On 21/09/11 14:18, Phillip Hallam-Baker wrote:
> Promiscuous security:
>     The site deploys SSL as an option that browsers can choose to use.
> Pages may include transcluded content from insecure sites. The cert may
> just be a self signed cert, browsers should just silently upgrade the
> transport to TLS and not bother the user.

The trouble with this idea (in general) is the following scenario:

- User has relationship with MyBank.com, and a bookmark to
  http://www.mybank.com/.

- MyBank is not entirely dumb, and so redirects straight to SSL when
  requests come in over unsecured HTTP.

- Attacker gains control of user's connection.

- User uses bookmark to access bank (supposedly a 'best practice')

- Attacker redirects HTTP request to own MITM server, with self-signed
  cert. Browser "silently upgrades transport to TLS, and doesn't bother
  the user." Attacker passes through data from real site.

- Effect is: user's browser shows connection as secure, but is MITMed.

This is why silent acceptance of self-signed certs is not a good thing.

We cannot rely on the user's browser always remembering the previous
cert used, or the CA via something like pinning, because for privacy
reasons any pin cache needs to be cleared if the user clears their history.

> Thus I think that either pinning should have a new header (they are
> cheap, IANA does not bite)

But the list of required headers get bigger and bigger. As Brendan Eich
says, "it's not the last cookie that makes you fat".

Gerv
_______________________________________________
websec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/websec

Reply via email to