Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Mozilla The Internet Encryption Security

Firefox SSL-Certificate Debate Rages On 733

BobB-nw points out the ever more raucous debate over the way Firefox 3 handles self-signed certificates. The scary browser warnings have affected a number of legitimate sites (such as Google AdWords and LinkedIn) that didn't renew certs in time. Lauren Weinstein loudly called attention to the problem early in July. "If you visit a website with either an expired or a self-signed SSL certificate, Firefox 3 will not show that page at all. Instead it will display an error message... To get past this error page, users have to go through four different steps before they can access the website, which from a usability standpoint is far from ideal. This way of handling websites with expired or self-signed SSL certificates is bound to scare away a lot of inexperienced users, no matter how legitimate the website is."
This discussion has been archived. No new comments can be posted.

Firefox SSL-Certificate Debate Rages On

Comments Filter:
  • Re:Worth it. (Score:5, Insightful)

    by Bashae ( 1250564 ) on Friday August 22, 2008 @08:32AM (#24703623)

    Well, I can live with it, but they could at least patch this feature to make it less annoying with self-signed certificates. Show a warning, yes, but right now the error message is too creepy.

  • That's the point. (Score:5, Insightful)

    by WPIDalamar ( 122110 ) on Friday August 22, 2008 @08:32AM (#24703629) Homepage

    Isn't scaring away inexperienced users from sites with questionable security the whole point of those warnings?

    I mean a user friendly message that lets someone get past it really easily wouldn't exactly get the job done.

  • Absolutely right (Score:2, Insightful)

    by Anonymous Coward on Friday August 22, 2008 @08:34AM (#24703639)

    Certificates are a usefull tool if used properly. Expired or self-signed certs have no value, one would expect admins to have the minimum awareness (professionalism?) to maintain them correctly? Or is even that too much to ask?

  • Re:Worth it. (Score:4, Insightful)

    by gbjbaanb ( 229885 ) on Friday August 22, 2008 @08:35AM (#24703649)

    amen. The error message seems to be designed for people who know about these things, not mom and pop users.

    They could improve the message significantly, explaining what the problem is and what to do about it. Then I think the issue wouldn't be so big anymore. People would still complain about the number of clicks to accept a self-signed cert, but at least it would appear as legitimate information instead of an 'error'.

  • by Anonymous Coward on Friday August 22, 2008 @08:36AM (#24703651)

    So, major sites fail at keeping correct, valid, up-to-date certs. Firefox (legitimately) refuses to say the site is properly identified and that's Firefox's fault...?

    Yes, this is a change in behaviour, but in the long run it will force certs to mean something.

    http://blog.johnath.com/2008/08/05/ssl-question-corner/ [johnath.com]

  • Re:Worth it. (Score:5, Insightful)

    by mulvane ( 692631 ) on Friday August 22, 2008 @08:36AM (#24703655)
    Let's not expect site maintainers to actually keep their ssl certs up to date. Oh noes. We want customers to not trust ssl certs so they may fall victim to a scam.
  • by volxdragon ( 1297215 ) on Friday August 22, 2008 @08:38AM (#24703677)

    If you EVER want to combat man in the middle attacks and phishing sites, this is the best solution. Sites whining that people are being scared away??!? Get a fucking grip, and get a real certificate from a real certificate authority so your users can actually trust you. People/companies are cheap and lazy, and unfortunately this leads to a whole host of problems...keeping your certificate legitimate and up to date should be no different than taking care of your insurance or other critical infrastructure.

  • Cancel or Allow? (Score:2, Insightful)

    by Gothmolly ( 148874 ) on Friday August 22, 2008 @08:38AM (#24703683)

    So like I went to a website, and the computer goes like *beep* and like I get a screen about a certificate or something where I like click Next, Next, Next, OK, and then the computer goes like *boop* and like, my paper was totally gone.

    Sorry folks, given the way SSL certs work, there's something going on when someone has a self-signed cert. Users, sadly, have to be aware of this sort of thing. The personal computer really isn't a toaster (yet).

  • Re:Worth it. (Score:5, Insightful)

    by Cormacus ( 976625 ) on Friday August 22, 2008 @08:39AM (#24703687) Homepage
    I have to agree. Few things should be more important to a site administrator that handles personal information for their clients than getting their SSL certs updated in time.

