On Thu, May 23, 2013 at 8:29 AM, Brian Smith <
bsm...@mozilla.com> wrote:
>
richar...@googlemail.com wrote:
> > Here's my take - as the operator of a small website which deals with
> > personal data, I'd like to at least be able to warn my users when
> > they are unwittingly being MITMd by an HTTPS proxy (eg a work
> > computer).
>
> dev-tech-crypto is a better forum for this discussion, IMO. You are more
> likely to get a response from people who do the coding work on Firefox and
> NSS in one those forums.
>
That's probably correct - though this was the first discussion that google
archives.
>
> > Now I know that a really well implemented evil proxy would be able to
> > edit my page on the fly and spoof #1. But the chances are, that if I
> > write my own JS code, most standard corporate proxys won't actually
> > do it. So it's a 99.99% chance I can warn my users.
>
> I personally don't see a feature that allows evil proxies to MITM the
> user, while forbidding usually-helpful (or at least benign) proxies from
> function correctly, to be worth spending resources on. In particular, I am
> not sure it is reasonable to implement a feature that will cause NetNanny,
> Kaspersky Internet Security, and other security software on the local
> computer to stop working.
>
Well, "benign" proxies aren't benign to the person being monitored,
especially if they don't know that it's happening - and while I wouldn't be
able to break the proxy's functionality, I would at least be able to notify
the user of its existence. Also, though this feature wouldn't defend
against really hardcore evil proxies, it would be pretty easy to defend
against most of them most of the time. For an evill proxy to suppress
notifications, it would need to be able to parse arbitrary javascript
functions and modify them before sending the JS to the browser. Provided
each site's admin writes their own function, it would break the majority of
the evil proxies often enough that the users would discover it.
>
> Further, the law of unintended consequences would be in full effect here:
> If a site could obtain the SHA1 hash of the EE certificate's public key,
> and if such security software were to generate a random keypair for each
> user, then this certificate public key hashing API would be a vector for
> tracking internet users; it would be akin to an undeletable,
> cryptographically-secure tracking cookie.
>
Interesting idea. But the site (except when proxied) already knows its own
SHA1 key. All we could get would be the proxy's key... which might be
slightly useful to an attacker, but it only identifies the organisation,
and most businesses with SSL-appliances use a static gateway IP anyway.
Also, II already have login credentials for the users!
>
> I *do* think it would be valuable to give users more control and
> understanding of how MITM proxies are affecting the privacy of their web
> browsing, though I'm unsure of what a usable way of doing that is. Right
> now, a pretty good solution for it would be to do your private/personal
> browsing using Firefox for Android, using your mobile carrier's network
> (not your employer's wifi), and not any desktop machine
> owned/operated/maintained by your employer. However, I suspect that there
> will be pressure on us to add the features to Firefox for Android that
> (unintentionally) enable the type of snooping by employers that you are
> trying to prevent.
>
Yes, I know that. But most users don't - and I'm trying to protect them.
>
> Does your site use an Extended Validation (EV) certificate? This is one of
> the problems that EV is purported to solve, because MITM certs are never
> shown as EV. Recently, I've been thinking of whether or not Firefox's EV
> indicator is actually valuable to end users, and I am curious to hear your
> thoughts about why EV would or wouldn't work for solving this problem for
> your site.
>
For me, it's partly about cost (we're volunteers, and we can't really
justify the expense for "official" validation). Also, most users don't
notice the security warnings the browser gives them.
Best wishes,
Richard