--
--
Chromium Discussion mailing list: chromium...@chromium.org
View archives, change email options, or unsubscribe:
http://groups.google.com/a/chromium.org/group/chromium-discuss
Of course, adding these certs to your store potentially means anyone who obtains the private key can compromise all future connections. Generally, if someone cannot be bothered to obtain a free or low cost (<$10) cert, it is unlikely they're practicing good key hygiene, making this risk possible.
As Torne noted, it's unlikely that we will reduce the clicks, for many reasons, but also because most people who say they know what they're doing tend not to know what they're doing. That said, jww@ has been experimenting with models that might make it easier to both remember and forget these cert decisions.
But really, if you find yourself bothered by having to click through, isn't it just worth grabbing a cheap $8 cert off NameCheap or the like? Is it any different than buying a domain name so you don't have to type in an IPv4 address (... Or worse, v6?) Does something prevent you from doing that?
On Sep 1, 2014 5:49 AM, "Clemens Gruber" <cleme...@gmail.com> wrote:
>
> Hi,
>
> > Add the self-signed certs you trust to the certificate store, and then there won't be an interstitial at all.
>
> That's a workaround I am aware of. But I do not want to add every site to my cert store just because they use a self-signed certificate. I do that for my self signed certs which I trust completely but not for others.
> Isn't it better to have a transport-level security instead of no security at all? Many community websites can't afford to buy a cert.
If they can afford a $4/year domain, I'm betting they can afford a $8/year cert.
> So in every case where I do not fear a MITM attack, I do not care so much about the cert, but more about the transport encryption. It's better to have HTTPS with TLS and a self-signed-cert than normal HTTP.
>
Not really. In theory, yes. In practice, you're either conditioning users to click through your warnings (bad), or you're conditioning them to trust on first use, without any validation (also bad). In either case, you're encouraging bad behaviors that, even if they were acceptable for your small community sites, now become conditioned responses to things like your email provider or bank.
In short, your self-signed cert ends up making the web a less secure place, ironically while trying to make it more.
> >
> > It's unlikely we will make the interstitials easier, since the purpose of them is to discourage users from just clicking through.
>
> I can see why you set this new V2 screen as a default, but there are advanced users who do not need to be told twice to get the idea that it is not a VeriSign cert ;)
> I know the risk, I do not want to be asked twice in a row. I also do not want to hide the warning completely I just want to opt-out from the V2 behavior and use V1 again.
>
> Isn't one click enough for advanced users? As an opt-in/opt-out flag it would not do much harm, would it? :)
>
> Regards,
> Clemens
Chrome doesn't do flags like this, and it doesn't cater UI to the advanced user, precisely because such UI almost always inevitably makes things harder for the normal user.
We have no immediate plans to remove the additional click, as it serves several purposes for the general use case.As Ryan notes, you can opt into another experiment in Chrome 38 that might ease your pain: go to chrome://flags#remember-cert-error-decisions and change the setting to remember your decisions for up to 3mo.