I can't believe anyone actually worries about captive portals, but there are 
lots of things I don't understand so....

Snark aside, there is a flaw in the reasoning that Adam (imperialviolet.org) 
and the rest of the good folks at Google ‎have put forth regarding OCSP. The 
logic boils down to a perfect scenario in which OCSP fails perfectly, with the 
conclusion being that OCSP request/response isn't very good and only OCSP 
stapling makes sense to pursue. 

That argument may hold for certain MITM cases, but we have to look beyond MITM. 
The much bigger problem Internet security faces is the pwnage of your device 
and the theft of your personal information, your friends' information, your 
credit card numbers, and the money sitting in your bank account. Or maybe I 
just want to use your webcam?

That, to say nothing about your employer's information. Why waste my time 
trying to launch an MITM something-or-other when instead I might trick you into 
installing my latest malware package? If that gets me access to the credit card 
processing system....

Whatever the case may be, the attack is made easier if I can pretend to be a 
site that you're likely to trust, and if I have a SSL certificate you'll 
probably trust it that much more.  And if the cert chain goes with a private 
key that someone extracted using Heartbleed, so what? Who's going to stop me?
‎ 

The problem we need to solve is how to keep criminals, thieves, and governments 
from using other people's keys and cert chains for nefarious purposes. OCSP 
stapling won't do it. CRLs are ancient history. Convergence ‎and other schemes 
are years away from being realized. Like it or not OCSP responders are the only 
viable option at this point.

Getting back to Phillip's original question: do we need to turn on hard-fail? 
The short answer is yes. The long answer is we need to move in that direction 
now so that turning it on won't break the Internet any more than it already is.


  Original Message  
From: Peter Eckersley
Sent: Monday, April 21, 2014 6:06 PM
To: Phillip Hallam-Baker
Cc: [email protected]
Subject: Re: Turn on hardfail?

That would have the {justifiable,entertaining,controversial} result of
causing any captive portal that uses HTTPS in captivity to fail. Sounds
like an interesting proposal if you can persuade all the browsers to do it
simultaneously, but if Mozilla does it in isolation, it would unfortunately
just drive users to other browsers.


On 21 April 2014 10:12, Phillip Hallam-Baker <[email protected]> wrote:

> Given the current Heartbleed situation, wouldn't it be appropriate to
> turn on hard fail for revocation checking so that unknown status
> results in the cert being rejected.
>
> I am seeing people suggest that a CA be dropped from the root for
> their alleged improper handling of revocation. If revocation matters
> so much that it must be enforced on CAs then it matters enough to turn
> on hardfail for a major server coding error.

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to