a financial-services certification authority".
 I cannot see details about the chain without having to go through
multiple difficult-to-get-to windows.

If it wasn't already obvious from the past five years that I've been
on this list, I resent the way that Mozilla's developers have chosen
to make it continually more difficult for me to do what I need to do
to ensure my own security, by concealing more and more information
(there was the "blue site name" bar, which was disabled by default in
FF3, which provides one-click access to the information I need --
whereas the lock icon at the bottom requires a double-click).

Further, I resent the fact that there's a "this web site does not
supply identity information" line.  THAT IS WHERE I NEED THE SUBJECT
TO BE PRINTED.  I honestly don't care one whit that it's not an EV
certificate.  I need the Subject, because I need to see at one glance
if it's a "Domain Control Verified" certificate, not have to
double-click the lock and then click "View Certificate".  If you want
to point out that this is not extended-validation, that's fine -- but
for the sake of the users, don't try to "protect" them from
"unverified information".

It is my unshakable belief that if a user EVER has to examine the
certificate itself, or go into the interface to do so, the goal of the
user interface (which is to provide information) has failed.  This is
NOT, however, a statement that the ability to view the certificate
should be removed!  (Especially given Mozilla's track record at
creating useful user interfaces for certificate data presentation --
every time they've done something right, they've gone back two
revisions later, declared it "useless", removed it, and put in
something even more wrong.)

I believe that CA branding on the UI is necessary, so that the user
can do the due diligence which Mozilla is arguably NOT doing on the
user's behalf, no matter that Mozilla appears to claim that they are
by requiring audits to WebTrust criteria as a prerequisite to joining
the "big CAs club" of Mozilla's trust list.

-Kyle H

On Sat, Dec 27, 2008 at 11:26 AM, Ian G <i...@iang.org> wrote:
> On 27/12/08 20:01, Eddy Nigg wrote:
>>
>> On 12/27/2008 05:38 PM, Florian Weimer:
>>>>
>>>> Isn't that, by itself, a very good reason to take immediate action?
>>>> Security should be default-fail rather than default-pass.
>>>
>>> This is not about security, this is about the presence or absence of
>>> an obscure browser warning.
>>
>> Huuu? Have you understood the issue at all? I'm not sure...however it's
>> not about browser warnings. This is about security proper. Or how else
>> would you explain an MITM attack?
>
>
> Security proper is about risks and threats and costs for end-users.  Ask
> them whether they are worried about an MITM attack :)
>
> Anyway, old debate, not going to be solved today.
>
> iang
> _______________________________________________
> dev-tech-crypto mailing list
> dev-tech-crypto@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-tech-crypto
>
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to