- From: Thomas Roessler <tlr@w3.org>
- Date: Fri, 14 Apr 2006 23:02:21 +0200
- To: Jeffrey Altman <jaltman@secure-endpoints.com>
- Cc: public-usable-authentication@w3.org
Forwarding on behalf of Jeffrey as well. -- Thomas Roessler, W3C <tlr@w3.org> On 2006-04-14 10:36:46 -0400, Jeffrey Altman wrote: > Message-ID: <443FB37E.7070008@secure-endpoints.com> > Date: Fri, 14 Apr 2006 10:36:46 -0400 > From: Jeffrey Altman <jaltman@secure-endpoints.com> > Organization: Secure Endpoints Inc. > User-Agent: Thunderbird 1.5 (Windows/20051201) > MIME-Version: 1.0 > To: public-usable-authentication@w3.org > Subject: Re: Secure Metadata > References: <8A794A6D6932D146B2949441ECFC9D680216C8C1@msgswbmnmsp17.wellsfargo.com> <200604121353.13002.staikos@kde.org> > In-Reply-To: <200604121353.13002.staikos@kde.org> > X-Enigmail-Version: 0.94.0.0 > Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=sha1; boundary="------------ms060807040501070303070304" > > George Staikos wrote: > > On Wednesday 12 April 2006 13:49, Michael.Mccormick@wellsfargo.com wrote: > >> RFC 3709 (http://www.ietf.org/rfc/rfc3709.txt) defines an X.509 > >> extension that allows optional logographic images for community, issuer, > >> and subject organizations. > >> > >> Say for example GM obtained web server SSL certificates from VeriSign > >> for use within their supplier community. The cert could display logos > >> for GM, VeriSign, and the auto parts exchange (or any subset / > >> combination thereof). > > > > Right... but the question is, do we fill the chrome with all of these > > things? :-) This is a lot of real-estate, it's a potential new phishing > > vectors, and it's going to be really hard to remove one day when we decide > > that problems 1 and 2 are too much to handle. > > I'm extremely concerned that the use of logos will cause users to pay > even less attention to differences in URLs when evaluating certificates. > I'm going to pick on Mars Incorporated and to a certain extent Verisign > today quite a bit simply because there is a case that I can use as an > example that is readily available. > > The URL https://chillinforamillion.com is secured by a valid certificate > issued by Verisign's "VeriSign Class 3 Secure Server CA". This is an > intermediary CA whose certificate is not shipped as a trust anchor in > FireFox. The expectation is that the intermediate certificate is > supposed to be supplied by the web server. The installation > instructions are found on VeriSign's web site here: > > http://www.verisign.com/support/ssl-certificates-support/install-ssl-certificate.html > > Unfortunately, it is too often the case that web site managers don't > understand that intermediary CA certs need to be installed on the server > and so users are displayed the famous "Website Certified by an Unknown > Authority" dialog. > > If the user were to examine the certificate they would find that the > Common Name is in all upper case while the web site url hostname is in > all lower case causing the user (including myself) to think that the > problem is a case comparison error and ignoring the details surrounding > the Issuing Certificate Authority certificate BECAUSE the certificate > was issued by VeriSign, Inc.; it must be good. Besides I see these > dialogs all the time when I go to blogs protected by self-signed certs > and web sites that are mis-configured such as the one from Mars Inc. > > Now if you were to throw logos at me in this dialog I would see a logo > from Mars Inc. (did I even know that Mars Inc made skittles and > starburst?) and a VeriSign logo. As documented in "Fast Food Nation" we > are programmed from a very early age to trust brands and one of the > strongest associations that we have is with the brand logo. Companies > spend tons of money every year re-enforcing the association that their > logo represents products that are safe, wholesome, etc. When users see > the VeriSign logo and see the McDonalds logo on a page they are going to > feel safe and secure and they are only going to be more likely to go > ahead and press that "Accept this certificate" button. Using logos to > reduce the details provided to the user is not a means of increasing > security. > > The only benefit that I can see from displaying logos is that when a > logo that a company has spent billions of dollars maintaining starts > to be used as part of phishing attacks it is going to get a lot of > attention from CEOs, corporate legal teams, and law enforcement because > when a brand is damaged it is damaged not only for web transactions > but will become a part of the public consciousness associated with that > brand every time a consumer considers purchasing a product or service. > > While displaying logos may appear to be a good thing in the short term, > I am skeptical of the long term security benefits. > > Jeffrey Altman > > >
Received on Friday, 14 April 2006 21:02:31 UTC