> It is our standard security nightmare.  Side A thinks it is Side B's
> problem.  Side B thinks it is Side A's problem.  In the meantime the
> user doesn't use the tech because it doesn't work, and the sides are too
> busy arguing to solve the problem.  So zero security is delivered.
>
> In this case, it is always the part closest to the user that has to do
> the mostest.  Maybe it's not a browser-tech or client-side-TLS issue,
> but *it is a browser issue*.

It is the browder's responsibility to present an SSL error to the user
in an accessible way.  However, browsers usually make certificates
visible to users and, therefore, it is assumed that users understand
certificates and basic certificate-related issues.  There is ongoing
research on this topic and I am not sure if anybody can state with
confidence whether this assumption is correct and whether Firefox's
interface is clear enough to understand.

> PS: Also, it is standard security doctrine in many places that when
> something isn't quite right that no information is returned.  Something
> to do with security advice of not being an oracle.

On the contrary, systems that fail silently can be both frustrating
(to the user) and very harmful (if the user assumes that the lack of
error means the success of a transaction).  If no information is
returned, it is still unclear whether the transaction should succeed
or fail.
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to