- From: Michaela Merz <michaela.merz@rollofone.com>
- Date: Tue, 9 Apr 2019 14:50:56 -0500
- To: Scott Helme <scotthelme@hotmail.com>, Emily Stark <estark@google.com>
- Cc: WebAppSec WG <public-webappsec@w3.org>, Mike West <mkwst@google.com>, Joe DeBlasio <jdeblasio@chromium.org>, "cthomp@chromium.org" <cthomp@chromium.org>
- Message-ID: <af21582d-c407-2486-fc0d-44bfc0be8d7c@rollofone.com>
Scott: I may have misunderstood the suggestion. I am sorry. You are talking about blocking HTTP downloads from within secure contexts? This is NOT about blocking downloads based on signatures or other protection mechanisms? If so - I bow out as I have spoken too early. My apologies. Michaela On 4/9/19 2:47 PM, Scott Helme wrote: > Not sure there can be a false positive about a http download from a > https page! > > Can you give an example of how blocking such a download could cause a > problem? > > Cheers, > > Scott. > ------------------------------------------------------------------------ > *From:* Michaela Merz <michaela.merz@rollofone.com> > *Sent:* 09 April 2019 20:43 > *To:* Emily Stark > *Cc:* WebAppSec WG; Mike West; Joe DeBlasio; cthomp@chromium.org > *Subject:* Re: Blocking high-risk non-secure downloads > > > Hi Emily - > > I wasn't really talking about my particular problem. It is simply an > example about a false positive that may also happen in other > protection environments. I personally find the blocking of any kind of > download extremely problematic - especially if the user doesn't know > about it. In-transparent blocking - even with the best intensions - > opens the door to all sorts of desires. > > Just my two cents. > > Michaela > > On 4/9/19 2:36 PM, Emily Stark wrote: >> >> >> On Tue, Apr 9, 2019 at 12:31 PM Michaela Merz >> <michaela.merz@rollofone.com <mailto:michaela.merz@rollofone.com>> wrote: >> >> Here's a very problematic situation I am discussing with the >> Firebox people (and filed a bug report): Our application allows >> folks to assemble files, pack them into a zip and download the >> data. Some combination of certain files, when packed and zipped, >> seem to create a situation where Chromium (and Firefox) believe >> the data to be dangerous. I guess it's based on the signature. >> Chromium marks the download as potentially dangerous but allows >> the download anyway - Firefox however downloads the file and >> zero-truncates it on disk without any warning. Here's my point: >> The browser should never be allowed to discard or corrupt any >> data without the user's expressed knowledge. It is not enough to >> only have a tick-box in settings. Warnings need to be displayed >> on any potentially dangerous file. It is not acceptable when the >> browser decides by itself whether or not do allow downloads and >> doesn't tell the user. Signatures or other detection mechanism >> can (and as my case shows, will) deliver false positives and it's >> creating a slippery slope that may, at some point, be misused for >> other reasons. It is however - perfectly ok to warn the user and >> let him/her decide for themselves. >> >> >> Hi Michaela, this sounds like an issue with the Safe Browsing >> download protection feature, which is unrelated to blocking http >> downloads which we're discussing in this thread. Please consider >> filing a bug at https://crbug.com/new >> <https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcrbug.com%2Fnew&data=02%7C01%7C%7C01943c48bef54ae45c8b08d6bd23d4a5%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636904358914824122&sdata=yrC28huVCKwL0eBo0M4YnJ86Jxbe9mMRDiDtiO%2B94P8%3D&reserved=0> >> about this issue. >> >> >> Michaela >> >> On 4/9/19 1:28 PM, Emily Stark wrote: >>> Hi webappsec friends, >>> >>> Over in Chrome land, we've been considering how to drive down >>> non-secure downloads, particularly high-risk ones like >>> executables. I wanted to see if other browsers would be >>> interested in joining us on this adventure. >>> >>> We want to achieve the right balance between >>> compatibility/user-disruption and security improvements, so we >>> will likely start by treating certain high-risk downloads >>> initiated from secure contexts as active mixed content and block >>> them. We're still finalizing our metrics before we can share >>> them publicly, but right now it's looking like it will be >>> feasible to block a set of high-risk filetypes (executables and >>> archives as determined by the Content-Type header or sniffed >>> mime-type). We will likely focus on protecting desktop users >>> because Android and Safe Browsing already provide protection >>> <https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsource.android.com%2Fsecurity%2Freports%2FGoogle_Android_Security_2018_Report_Final.pdf&data=02%7C01%7C%7C01943c48bef54ae45c8b08d6bd23d4a5%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636904358914834127&sdata=p1dJ31a67mXnuuxCHt30o29TJ8jWLlK84n6J%2BurZPIQ%3D&reserved=0> >>> against malicious APKs. >>> >>> We're not planning to focus on non-secure downloads initiated >>> from non-secure contexts at the moment, because users at least >>> see the "Not Secure" omnibox badge on those pages. >>> >>> Feedback welcome! >>> Thanks, >>> Emily >> >> -- >> Email is unsafe. Send confidential text or data via >> packfrog: https://packfrog.com/biotope?ee=92d26b3152b13a508b88d5ee575143b <https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fpackfrog.com%2Fbiotope%3Fee%3D92d26b3152b13a508b88d5ee575143b&data=02%7C01%7C%7C01943c48bef54ae45c8b08d6bd23d4a5%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636904358914844139&sdata=Pg22fOnzEQRBr0Jgdpg0%2Bcc%2F10FjyaLp0XVP8ceWqXI%3D&reserved=0> >> > -- > Email is unsafe. Send confidential text or data via > packfrog: https://packfrog.com/biotope?ee=92d26b3152b13a508b88d5ee575143b <https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fpackfrog.com%2Fbiotope%3Fee%3D92d26b3152b13a508b88d5ee575143b&data=02%7C01%7C%7C01943c48bef54ae45c8b08d6bd23d4a5%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636904358914854156&sdata=18WoqeljIqKSDEUEsUvJFzcWupL9nonsTD%2Fu72%2FLOm4%3D&reserved=0> -- Email is unsafe. Send confidential text or data via packfrog: https://packfrog.com/biotope?ee=92d26b3152b13a508b88d5ee575143b
Received on Tuesday, 9 April 2019 19:51:35 UTC