On Monday, August 12, 2019 at 2:31:22 PM UTC-4, Wayne Thayer wrote:
> Mozilla has announced that we plan to relocate the EV UI in Firefox 70,
> which is expected to be released on 22-October. Details below.
> 
> If the before and after images are stripped from the email, you can view
> them here:
> 
> Before:
> https://lh4.googleusercontent.com/pSX4OAbkPCu2mhBfeleKKe842DgW28-xAIlRjhtBlwFdTzNhtNE7R43nqBS1xifTuB0L8LO979yhpPpLUIOtDdfJd3UwBmdxFBl7eyX_JihYi7FqP-2LQ5xw4FFvQk2bEObdKQ9F
> 
> After:
> https://lh5.googleusercontent.com/kL-WUskmTnKh4vepfU3cSID_ooTXNo9BvBOmIGR1RPvAN7PGkuPFLsSMdN0VOqsVb3sAjTsszn_3LjRf4Q8eoHtkrNWWmmxOo3jBRoEJV--XJndcXiCeTTAmE4MuEfGy8RdY_h5u
> 
> - Wayne
> 
> ---------- Forwarded message ---------
> From: Johann Hofmann <jhofm...@mozilla.com>
> Date: Mon, Aug 12, 2019 at 1:05 AM
> Subject: Intent to Ship: Move Extended Validation Information out of the
> URL bar
> To: Firefox Dev <firefox-...@mozilla.org>
> Cc: dev-platform <dev-platf...@lists.mozilla.org>, Wayne Thayer <
> wtha...@mozilla.com>
> 
> 
> In desktop Firefox 70, we intend to remove Extended Validation (EV)
> indicators from the identity block (the left hand side of the URL bar which
> is used to display security / privacy information). We will add additional
> EV information to the identity panel instead, effectively reducing the
> exposure of EV information to users while keeping it easily accessible.
> 
> Before:
> 
> 
> After:
> 
> 
> The effectiveness of EV has been called into question numerous times over
> the last few years, there are serious doubts whether users notice the
> absence of positive security indicators and proof of concepts have been 
> pitting
> EV against domains <https://www.typewritten.net/writer/ev-phishing/> for
> phishing.
> 
> More recently, it has been shown <https://stripe.ian.sh/> that EV
> certificates with colliding entity names can be generated by choosing a
> different jurisdiction. 18 months have passed since then and no changes
> that address this problem have been identified.
> 
> The Chrome team recently removed EV indicators from the URL bar in Canary
> and announced their intent to ship this change in Chrome 77
> <https://groups.google.com/a/chromium.org/forum/#!topic/security-dev/h1bTcoTpfeI>.
> Safari is also no longer showing the EV entity name instead of the domain
> name in their URL bar, distinguishing EV only by the green color. Edge is
> also no longer showing the EV entity name in their URL bar.
> 
> 
> 
> On our side a pref for this
> (security.identityblock.show_extended_validation) was added in bug 1572389
> <https://bugzilla.mozilla.org/show_bug.cgi?id=1572389> (thanks :evilpie for
> working on it!). We're planning to flip this pref to false in bug 1572936
> <https://bugzilla.mozilla.org/show_bug.cgi?id=1572936>.
> 
> Please let us know if you have any questions or concerns,
> 
> Wayne & Johann

Thanks to Tim Callan for making the case for keeping and even improving the EV 
UI in Firefox.  I want to add a few more points to this interesting discussion.

Some have responded there is no research saying EV sites have significantly 
less phishing (and are therefore safer) than DV sites – Tim has listed two 
studies that say exactly that, and I’m not aware of any studies that say the 
opposite.  I can tell you that anti-phishing services and browser phishing 
filters have also have concluded that EV sites are very unlikely to be phishing 
sites and so are safer for users.

Some opponents of the EV UI say it should go away because users don’t 
understand or know how to evaluate the specific organization information that’s 
displayed.  That’s true to a point – but an improved EV UI for Firefox could 
follow Apple’s example by showing a binary “identity/no identity” UI that would 
be easy for users to understand – green lock symbol and URL for identity (EV), 
black for no identity (DV).  If users want to see the specific organization 
information for the identity sites, it can be displayed with one click on the 
green lock symbol.  With a little user training (such as a pop-up for a few 
months explaining what the green UI means), users could understand – after all, 
users still remember “look for the lock symbol” for user security.

