On 19/01/2016 10:15, Ryan Sleevi wrote:
On Mon, January 18, 2016 9:05 pm, Eric Mill wrote:
  Really? Given your last few years of experience, if you could time travel
  back to 2012, you would tell Past Ryan Sleevi to make a different decision
  at that time about adding a flag for MD5 support in the enterprise?

Yes.

Was there significant observed negative fallout of that decision?

Yes.

...


Only to an extent. You're again presuming the enterprise MITM box, which
may show for sites like Amazon (of course, it would not show at all for
enterprise MITM boxes that blocked it). This would not, however, show up
at all for the case of using UAs to access internal enterprise resources,
which is a far greater (by volume of users, though necessarily not volume
of certificates) use case.

Indeed.  In our small enterprise, I have observed the following sources
of non-public weaker certificates:

1. Embedded https administration interface servers in difficult to
  upgrade hardware (such as otherwise functional HP printers long past
  warranty, with the added sting that downgrading to even older
  firmware was the only solution for a major vulnerability).

2. An internal CA, which has been almost completely supplanted by a new
  one now.  It used SHA-1 solely for compatibility with older clients
  and may survive in that role as long as such clients are needed for
  special tasks.

3. MITM-box like behavior in endpoint antivirus programs (these default
  to intercepting SSL/TLS traffic to scan it for viruses.  I have not
  checked the algorithm used to signing the pseudo-certificates used
  for traffic that never leaves the computer on which the signature is
  checked, and this is going to be brand-specific anyway.

4. E-mail certificates compatible with Outlook 2007.  That one is a
  real bummer because of the upgrade costs.  And the lack of
  confidentially when using "cloud-focuses" programs that do too much
  telemetry.



My point is that the over-reliance on metrics underestimates (on orders of
magnitude) the impact to enterprises, which is why IF a user agent wishes
to support enterprises (and it's a complex question of business and
product direction), more nuance is needed.

Indeed.  In any security conscious environment, telemetry is an alias
for industrial espionage and can easily get a product thrown out if
blocking the telemetry isn't trivially easy and reliable.


...



Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to