FWIW I'm not a big believer in trying to communicate finely graduated tiers of risk to end users either. Its already a battle trying to get users to understand the difference between a clearly valid vs invalid certificate. I use the "grandmother rule" for security dialogs... if you can't create a user experience that would result in your grandmother making the right decision, you're doing it wrong.

For the small percentage of (power) users that can really understand the implications of a question like "the OCSP URL provided by this certificate does not appear to be valid at this moment, would you like to continue", I think they are better served by flipping the Encryption->Validation setting to require a valid OCSP response for certs that provide a URL. The reason here is I think this is a choice the user should make once and its not really relevant on a per-request basis. In the end, it seems like either you are ok with the lack of an OCSP response or you are not?

That said, the way we now handle mixed content might be an option... we don't provide the blue/green domain/org info bar, so the user just gets a plain white bar (like HTTP). Maybe we could do the same thing for a broken OCSP link?
  Lucas.

On Oct 13, 2009, at 11:04 AM, Ian G wrote:

On 13/10/2009 18:23, Johnathan Nightingale wrote:
On 13-Oct-09, at 2:04 AM, Rob Stradling wrote:
An alternate approach I'd like to lobby our front-end guys on would be
to put up a scary red bar when we can't validate OCSP.

I think that your suggestion strikes a good balance between security and
useability.

Sorry I missed this thread - Canadian thanksgiving wreaks havoc on an
inbox.

This piece of this conversation sounds an awful lot like:
https://bugzilla.mozilla.org/show_bug.cgi?id=496661, and in comment 8, I outline my own thinking on the constraints under which that kind of UI would need to operate. I'm not sure I agree with Nelson in comment 11, characterizing my reply as a de facto WONTFIX, but I do feel like it's a hard line to walk. The temptation to attach UI to this problem sets off "blame the user" alarms for me - do we think that uses will make better
decisions with this information? Like I say, I don't think we're at
WONTFIX on this question, but I don't think it's an easy problem to
solve correctly, either.


I think I agree with Nelson's comments there. If there is no revocation info in the cert, it is a CA problem, not a browser problem. It would be nice if the browser could invent a resolution here, but unfortunately, the CA made a statement, and once we start re-interpreting those statements because they upset our worldview ... then we're likely confusing the situation.

Also, while I don't see the "blame the user" aspect quite here ... it does seem as though a big scary warning for a failure of determining accurate revocation info (as opposed to an actual revocation) is likely to just lead to more click-thru syndrome.

So it still seems to point to ... patience. Not a particularly notable skill it seems :)


As for ipsCA, I find myself agreeing with Eddy's point: that the null
bytes are a regrettable validation error that we should work with ipsCA
to ensure they fix; but NXDOMAIN on an OCSP server that appears in
issued certs is a bigger problem. I'm talking with Frank and Kathleen
about options there. I think contacting the CA and understanding their situation is certain to be part of it. I think suspension of their trust bits is a possible outcome, but it's premature to talk about that before giving ipsCA a full chance to explain things. We break 6k cert holders if we do that, which I'll support if we don't have better options, but I
don't see that we're there yet.

Do others really feel like we've exhausted other options or that
attempts to communicate with the CA are fruitless?


The question of how to deal with apparent failures with CAs / issuances has been brought up many times, but without a conclusion or enough forward movement. As far as I can see, it lands in your lap (where here I mean the mozilla foundation CA desk, so Frank & Kathleen, including you if you're close enough).

So more patience demanded of us, I'm afraid.

But to be honest, I'm not following the ipsCA issue in detail, and probably won't until some policy question is raised.



iang
_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

Reply via email to