If the "fail verification only" option is not viable, I personally think we
shouldn't expose this to extensions.

I don't think the ability to experiment with new trust models for the web
is worth the price we'd be paying in malicious-extension risk, in
fracturing the ecosystem risk, or in general complexity risk.

Alex

On Wed, Feb 28, 2018 at 11:54 AM, Tom Ritter <[email protected]> wrote:

> On 27 February 2018 at 10:23, Alex Gaynor via dev-security-policy
> <[email protected]> wrote:
> > A reasonable compromise that jumps out to me is allowing extensions to
> make
> > an otherwise-secure connection fail, but not allow them to rehabilitate
> an
> > insecure connection. This would allow experimenting with stricter
> controls
> > while avoiding some of the really scary risks.
>
> I'm obviously the person who filed that bug and began this discussion,
> but I think this compromise is one of those compromises where no one
> gets what they want.
>
> Firefox gets a complicated API that gets shimmed into
> security-sensitive code and can disrupt TLS handshakes.
>
> Web Extension developers get something that doesn't do the most
> valuable thing they would like to do: experiment with new Server
> Authentication modes.
>
> Of the examples I gave (Cert Patrol, Perspectives, Convergence, DANE,
> DNSSEC-Stapling) - every single one of them would not actually allow
> experimenting with Server Authentication modes if all they could do is
> reject certificates and not accept them. And in many cases, it will
> completely prevent any such experimentation, because you can't ask a
> CA to sign a cert saying "No really, I just want you to include this
> weird data under this weird not-documented/not-standardized x509
> extension".
>
>
> Unless people show up claiming that that functionality is sufficient
> for them to do things they want to do; I don't think it would be
> valuable to implement this compromise.
>
> -tom
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to