On 11/01/13 02:59 AM, Jon Callas wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Others have said pretty much the same in this thread; this isn't an MITM 
attack, it's a proxy browsing service.

There are a number of "optimized" browsers around. Opera Mini/Mobile, Amazon Silk for the 
Kindle Fire, and likely others. Lots of old "WAP" proxies did pretty much the same thing. 
The Nokia one is essentially Opera.

These optimized browsers take your URL, process it on their server and then send you back 
an "optimized" page.

Oh, I see. So basically they are breaking the implied promise of the https component of the URL.

In words, if one sticks https at the front of the URL, we are instructing the browser as our agent to connect securely with the server using SSL, and to check the certs are in sync.

The browser is deciding it has a better idea, and is redirecting that URL to a cloud server somewhere.

(I'm still just trying to understand the model. Yes, I'm surprised, I had never previously heard of this.)



That can be converted pictures, edits to the HTML proper, and so on.

The security characteristics are a mixed bag. They can send smaller pictures, 
scan for malware, but obviously they can't process your SSL connections. So 
they send the URL to the cloud server, make the SSL connection, and then send 
you the optimized page over SSL.

One could interpret the browser as being a combined service between the client on the phone, and the cloud support services, sure.

I think this interpretation would be unusual to any ordinary user. At a contractual level, it would also need to be agreed by both ends. We can easily ensure the end-users' agreement by means of the phone agreement, but it is less easy to imply the banks' agreement.

And, if a security case were to result in a bank being held for damages, it could easily expand to Nokia. Given the complexity of modern day online banking sites (that's a kind description) I can't see how they could be agile enough to avoid making mistakes.


Some of these browsers let you turn off the "optimizations" for SSL pages. The 
Amazon Silk browser does.

You can find information about Opera at:

<http://www.opera.com/mobile/specs/>

Here's articles with various concerns about Silk:

<http://www.zdnet.com/blog/networking/amazons-kindle-fire-silk-browser-has-serious-security-concerns/1516>

<http://www.theinquirer.net/inquirer/news/2203964/amazon-confirms-kindle-fires-silk-browser-tracks-users>

They're not doing certificate hinkiness. They are straightforward cloud 
services, or perhaps more formally proxy services. Heck, Google Reader is more 
or less the same thing, itself, albeit as an RSS reader than a web browser.

ok.


If one wants to get upset about them, there's plenty to grumble over. There's 
the explicit security concerns, concerns about tracking, concerns about 
misrepresentation to the users about what's really going on, and so on. The 
meta concern that smart people like us are even discussing it is also a 
security concern.

But they provide services that some people find valuable. I don't use them, but I wouldn't even 
call them a MITM, myself. When we say "MITM" we're eliding the word "attack." 
It's not an attack.


Yes, ok, it's not an attack if there isn't an attacker. Or more generally, is it an attack when the attack is done by self? "We have met the enemy, and he is us."

So more properly, it might be a breach-of-contract issue, where the contract to provide a browser that does the 'right thing' has been breached (in the view of the outraged).

Nokia will argue that their contract is clearly expressed, they can do this and they claim so in their contract. OK.

Question remains -- what to make of a vendor that does tricksy things with the implied secure browsing contract?

If Nokia can do this, can the other vendors? Why can't Firefox and Chrome start clouding the https connection?



iang
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to