On 2014-08-18 09:13, Nick Semenkovich wrote:
I love the ideas!

Automatically disabling broken rules could really improve the user experience -- and adding some TravisCI hooks to pull-requests would be great.

Two thoughts
- How would we go about automatically disabling rules?
Should we have some protected class of "super stable" rules (e.g. Twitter's SSL shouldn't be disabled if there's a transient curl test failure.)


The downside is that this potentially enables an attack vector that opens up sites to the very downgrade attacks that HTTPS Everywhere exists to prevent.

Without HTTPS Everywhere, nothing stops sites from applying redirections from HTTP to HTTPS themselves, so HTTPS Everywhere's primary purpose is to prevent downgrade attacks, and to apply a client-side enforcement of HTTPS on sites that don't redirect it themselves.

With automatic validation and deactivation of rules in the event that a destination page fails, all an attacker needs to do is to keep a site's HTTPS busy or offline for some period of time for HTTPS Everywhere to disengage, returning the site to a less secure state.

Like with so many things in security, there is an obvious security vs usability tradeoff here, is it better to return an insecure version of a page, or an error message and an unusable site?

Obviously if this is a permanent situation, the rule should be disabled and removed, but in the case of a temporary error on the HTTPS side, I'd be very nervous about automatically removing a layer of security.

--
Dave Warren
http://www.hireahit.com/
http://ca.linkedin.com/in/davejwarren


_______________________________________________
HTTPS-Everywhere mailing list
[email protected]
https://lists.eff.org/mailman/listinfo/https-everywhere

Reply via email to