Remember that the need for knowledge of a website’s identity is not homogenous 
across users and uses.  For instance, users will have different needs to 
scrutinize identity information at different times.  Let’s look at currency, 
for example.  Currency contains many marks to validate its legitimacy such as 
watermarks, holograms, and the like.  The same person may treat currency 
differently based on context.  The same person might take cash out of the ATM 
machine with little close scrutiny but then look closely at the money received 
from a scalper at a sporting event or concert.  In the first case, the context 
is considered to be low risk, and in the second it’s considered to be high 
risk.  The security indicators are always there, so the relying party can take 
advantage of them when they’re warranted.

Likewise, some users have greater need for this knowledge.  In another offline 
example, travelers don’t actually scrutinize the names of fellow passengers who 
board their airplane – but their security is greatly increased by the fact that 
the airlines and TSA *do* scrutinize fellow travelers for them, remember the 
passenger names, and check the names against lists of known terrorists before 
letting them board a plane.  

That’s proactive security – checking for potential threats before letting a 
passenger get on an airplane.  In contrast, just relying on a browser filter to 
protect users against phishing is like letting people get on the plane 
anonymously and even take off, but promising to blacklist any passenger from 
future flights who sneaks on with a weapon and attacks the other passengers.  

That approach isn’t very effective – first, the bad guy has already harmed some 
passengers by the time of the blacklist, and second, if passengers can continue 
to board airplanes anonymously then any blacklisted passenger from an earlier 
flight can just get on another plane anonymously and repeat the exploit (just 
as anonymous phishers do repeatedly by constantly setting up new phishing 
websites which take time to be flagged by browser filters after the fact).  
Rewarding identity websites with a distinct EV UI is one way of providing user 
security proactively.

Instead of removing the EV UI entirely on the basis that users don’t understand 
the UI and don’t make security decisions based on the UI, maybe Mozilla should 
just simplify the EV UI and match what Apple did a year ago – show users the 
URL for the site they are at, but make the URL and lock symbol green for sites 
with identity (secured by an EV cert) and black for all other sites (including 
all DV sites).  If users click on a green lock symbol, they can then see the EV 
data if they want to.  And then Mozilla could do normal user training to tell 
them they are at safer sites when they see the green lock symbol and URL.  
(User training can be very simple but effective – many users still remember 
“look for the lock symbol” from the days when phishing used only http).  

Finally, some on this list have said that if user trust in EV sites increases, 
then phishers will just start getting EV certificates.  That’s possible, but 
remember one thing – once a phisher with an EV cert uses it for an exploit, the 
issuer will likely revoke the cert and add both the organization’s *name* and 
its phishing domains to its flag list – and the organization (a specific 
corporation identified by name, state of incorporation, and serial number) will 
never be able to get another EV cert from that CA, not even if the phisher 
changes to a different domain.  

That means an EV phisher will likely get one use out of each corporation it 
forms to get the cert, and then will have to form another corporation to get 
another EV cert, and so forth.  And CAs are currently setting up a common EV 
flag list so a corporation found to intentionally engaged in EV phishing 
probably won’t be able to get an EV certificate from another CA either.  That’s 
probably one reason why phishers don’t use EV certs today – it’s too expensive 
and time consuming if you can only use your corporation’s EV cert in one 
phishing campaign (and then your corporation can never get another EV cert 
because of its past record).

Likewise, reports of EV certs being offered on the dark web are actually fairly 
humorous – it means scammers are scamming other scammers.  Any phisher who buys 
an EV cert on the dark web can likely use it only once, and then the EV cert 
will be revoked and the phisher will be unable to get another EV cert for the 
same corporation – a pretty poor investment for the phisher, but maybe a good 
deal for the scammer who sells the EV cert on the dark web.    

Today there’s a huge wave toward protecting consumer privacy – in Congress, 
with the GDPR, etc. – but how can we protect user privacy on the web without 
establishing the identity of the websites that are asking for consumer 
passwords and credit card numbers? EV certificates provides this information 
and can be very useful for consumers to determine this identity. 

To close - browsers love data, and Mozilla has a lot of really smart engineers. 
 That’s why I hope Mozilla will come up with innovative ways to use EV data, 
and not just drop it.
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to