An alleged SSL/TLS protocol vulnerability
Posted Sep 20, 2011 23:44 UTC (Tue)
by rickmoen (subscriber, #6943)
[Link] (25 responses)
2. You know that 'This page contains both secure and nonsecure items' warning you keep ignoring? Stop doing that.
3. As effective as RequestPolicy is, that plus NoScript is even better.
Rick Moen
Posted Sep 21, 2011 0:43 UTC (Wed)
by JoeBuck (subscriber, #2330)
[Link] (12 responses)
And if the site issues unencrypted ads when the user asks for https (as LWN itself did for quite a while), then what? The only options are either to stop using the site or to assume that everything is insecure.
We've done a very good job of training users to ignore warnings related to https, because those warnings appear so often during normal operation (because misconfigurations that generate the messages occur so often).
Posted Sep 21, 2011 1:22 UTC (Wed)
by ewen (subscriber, #4772)
[Link] (2 responses)
IIRC from a recent security conference talk, browser vendors are already leaning towards just blocking mixed HTTP/HTTPS content. (AFAICR the next Internet Explorer is going to block it, and Chrome/Mozilla are leaning that way once some of the more user-affecting breakage can be cleaned up.) Possibly things like this will push that a step closer. At which point sites with mixed content will have a stronger incentive to Not Do That (tm) -- their site will just not be loadable by more and more modern browsers.
Ewen
Posted Sep 21, 2011 4:32 UTC (Wed)
by lindahl (guest, #15266)
[Link]
I surveyed a lot of HTTPS websites as part of our HTTPSPreferred(R) feature (mostly banks), and almost half of them threw a mixed http/https warning.
Posted Sep 21, 2011 7:10 UTC (Wed)
by hpro (subscriber, #74751)
[Link]
Posted Sep 21, 2011 1:28 UTC (Wed)
by rickmoen (subscriber, #6943)
[Link] (8 responses)
Figuring out the occasional anomaly and understanding why it's there differs significantly from ignoring it, in my perhaps limited experience. Please note that I merely said 'stop ignoring'; I didn't say 'refuse to ever, under any circumstances, tolerate'.
Other alternatives to 'ignoring' are probably also possible.
Rick Moen
Posted Sep 21, 2011 16:33 UTC (Wed)
by JoeBuck (subscriber, #2330)
[Link] (7 responses)
Posted Sep 21, 2011 16:46 UTC (Wed)
by rickmoen (subscriber, #6943)
[Link] (5 responses)
Personally, I have the great and good fortune that the unending travails, hapless fate, and proverbial helplessness of 'most users' is simply not my problem. In my experience, concentrating on assisting people willing to take at least a very minimal amount of initiative increases the quality of my life, and enhances my satisfaction and ability to get things done, immensely. That is one of the advantages of Linux itself, for example.
I do wish you the very best of luck in your effort to make the Internet safe for 'most users'.
Rick Moen
Posted Sep 22, 2011 12:16 UTC (Thu)
by mpr22 (subscriber, #60784)
[Link] (4 responses)
Someone who has installed a non-default browser has probably already taken "at least a very minimal amount of initiative". However, even highly self-starting people are not immune to warning fatigue, and the more intrusive the false positives get, the less likely even highly competent people are to leave the warnings enabled. And remember: J. Random Luser's incapability, ineptitude, and inability to self-motivate is, in fact, your problem. It's not directly your problem, but it is your problem.
Posted Sep 22, 2011 17:48 UTC (Thu)
by rickmoen (subscriber, #6943)
[Link] (3 responses)
...even highly self-starting people are not immune to warning fatigue, and the more intrusive the false positives get, the less likely even highly competent people are to leave the warnings enabled.
Let me tell you how the world of https looks, as I encounter it: The number of https sites I use that are meaningfully security-sensitive is about 20 or 30. (I don't reuse passwords among sites. I run the HTTPS Everywhere extension, NoScript, AdBlock Plus.) Number of https sites, from among those 20 or 30, that generate warnings about mixed http/https content: literally zero, as it happens.
If I did encounter warnings on, say, some banking or similar sites among the 20 or 30 prior to a few days ago, I would 'stop ignoring' them by finding out why they were occuring and fixing them if possible. There would have been no 'warning fatigue'. As it happens, a few days ago I decided to add RequestPolicy as a general XSS/CSRF preventative, and it make the entire problem discussed here go away completely.
Now, certainly I would appreciate seeing a general cleanup where Same Site policies are enforced without needing RequestPolicy, NoScript, etc. as bandaids. It strikes me that making browsers back off to http any time there's mixed content might be a logical next step, but the exact general implementation is, thankfully, not my problem either. Your assertion that someone in a situation like mine inevitably will make some ghastly error on account of 'warning fatigue' is simply factually incorrect. Which brings me to your other contention:
J. Random Luser's incapability, ineptitude, and inability to self-motivate is, in fact, your problem. It's not directly your problem, but it is your problem. I prefer to think of it as a 'consulting opportunity'. Anyway, is this some sort of fatuous ideological advocacy? It sounds very much like the corporate-exhoratation genre, such as when one-time Blyth Software CEO and self-promoting dullard Michael Minor told all of us 1980s technical employees that we were 'all salesmen'. (The same logic suggested that we were also all janitors, all accounting clerks, and all receptionists.)
