On 21/08/2009 20:30, Ellen Chan wrote:
Hi again Ian,

Yes I can appreciate that there are priorities and you're reluctant to
get into something overly complex.


Well, I won't be coding it :) I'm just offering my opinion, which we might recognise as being polarised against the majority here. Indeed: http://iang.org/ssl/h1_the_one_true_cipher_suite.html

I would summarise it that 99.99% of users of Firefox will make the wrong assessment, and the remaining portion (who are developers) will know that the information is not indicative.

So one choice in security terms might be to only supply the specifications of the connection buried in some debug interface... Or in marketing terms, to dress it up like blinky lights so that it looks cool, but is fashionable like a paint job on a car. Personal choice, unlike the brakes, which are carefully hidden away from the eyes.


...
It
would be ideal if Firefox could steal a trick from putty where the
user can set lower bounds--say allowing the user to specify a lower
bound on the algorithm/strength used for each of authentication,
agreement, and encryption. That's an ideal though, and short of that,
it would be nice simply to be able to know.


That I would see as a way to generate annoying support requests, as users discover more elegant ways not to communicate :) There aren't many good reasons to give users flexibility in crypto negotiation, and plenty of bad reasons.


...
As for the small devices with weak processors, the question there is
really whether or not security should be compromised in the name of
efficiency.


I would think it different. There will be a compromise regardless, the question is which do you prefer: denial of service against all mobile users, or reduction of security spread across all users, mobile and net.

In the 1990s, it was fashionable to ignore denial of service, but maybe it is coming into fashion again?


In such cases I think it's probably even more important to
display the values to the user so that no-one makes the mistake of
believing those devices are actually good enough for secure
applications.


"Is actually good enough?" What does that mean? How can we make that judgement?

In general, to make such a statement, we would have to ground it in an application or business. E.g., we could suggest "protect the average online banking transaction" in which case probably anything vaguely modern works, as long as it is effective against attacks like phishing.

Probably you are leaning towards a judgement that delivers a fully secure point to point encryption channel with a known party. But without a "business reason" behind that, you will never know if the delivered security is making the right compromises. (This is one of the problems with all SSL, the usage case and threat models were wrong, and thus questions such as "how much security" are not possible to answer comfortably.)

iang
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to