Am 22.09.2014 um 14:56 schrieb Henri Sivonen:
> On Wed, Sep 17, 2014 at 6:20 PM, Richard Barnes <rbar...@mozilla.com> wrote:
>> -- Use of ciphersuites with forward secrecy
> Yes, but I think it makes sense to go further with ciphersuites. At
> minimum, RC4 should not qualify, but given how easy it is to enable
> AES-GCM if you can enable TLS 1.2 per the earlier point, why not
> require an AEAD suite (i.e. AES-GCM or an upcoming ChaCha20 suite) and
> set aside all perceived or actual CBC problems while at it?
>
I think 3DES should not qualify, too. It's just the less worse
alternative of RC4 to support IE 8.

>> -- Content Security Policy (?)
> This is a bit problematic, because CSP can be configured in so many
> ways resulting in different levels of meaningful security. Do you mean
> we should require just reward any effort to use CSP or that we should
> require specific CSP features to be in use?
The best would be, if you prevent XSS with unsafe-inline. But nearly
every tool on the web uses inline scripts, so this would break
compatibility.
We could warn if a http resource is included in CSP. Admins should
implement a server side mixed content blocker using CSP if they need to
allow external resources (e.g. img-src https://*:443).

>
>> We could invent new UI for this (e.g., a green lock icon), or we could 
>> overlay these requirements on the EV criteria.
AFAIK green lock is the only indicator for EV on Firefox OS / Android.
This could be confusing. Blue is not used, isn't it?
So there would be gray/black for normal, blue for high-security and
green for high-security + EV (how about low-security EV?).

Kind regards
Jonas

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to