Rick Moen
Posted Sep 22, 2011 17:55 UTC (Thu)
by rickmoen (subscriber, #6943)
[Link]
Rick Moen
Posted Sep 23, 2011 9:44 UTC (Fri)
by mpr22 (subscriber, #60784)
[Link] (1 responses)
Posted Sep 24, 2011 2:22 UTC (Sat)
by rickmoen (subscriber, #6943)
[Link]
Rick Moen
Posted Sep 24, 2011 3:01 UTC (Sat)
by thedevil (guest, #32913)
[Link]
I just opened a newspaper site because I'm flying 2 days from now and an airline strike was brewing, and I got the mixed content warning. I don't have weeks to do the investigation, or even hours. I need the information now.
How can I get at this? I have these extensions: Perspectives, Error console, DOM inspector, Web console, Live HTTP headers. None of these seem to give a simple way to trace and list connections without a huge load of extra junk that needs filtering.
Posted Sep 21, 2011 6:45 UTC (Wed)
by butlerm (subscriber, #13312)
[Link] (6 responses)
Posted Sep 21, 2011 8:18 UTC (Wed)
by noah123 (guest, #58540)
[Link] (3 responses)
Posted Sep 21, 2011 15:34 UTC (Wed)
by butlerm (subscriber, #13312)
[Link] (2 responses)
Posted Sep 21, 2011 16:03 UTC (Wed)
by andresfreund (subscriber, #69562)
[Link] (1 responses)
Posted Sep 24, 2011 19:51 UTC (Sat)
by butlerm (subscriber, #13312)
[Link]
If advertisers just can't live without Javascript, perhaps the W3C could standardize on a technique to sandbox scripts originating from the same domain, even running on the same page.
Posted Sep 22, 2011 13:28 UTC (Thu)
by mrshiny (guest, #4266)
[Link] (1 responses)
Posted Sep 24, 2011 19:57 UTC (Sat)
by butlerm (subscriber, #13312)
[Link]
Posted Sep 21, 2011 6:52 UTC (Wed)
by josh (subscriber, #17465)
[Link]
Posted Sep 21, 2011 10:44 UTC (Wed)
by epa (subscriber, #39769)
[Link] (3 responses)
Posted Sep 21, 2011 12:39 UTC (Wed)
by tialaramex (subscriber, #21167)
[Link] (2 responses)
That isn't a theoretically insurmountable problem, but the truth is that our existing systems already assume the user is far smarter and more interested than they are, so making it worse is probably the wrong direction.
Posted Sep 21, 2011 16:36 UTC (Wed)
by JoeBuck (subscriber, #2330)
[Link]
Posted Sep 26, 2011 22:40 UTC (Mon)
by bjartur (guest, #67801)
[Link]
1. This is fundamentally just another XSS mode that permits a man in the middle bit of JavaScript to conduct a chosen-plaintext decryption of cookie data encrypted using an AES cipher-block-chained-(CBC-)mode block cipher. Therefore, the RequestPolicy Firefox extension is your friend, being a general preventative against XSS malarky.
An alleged SSL/TLS protocol vulnerability
rick@linuxmafia.com
"You know that 'This page contains both secure and nonsecure items' warning you keep ignoring? Stop doing that."
An alleged SSL/TLS protocol vulnerability
An alleged SSL/TLS protocol vulnerability
An alleged SSL/TLS protocol vulnerability
An alleged SSL/TLS protocol vulnerability
Joe --
An alleged SSL/TLS protocol vulnerability
rick@linuxmafia.com
In my case I do attempt to figure it out, but most users don't have multiple decades of experience on computer networks. Ideally the browsers should do more to help users distinguish cases that are likely to be misconfiguration from cases that are likely to be fraud. A security system that gives too many false positive warnings tends to be ignored.
An alleged SSL/TLS protocol vulnerability
An alleged SSL/TLS protocol vulnerability
rick@linuxmafia.com
An alleged SSL/TLS protocol vulnerability
mpr22 wrote:
An alleged SSL/TLS protocol vulnerability
rick@linuxmafia.com
By 'Same Site policies", I meant Same Origin policy, but just could not remember the correct name off the top of my head.
An alleged SSL/TLS protocol vulnerability
rick@linuxmafia.com
J. Random Luser's ineptitude is your problem because his computer is a botnet zombie generating negative utility for everyone who has systems facing or nearly-facing the public Internet.
An alleged SSL/TLS protocol vulnerability
An alleged SSL/TLS protocol vulnerability
rick@linuxmafia.com
An alleged SSL/TLS protocol vulnerability
An alleged SSL/TLS protocol vulnerability
Proxying content should be avoided as it could compromise the Same Origin policy.
An alleged SSL/TLS protocol vulnerability
An alleged SSL/TLS protocol vulnerability
An alleged SSL/TLS protocol vulnerability
E.g. example.org.my-https-proxy.example and annoying-advertisement.example.my-https-proxy.example
An alleged SSL/TLS protocol vulnerability
An alleged SSL/TLS protocol vulnerability
An alleged SSL/TLS protocol vulnerability
An alleged SSL/TLS protocol vulnerability
An alleged SSL/TLS protocol vulnerability
An alleged SSL/TLS protocol vulnerability
It would only be feasible if the browser, rather than the user, did this (disable unencrypted Javascript on mixed secure/insecure pages).
An alleged SSL/TLS protocol vulnerability
An alleged SSL/TLS protocol vulnerability