On 17-Mar-09, at 7:55 AM, Ian G wrote:

I'd like to ask a couple of questions to those people closer to the development effort. I spent some hours trying to get a couple of users up and going on the weekend using client certs and ff/tb combinations. On the Firefox side, there were problems because of the popup madness where every click resulted in request(s) to confirm the certificate [1].

Doing some research on bugzilla, it transpires that the default is to always ask before using a client certificate, because otherwise we have a privacy issue. <https://bugzilla.mozilla.org/show_bug.cgi?id=295922 > Now, this is a bit of a killer issue, because the certs probably have info in them, and there are obvious harvesting possibilities [2] [3].

However, the fix is to turn on the "ask always" default, which makes client certs unusable [4] because every click there is a request for confirmation, and sometimes there are several clicks.

So we have seem to have a choice: client certificates are unusable because they always ask, or they are unusable because they always leak private info. There is no middle ground.

Have I understood it correctly so far?

Starting from a point of basic agreement that client certs need to be a lot more usable than they currently are, I'll nevertheless point out that your experience isn't the typical one, here. As you mention in your footnote, there appears to be some brokenness with your testing server wrt SSL sessions. The initial client cert auth should be used to establish an authenticated session, which the server should persist for some period of time thereafter, making subsequent identifications less onerous. Nelson has commented on bugs of this ilk before, I hope he's around for this thread as well.

Having said that...

There is some discussion that there should be a "whitelist" management along the lines of the tuple {site, cert, status}. And some juicy UI to manage that.

So the next questions are: is whitelisting decided, and how far advanced are we on that? (Or, is there some alternative?)

I started this reply with "client certs need to be a lot more usable." This is something I wanted to do for Firefox 3.5 (née Firefox 3.1) but other obligations kept me from doing much work on that release in the early "feature planning" stages. It continues to be something I'd like to improve in Firefox Next, specifically in the areas of:

 - Remembering certs used on a particular site for future interactions
 - Improving the cert selection dialog so that it can be read by humans
- Reviewing the cert management/installation UI to see if we're really serving our users' needs there (should every cert pushed be installed without prompting?)

I think the implicit 4th step there is evangelism, because I think they're a much more robust identification/authentication technology than login+pw, or most of login+pw's would-be replacements. But I also think there's no point evangelizing the current state of affairs, for the reasons and frustrations you've already outlined. :)

Finally, and this is the really difficult question: what are the policy implications here?

Need there be? Certainly we should avoid annoying our users with endless prompts AND we should avoid compromising our users by enabling new forms of invisible tracking, but there's a healthy middle ground of user choice that can be clearly understood and communicated ("Always use this certificate for this site") that seems to me, perhaps naively, not to be overloaded on policy. What am I overlooking?

Cheers,

Johnathan

---
Johnathan Nightingale
Human Shield
john...@mozilla.com



--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to