On Mon, Dec 18, 2017 at 4:09 PM, Wayne Thayer <[email protected]> wrote:

> Thank you Ryan for raising this question, and to everyone who has been
> contributing in a constructive manner to the discussion. A number of
> excellent points have been raised on the effectiveness of EV in general and
> on the practicality of solving the problems that exist with EV.
>
> While we have concerns about the value of EV as well as the potential for
> EV to actually harm users, Mozilla currently has no definite plans to
> remove the EV UI from Firefox. At the very least, we want to see
> Certificate Transparency required for all certificates before making any
> change that is likely to reduce the use of EV certificates.
>
> Is Google planning to remove the EV UI from desktop Chrome? If so, how
> does that relate to the plan to mark HTTP sites as ‘Not secure’ [1]? Does
> this imply the complete removal of HTTPS UI?
>
> While we agree that improvements to EV validation won’t remove many of the
> underlying issues that have been raised here, we hope that CAs will move
> quickly to make the EV Subject information displayed in the address bar
> more reliable and less confusing.
>
> - Wayne
>
> [1] https://security.googleblog.com/2016/09/moving-towards-
> more-secure-web.html
>

Our plans regarding the overall status of HTTP are kept at [1] , which
explains the rationale as well as linking to other research. Notably, this
is framed as states of "secure" and "not secure", aligning with the bare
minimum of transport security, and with an end state of showing negative
indicators for not-secure connections.

As shared in past CA/Browser Forum meetings [2][3][4][5], it should come as
no surprise that we continue to explore with the EV UI treatment in a way
that best reflects the guarantees it provides. We intentionally removed the
EV UI indicator from our mobile products, and continue to include
significant UI experiments [6][7][8] to help users better understand the
information presented. In a similar vein, when unintentional bugs have
resulted in EV status being denied for some sites, whether by CA or by
other conditions, or when CAs themselves find their certificates have never
been granted EV, we've been surprised at the delays in which these changes
are landed versus when users or CAs notice and report them.

As there are a number of changes, both announced and in-development,
related to SSL/TLS improvements, we're being mindful of the ecosystem and
the potential for change. Certainly, seeing Certificate Transparency
required for all is an important and shared goal in our efforts to improve
security. However, research such as James' shows the danger in granting
arbitrary control over security UI [9], and we've removed other situations
where arbitrary data was presented to the user as trustworthy [10]. Ian's
work is consistent with our own experiences, and mitigating that introduces
significant complexity for questionable security - which is somewhat at
odds with our Core Principles [11].

It's unclear if Mozilla's remarks are one of principles or priorities -
that is, whether EV is perceived to provide a value useful to users and the
ecosystem, or whether it is one of prioritization, as Mozillans, like
Googlers, continue to work through a long backlog of CA incidents, audit
reports and issues, and high-value security improvements, such as
Certificate Transparency, the successful deprecation of SHA-1, and work on
TLS 1.3. If the former, it helps understand what considerations should be
afforded the research. If the latter, it may present collaborative
opportunities to explore changes to the UI that better reflect the
guarantees users are afforded.

[1]
https://www.chromium.org/Home/chromium-security/marking-http-as-non-secure
[2]
https://cabforum.org/2016/10/19/2016-10-19-20-f2f-meeting-39-minutes/#Google
[3]
https://cabforum.org/2016/02/17/2016-02-17-minutes-of-f2f-meeting-37/#Google
[4] https://cabforum.org/2014/09/16/2014-09-16-18-f2f-meeting-33/#Google
[5]
https://cabforum.org/2015/10/07/2015-10-07-face-to-face-meeting-minutes-meeting-36-istanbul/#Google
[6] http://www.allenpike.com/2014/burying-the-url/
[7] https://research.google.com/pubs/pub45366.html
[8] https://research.google.com/pubs/pub41927.html
[9] https://textslashplain.com/2017/01/14/the-line-of-death/
[10] https://bugs.chromium.org/p/chromium/issues/detail?id=544244
[11] https://www.chromium.org/developers/core-principles
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to