On Wed, Dec 13, 2017 at 4:46 PM, Tim Shirley via dev-security-policy <
[email protected]> wrote:

> As I understand it, Adam’s argument there was that to get value out of a
> revoked certificate, you need to be between the user and the web server so
> you can direct the traffic to your web server, so you’re already in
> position to also block revocation checks.  I don’t think that maps here
> because a lot of the scenarios EV assists with don’t involve an attacker
> being in that position.
>

Well, no, that's misunderstanding the point. The revocation checks
themselves are the placebo - because they are not hard fail, you don't get
benefit from doing them, precisely because they can be blocked. However,
they cannot be hard fail, because the failures are expected under
non-adversarial models. So because hard fail is not viable (and Rob's
recent sharing of OCSP status of CAs truly captures that better than a
thousand words on the topic), nor even if CAs had sound infrastructure is
it viable on the "internet at large" (that is, CAs are definitely the
worst, but even if they were perfect, it'd still be unacceptably bad), then
revocation doesn't provide value.

The same argument being applied to EV here is that the presumptive value of
EV is that it either provides technical mitigations OR the display to the
user provides sufficient value to allow for an informed decision. However,
the technical mitigations are non-existant, and the value of the display is
not sufficient enough on an adversarial model. In both cases, much like
hardfail, the structural deficiencies mean that the system is unreliable,
and because the system is unreliable, it should not be relied upon during
critical times. It is the weak link.

I know for non-security folks, this seems like throwing the baby out with
the bathwater, because it's "mostly good". But much like broken messaging
encryption is still broken, even if it's encrypted, the flaws of EV are
systemic, and mean you cannot and should not rely upon it (and of course
the EVGs disclaim reliance for a number of cases), and so the whole notion
of it is flawed. If you cannot rely on it, why rely on it?


>
> I know the question has been raised before as to why most phishing sites
> use DV.  Some argue it’s because OV/EV are harder for people with bad
> intent to obtain.  Some argue it’s because DV is more ubiquitous across the
> web and thus more ubiquitous on phishing sites.  But regardless of which
> (or neither) is true, the very fact that EV certs are rarely (never?) used
> on phishing sites is in and of itself providing protection today to those
> of us who pay attention to it.  I’d argue that alone means the seat belt
> isn’t worthless, and we should focus on building better seat belts rather
> than cutting them out and relying on the air bag alone.
>

"The very fact that EV certs are rarely (never?) used" is, of course,
unsubstantiated with data. It's a logically flawed argument - you're
presuming that non-existence is proof of non-existence. The irony is this
is the same argument made 10 years ago with certificates in general
(flashback proof -
http://voices.washingtonpost.com/securityfix/2006/02/the_new_face_of_phishing_1.html
) - that certificates prevented phishing, because you never saw phishing on
HTTPS.

Such arguments are both logically unsound and do not reflect on what
phishing/fraud are used for, or in general, how security works. It also
underscores the continued user-hostile message - which is to say, the user
is responsible for inspecting this UI, 100% of the time, if they want to be
safe from phishing. It doesn't align with the HCI research on positive
indicators, nor is it a fair or reasonable thing to ask of the average
user.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to