Sven Anderson wrote:
Ian G, 14.02.2007 00:40:
But, that's blue sky. About the only thing that you could do right now is say:

    CA TrustMeDoc claims BillyBlue is behind http://BB.com/

I don't know where "safe" or "trustworthy" fits in ...

Well, as you know SSL is not only checking the authenticity but also
provides confidentiality. So the "safe" just refers to the latter, that
the line is encrypted, and nobody else but the correspondent can read it.


If you can get the user to accept that definition of safe, this works. If not, not. Has the user ever been asked?

(To clarify, I'm not saying "ask the user...," I'm just pointing out that unless you asked the user, you won't be able to support that the user accepts the definition, and therefore the definition is useless...)


That's why i think, that the padlock was only a mistake in terms that it
has been misunderstood. It just tells me, that the _line_ is safe, not the
correspondent.


Right.

There is a tendency to go from purely technical statements and then to rewrite them so as to be easily understood by the consumer. Normal marketing, really.

To the extent that the consumer is educated and is responsible, this is ok.

For example, a driver of a car is responsible. That's what the driver's licence is about. In this regime there is no problem telling a potential car driver that the car goes faster than a racing car ... because no matter what, the driver *is* responsible.

To the extent that there is *no danger*, then it's also plausible to make silly claims.

Etc, etc.

The problem that arose in the certificate area is that it was common practice from the early days to state that secure browsing was safe, and you were safe to enter your credit card details.

In this case, it failed on three counts:

1. the user was not competent to take on that responsibility by objective standards,
   2. there was some danger, and
   3. the statements were wrong at some level.

All of which was fine for the first decade of the web, because the "danger" was originally low, and then only became high, e.g., phishing, around 2003.

Hence, some of us have been warning the CAs to take off *all* claims of vagueness such as Trust, Safety, Secure, etc. This has been going on since around 2003, and I vaguelly recall that Verisign did in fact come to this conclusion as well, and removed claims from its website.


I would like to have both information presented seperately:
1. is the line encryped?
2. who tells me what about the correspondant node?


That's reasonable, yes. The browser can make a fairly definate statement on those two questions, as written.


How to present these two things with the least potential of
misunderstanding (also for Alices and Grandmas) I have no clue, and is
most probably a tough task.


A fun project :)


(Maybe a symbol for a "whisper"-mode, which also shows an "ID field" which
content is left to the user to check? But then you can also keep the
padlock as a whisper-symbol and complement it with such an ID field.)


Yes, the Firefox UI project ... will be quite interesting to see how they do that.

For our part, we can establish some principles:

  1. the browser is an authority on the encryption.
  2. the cert is an authority on the name "identity".
3. the cert is a proxy for the CA which is the real authority.
  4. any statement made without authority raises liability.
  5. any material info hidden from the user raises liability.
  6. any excessive info forced on the user causes rejection.

etc etc.  The firefox team get to solve it :)

iang
_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

Reply via email to