Hello,
Could someone make a few changes to the Firefox Mobile client certificate
handling? Client certificates are an awesome authentication mechanism that
is much more secure and easier to use than passwords, and supported in most
browsers. After seeing client certificate auth working with my previous
employer, I started putting it on all my sites. Sadly, there are a couple
issues with the implementation in Firefox Mobile (not desktop) making them
difficult to use.

First, when visiting a site requiring a client cert, the "Remember this
decision" checkbox doesn't seem to work. Whenever you open a new page
(unless a connection was kept alive) you still get prompted. This means
using a certificate enabled website gets really annoying.
https://bugzilla.mozilla.org/show_bug.cgi?id=1081711

Second, although cert issuance works great, you can't remove a certificate
you were issued. So if you have enrolled a few certs, your certificate list
gets cluttered and there's nothing you can do about it, even after trying
to delete all private data in the Settings->Privacy menu. So it becomes a
privacy bug too. I haven't filed this one in bugzilla, because I'm not sure
the right way to fix this. Ideally, you'd have a certificate menu where you
could list and delete your certificates, but if they were deleted with
"Site settings" or "Saved passwords" I think that would work too.

You can test this here: https://www.scriptjunkie.us/getacert

More than ever before, people are realizing that the typical password-based
authentication systems need to be replaced. Every day attackers get victims
to enter their passwords into phishing pages or guess or brute-force their
passwords... often leading to account hijacking or the theft of sensitive
personal information or files. Not to mention the headache of coming up
with and remembering complex passwords. So most people re-use them and get
hacked again. Client certificates are free of these issues, being
inherently re-usable, not needing to be remembered and having more than
enough entropy to be secure against all the common password attacks.

Also, given the news over the past year or so, a lot of people are
concerned about NSA (or Iranian or French...) spying on their personal
information. All of these have been linked to intercepting HTTPS
connections, usually with fraudulently obtained certificates
<https://bluebox.com/blog/technical/questioning-the-chain-of-trust-investigations-into-the-root-certificates-on-mobile-devices/>
from one of the hundreds (or thousands) of trusted root and intermediate
certificate authorities. But when a site uses client certificate
authentication, it can verify the connection against the client's key, no
longer just relying on trusted CA's, stopping these attacks.

So help us stop hackers, save users, freedom, and justice, and make client
certs work! Also, if you fix one of these issues, you'll be my hero, and
I'll buy you lunch if you ever come by San Antonio.

Thanks,
Matt

-- 

http://www.scriptjunkie.us/
_______________________________________________
mobile-firefox-dev mailing list
[email protected]
https://mail.mozilla.org/listinfo/mobile-firefox-dev

Reply via email to