- From: Eduardo' Vela\ <evn@google.com>
- Date: Thu, 21 Aug 2014 16:14:47 -0700
- To: Jeffrey Yasskin <jyasskin@google.com>
- Cc: Chris Palmer <palmer@google.com>, Mark Watson <watsonm@netflix.com>, Jim Manico <jim.manico@owasp.org>, "public-webappsec@w3.org" <public-webappsec@w3.org>
- Message-ID: <CAFswPa9RY6OQnmykYeeeyjWcqW0OL2bUYHqi8Uw1zowuPP_k8Q@mail.gmail.com>
On Thu, Aug 21, 2014 at 3:54 PM, Jeffrey Yasskin <jyasskin@google.com> wrote: > On Thu, Aug 21, 2014 at 3:29 PM, Eduardo' Vela" <Nava> <evn@google.com> > wrote: > > On Thu, Aug 21, 2014 at 2:19 PM, Chris Palmer <palmer@google.com> wrote: > >> > >> On Thu, Aug 21, 2014 at 2:09 PM, Eduardo' Vela" <Nava> <evn@google.com> > >> wrote: > >> > >> >> Can you explain more? What are some realistic public deployment > >> >> scenarios in which TLS is utterly useless? > >> > > >> > Any setup where the network is outside of your threat model. > >> > > >> > Think of the way Chromecast is configured, it's an HTTP server > listening > >> > on > >> > a wifi network. You can't distribute a SSL certificate to the device > >> > (there's no internet access yet), and we will hold some web platform > >> > hostage > >> > from them for no good reason. > >> > >> But Chromecast does not (yet...?) serve a web app that wants to run > >> WebCrypto or ServiceWorkers on my laptop. Mostly the laptop casts > >> content to the Chromecast. > >> > >> We should talk about if we should accept an origin as having been > >> securely transported if the user chooses to proceed past an HTTPS > >> warning interstitial page, e.g. for an unknown authority or name > >> mismatch. > > > > This is also part of the problem, the user now will need to pass an HTTPS > > warning interstitial page to be able to use web platform features. We'll > be > > punishing the user for trying to use a site that wants to use a hash > > function, smarter caching, or personalize data, even for cases where it > adds > > little-to-none security benefit. I totally get it "the needs of the > many... > > etc", but I wouldn't say this is a sane trade off. > > > >> I have an idea for how to handle authentication for Internet Of > >> Things, but that's separate from this thread. But we (as an industry) > >> are indeed going to have to figure that out soon. As a fellow security > >> engineer, I am sure you are not advocating a Crunchy On The Outside, > >> Soft On The Inside security posture. > > > > Which is why I am hoping we don't hijack web platform features for > anyone. > > > >> > Not all web applications are connected to the internet. Same for VPN > >> > services where you can authenticate at a network level. > >> > >> Or indeed, with a private, organizational CA. > > > > Which they don't need today. > > > > One of the reasons the web is such an attractive platform is because > it's so > > easy to setup. Install Apache in your home computer and you've got a > > Website. I used to do it in middle school, and I'm 100% sure I wouldn't > have > > been able to buy an SSL certificate (since I didn't even have a domain > not > > even no-ip.info).. > > You can use AppEngine > ( > https://developers.google.com/appengine/docs/python/config/appconfig#Python_app_yaml_Secure_URLs > ) > or AWS ( > http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/SecureConnections.html > ) > to do that today, both with SSL, both free for at least 12 months. > Building a cool website will now require a Google account (or an Amazon account, or a VeriSign account). And in a world without these actors, you have to bypass SSL warnings. > I suspect the reason Service Workers are limited to SSL is to prevent > > backdooring (as in, go to starbucks once and get your homepage > backdoored). > > This is very hard (and in most cases even impossible) with today's web > > platform features, so I get why making Service Workers SSL is a > reasonable > > trade off (since otherwise, it puts websites at risk). > > > > I do not get why Geolocation and WebCrypto need to be SSL only. Who are > we > > protecting here? The website? Nope. The user? Apparently. Against who? > > https://citizenlab.org/2014/08/cat-video-and-the-death-of-clear-text/ > perhaps. > Making geolocation permission not sticky across page reloads would fix that I assume.
Received on Thursday, 21 August 2014 23:15:35 UTC