To repeat, the positions are entrenched, and it isn't worth repeating the debate. The main point to understand is that:

    *the browsers have to block mixed content*

and the thread Subject is spot on.

(fwiw, some easy rebuttal below, and why.)

iang


On 15/08/13 12:27 PM, Gervase Markham wrote:
On 13/08/13 18:11, ianG wrote:
Badly.  Riddled with bad, false and self-serving assumptions.  here's
just one:

        "Before we begin, we must understand that
        Security = Encryption * Authentication."

Wrong.  That happens to be the SSLv2 security offering, aka C.I.A. for
confidentiality, integrity, authenticity.  That model has only the
vaguest relationship to the security of the users.  Even the inventors
of SSLv2 don't hold onto that position with any seriousness any more.

[Perhaps you don't mean to, but you do have a habit of writing your
points in a way which takes 3x as much effort to parse and understand as
other people's, often due to your assuming too much shared knowledge.
This provides a disincentive to engage with your argument.]

Without citations and further elaboration, there is nothing above that
can be interacted with.


Perhaps you don't realise or recall, but you and I have been sparring this way for many years now. You will typically find ways to attack and downgrade the words [0]. This prepares the ground to ignore or otherwise clamp down on the discussion. Mozilla as a consistent practice will not open up or discuss security models, and your above deflection follows this practice.

Here is why *the browsers have to move to block mixed content* :


Even the browsers don't implement that model, because they famously do
not state to the user who is authenticating what.  Substitutions without
notice are part of the architecture.

Yep. And that's just fine. Users do not want to figure out which of 60
CAs they trust; they'd rather delegate that job to Mozilla. And we take
it seriously. If we say FooCA is OK to do authentication, then (for our
users) it's OK - and if they turn out not to be OK, we give them the boot.


Right, browser vendors are in a trap of their own making. The browsers offer a binary security feature. It's either all ON or all OFF.

We now have a decade of evidence that the model of all ON or all OFF has poor performance [1] against attackers. Which leads to the browser vendors having to choose: either replace or fix the model, or make it ON but harder ON.

They chose ON-harder.

Which means *the browsers have to move to block mixed content* . Mixed content has no place in an on-off world.


This doesn't seem to me to be an argument against "Security = Encryption
* Authentication".

The point of that phrase is "Zero encryption => zero security", "zero
authentication of the endpoint => zero security".


I know, these are all familiar and understandable arguments. Logical, even mathematical.

Just wrong, because you started with false assumptions.

Zero encryption does not mean zero security [2], not even approximately.

Zero authentication does not mean zero security [3], again not even closely.

As the assumptions are hopelessly irreparably flawed, the rest of the article is a fail. Until we can deal with assumptions properly, it isn't even worth describing the hows & whys that your article leads to false results.




iang




[0] E.g., I write badly (ad hominem) in some sense, and, I do not cite evidence (not worthy of attention).

[1] I mark the start of serious phishing of browser users at 2003.

[2] Consider dual channel authentication, shared one use passwords, emailed password recovery tokens, hashing, etc. This list is also very long.

[3] Consider: the SSH world has secured its servers for nearly two decades now without users bothering to authenticate first time. TOFU secures. Skype worked so well without knowing who it was dealing with (!) for so long, the NSA had to beg them to weaken their protocols. For more flagrant and complicated example, authentication of dissidents leads to capture, torture, death. A.k.a., lower security.
_______________________________________________
dev-security mailing list
dev-security@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security

Reply via email to