Several thoughts about the paypal spoof site that uses a redirector from
the real paypal site.

1. I didn't ever see any EV or even non-EV SSL UI chrome indicators at
the same time as the spoof site was displayed, so I don't see this as
a failure of UI for SSL or EV.  But I was using FF3 with a very vanilla
configuration (new profile), and if there's some other configuration
that FF3 users use in which there is some confusion about whether the
spoof site is legit paypal or not, please let me know how to configure
my FF3 to see it.

2. I also don't see this as reflecting negatively on EV or SSL at all.
Some of the sentiment that has been expressed in this discussion seems
to be disgust that EV doesn't assure that the site is completely "safe
and secure" for the browser user, against such things as XSS attacks.
But that's not it's job.

Remember that SSL's job is to ensure the user of a secure *channel*
between the user's own computer and the computer with the rightful
identity that the user specified in the URL that he used to open the
channel.  EV strengthens the claim of authentication of the identity of
the computer on the other end of the channel.

SSL & EV indicators in the chrome are a statement about the *past*.
They say "The channel(s) through which your request was sent, and through
which the page you now see came to you, were authenticated to be truly
connected to the site specified in the URL, and not some impostor site.
The content was neither modified nor externally visible as it passed
through that channel from the server site to your browser."  These are
statements about properties of the *channel* (e.g. opaque, impenetrable,
other end is at a known place).  That's all that SSL has ever said.

Neither SSL nor EV mean:
  - the server to which you connected is free of viruses and malware
  - the server to which you connected is free of XSS vulnerabilities
  - the server to which you connected is run by moral and upright people
  - the web page you just received won't crash your browser
  - your own computer is free of viruses and malware
  - the stock market won't crash tomorrow
  - you won't become unemployed tomorrow

Any and all of those things might be part of what the user wants to know
in order to feel the he, or his browser, is "safe and secure", but SSL and
EV are about securing *channels*, and none of those statements above is a
statement about a channel.

One more thing that the SSL or EV UI indicators do NOT mean (presently) is:

  - When you click a link or push a button on the page that you just got
    through a secure channel, you are assured that your next http request
    and response will go through a similarly well secured channel.

Such assurance is not a within the scope of responsibilities of a channel,
and those indicators are about the state of the channels used in the past.

But users do seem to *want* and *expect* that assurance, that their browser
will use only secure channels for transactions subsequent to a prior
transaction that used a secure channel.  So, it's not an SSL issue, but is
a browser issue, dealing with the browser's willingness to enforce the
user's expectations regarding the level of *channel* security on a series
of transactions that the browser initiates.

The issue Kyle raised, of lack of indicators of transitions from pages
received via EV+SSL to pages received via channels that either are non-EV
SSL or non-SSL, has to do with whether the browser's attempts to ensure
uniform channel security through the steps of a transaction will meet the
user's expectations for "secure" operation, or not.  Whether the browser
does that or not is not a measure of SSL or EV's ability to do their jobs.

Johnathan Nightingale wrote, On 2008-07-04 06:53:

> I understand, therefore, why you'd be inclined to ask if we should  
> have some kind of alert when you leave an EV page, but I resist doing  
> that for a couple reasons, chief among them being questions about  
> whether a dialog would actually change anything.  There is reasonably  
> ample evidence that dialogs that have "ok" as their only really  
> "useful" option tend to be quickly ignored by users, at which point  
> they stop having any impact on user behaviour.  

I completely agree that dialogs with only one button are not very valuable
because they give the user no real control, no real choices over subsequent
events that may impact his security.

And, knowing that FF3's existing https->http transition warning dialog is
indeed such a one-button wonder, I'm OK with it being disabled by default.
Maybe that button should be labeled "Bummer!" or "I forgive you".

But I don't accept that transition interception dialogs must necessarily
be powerless, functionless UI features.

If we ask: "Why does that dialog have only one button?" we find that the
answer is that the code that decides to display that dialog is code that
runs AFTER the new channel has been selected, after the http request has
been sent, and the http reply has been received -- in other words, after
the damage has been done.  That carefully worded "You are about to leave
a secure page" really means "we've already sent your info out insecurely
to god-knows where, and now we're just confessing that fact".

As long as the logic for that dialog remains after-the-fact detection logic,
the only purpose that would be served by a Cancel button would be to tell
the browser "Go ahead and conceal from me the damage you've already done
to me.".  Not exactly helpful to the user's sense of security.
(This is why I suggested the button label "I forgive you".)

The first browser to use SSL, FF3's predecessor, detected that it was
about to begin (but had not yet begun) to use an insecure connection,
when the previous page was loaded over a secure connection.  It displayed
a dialog BEFORE starting the new connection, which gave the user a real
and meaningful choice, to prevent the insecure connection, or to continue
with the insecure connection.  I think that's what Kyle and others
(including me) would expect from such an https->http dialog, the ability
to stop the damage BEFORE it's done.

There's a bug/RFE, asking that Mozilla's browser work that way too.
It's bug 62178 (yes, a mere 5 digit number :).  It's filed against PSM,
but it's really a browser architecture issue whose scope is much wider
than just PSM.  I hope sincerely it will get some traction.

_______________________________________________
dev-security mailing list
dev-security@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security

Reply via email to