- From: Mary Ellen Zurko <Mary_Ellen_Zurko@notesdev.ibm.com>
- Date: Wed, 18 Apr 2007 10:03:36 -0400
- To: Web Security Context WG <public-wsc-wg@w3.org>
- Message-ID: <OF59DAF950.AE319783-ON852572C1.0045941E-852572C1.004D3ECB@LocalDomain>
We've discussed some of the issues around scoping of security indicators when the information presented is from multiple sources, or has different security context. I think it is a problem with the status quo, and is not currently reflected in that section. Given the structure, I propose adding an item to 9.4, poor usability of the chrome: 9.4.n One chrome, multiple security contexts It's no longer "your mother's web", where all user agents are browsers, and a single page from a single server is displayed alone, because the user took a specific action to GET it. From included content, through IFrames, portlets, and asynchronous web calls, parts of what's presented may have security context that is different from or lacking from other parts. Warning the user tends to be confusing for them, or ignored. New security information is out of scope, so the suggestions on new interactional protocols to request signed content is out of scope. The Best practices for other media goal is meant to be clear that we recognize the fact that user behavior is a result of all interactions. Ignoring that would create recommendations that cannot be realistically and successfully, securely deployed. I propose we add the word realistic to that goal, producing: The Working Group will provide realistic best practice guidelines for other media to follow so as not to undermine the presentation of security information on the web. Mez Mary Ellen Zurko, STSM, IBM Lotus CTO Office (t/l 333-6389) Lotus/WPLC Security Strategy and Patent Innovation Architect Web Security Context Issue Tracker <dean+cgi@w3.org> Sent by: public-wsc-wg-request@w3.org 04/15/2007 10:50 AM Please respond to Web Security Context WG <public-wsc-wg@w3.org> To public-wsc-wg@w3.org cc Subject ISSUE-38: no safe haven in presentation space (from public comments) ISSUE-38: no safe haven in presentation space (from public comments) http://www.w3.org/2006/WSC/Group/track/issues/38 Raised by: Bill Doyle On product: Note: use cases etc. >From public comments raised by: Al Gilman Alfred.S.Gilman@ieee.org http://lists.w3.org/Archives/Public/public-usable- authentication/2007Apr/0000.html no safe haven in presentation space where it says, in 2.5 Reliable presentation of security information The Working Group will recommend presentation techniques that mitigate deceptive imitation, or hiding, of the user agent's presentation of security information. where it says, in 2.7 Best practices for other media The Working Group will provide best practice guidelines for other media to follow so as not to undermine the presentation of security information on the web. please consider This part of the strategy seems particularly weak. Techniques to ascertain the actual presentation of [e.g. DOM objects] is sought by the WAI. Techniques to query the delivery context are under development by the Device Independence [now Ubiquitous Web Applications] Working Group. You should think of querying the delivery context for evidence of spoofing 'security indicating' presentation as one of the tools in your deployment strategy. Likewise, making it easy for the user to exercise a faint twitch of skepticism with what seems to them a lightweight gesture, but raises the sensitivity of security-information-filtering -- that is a closed-loop, mixed-initiative way to move the performance curve of security failures vs. user nuisance. Also, you should consider introducing practices which are not widely used now but are up and running and working in practice. What if the user gets a page with some protected content and some that was transmitted in unprotected HTTP. The user doesn't know what in the page is of what category. Suppose at this point they could by a flick of the hotkey send the challenge "can you send me that offer in a signed document?" This relies on PKI that is somewhere in the SSL stack, and the server won't have to bear the burden all the time. When a user is at all concerned, the ethical merchant could want to invest the extra cycles for the cryptography. In other words, readily achievable changes in technology deployment should not be altogether off the table. Why? It seems unlikely that you can limit yourselves to currently-widely adopted technology and not find that any presentation-property syndrome that you select (whether of placement, coloration or language) is vulnerable to highly effective spoofing attacks. Likewise the appeal to other media to stay out of your protected zone is not likely to be successful unless a duly constituted panel representing all stakeholders decides the allocated reserved presentations.
Received on Wednesday, 18 April 2007 14:03:53 UTC