    Browsers that allow this kind of lax security atmosphere are part of the problem.
  • Re:Worth it. (Score:5, Insightful)

    by bunratty ( 545641 ) on Friday August 22, 2008 @08:40AM (#24703713)
    It's supposed to be creepy [johnath.com], because it may be the only warning you're the victim of a DNS poisoning and you're not at the site you think you are, or you're the victim of a man-in-the-middle attack and your "encrypted" communications are being intercepted and read. At least in Firefox 3 you need to add an exception to see the site, so you see the warning only once. In Internet Explorer 7, you can see the site by clicking a link, but you will see the scary warning every time you visit the site. Users will disregard the warning if they see it very often, making the warning ineffective.
  • No Excuses (Score:5, Insightful)

    by allcar ( 1111567 ) on Friday August 22, 2008 @08:41AM (#24703715)
    Fundamentally, the people at fault here are the so-called professionals who allow their certificates to expire. Why should I trust their site's security if they can't manage a simple administration function like that. Thawte and Verisign provide you with enough reminders that your certs are about to expire, so you don't even need to diarise it yourself.
    I do have more sympathy with self-signed certificates.There is no excuse for corporates to be using them, but for small, non-profit sites, self-signed is understandable. Mozilla could help this situation by providing support for CACert [cacert.org] and similar organisations, by including their signing certs in their browsers, by default.
  • by Cormacus ( 976625 ) on Friday August 22, 2008 @08:41AM (#24703725) Homepage
    If we need to change the way SSL certificates are issued and who has control over it (etc) . . . that is one issue.

    Encouraging web browsers to ignore security irregularities and allow users to access sites that handle private information *without* bringing it to the user's attention is just irresponsible.
  • GOOD! (Score:4, Insightful)

    by nweaver ( 113078 ) on Friday August 22, 2008 @08:41AM (#24703727) Homepage

    Conditioning the users to accept self-signed certs is a BAD thing.

    I think self-signing is great for HTTP and with SSH-style leap of faith. But self signed is far less useful than a real cert (because even when social engineered, a real cert allows you to say "registrar X f-ed up".) for HTTPS. And conditioning users to accept self-signed certs for HTTPS is a mistake.

  • by jacquesm ( 154384 ) <j AT ww DOT com> on Friday August 22, 2008 @08:42AM (#24703735) Homepage

    exactly. Every time people jump through the hoops required to accept a lapsed certificate all the valid certificates in the world lose a little bit of value because the user just got conditioned a little bit more to see certificates as nothing but a hassle.

  • expected behaviour (Score:5, Insightful)

    by AndyST ( 910890 ) on Friday August 22, 2008 @08:44AM (#24703751)

    This way of handling websites with expired or self-signed SSL certificates is bound to scare away a lot of inexperienced users, no matter how legitimate the website is.

    Well that's the point. The certificate is not valid and there is no way to tell the website is legitimate. If one would insist on using TLS/SSL for HTTP with a self-signed certificate, have users install your own CA keys you gave them through another secure channel, or at least let them check the fingerprint. Nobody keeps you from doing that. It's sad that some of these things are so widely misunderstood that it actually reduces privacy and security:

    • login forms on http: URI, posted to https: URI. Please, the website should identify first.
    • Session Cookies which are sent for both secure and unsecure connections.
    • people asking me to sign their openPGP keys they sent via e-mail wondering why I call them in return to verify the fingerprint. (This guy had a Ph.D. in computer science and after a heated exchange on the phone and e-mail I just gave up. He hates me ever since.)

    The new behavior of Firefox 3 is not a problem, it's people failing to security-enable their website the right way.

  • by Anonymous Coward on Friday August 22, 2008 @08:47AM (#24703803)

    a) Experienced users can't be fscked adding exceptions all the time. Why isn't there an option in about:config to use as a workaround?

    b) Most experienced users are very happy with self-signed certificates - they are mainly trying to avoid middleman secutiry issues (ISP, employer and other big brother types).

    c) Most experienced users know exactly what kind of a farce the whole SSL certificate business is. There is no guarantee that if a certificate states that a website belongs to Google, that it really does. There is no verification done whatsoever and the entire thing is just a sham.

    d) I have no intention of forking out cash for the abovementioned farcical certificates for those of my servers which require SSL. I just tell users to either just follow FF's instructions, use a different browser or buy me a certificate.

    e) There are far more computer savvy FF users out there than technophobes... cater to your primary user base first hand or at least ensure that their usability is not affected.

    f) At the very least, allow access to the site with the usually banner at the top that warns of authenticity issues.

    g) I just set my Mom back onto Opera because of this.

  • by bunratty ( 545641 ) on Friday August 22, 2008 @08:48AM (#24703817)
    Why doesn't Linksys provide the certificate used to sign the certificates on all those routers? Then you could add that certificate to your root certificates and no longer get any warnings at all. It looks to me like Linksys dropped the ball on this one. Perhaps the changes to Firefox 3 and Internet Explorer 7 will help companies get more serious about ensuring security.
  • by MosesJones ( 55544 ) on Friday August 22, 2008 @08:48AM (#24703823) Homepage

    This is a switch of the "Cancel/Allow [youtube.com]" Mac/PC ad.

    Here we have FF3 saying

    "You have tried to access a secure site with a dodgy certificate, Cancel or Allow?"

    IE meanwhile troops on regardless giving a better "user experience"

    Oh until the machine goes down because the site was a trojan site using a self-signed certificate.

    The issue here isn't that Firefox is making this hard, its that ANYONE ever made this easy. If a site has an expired certificate then that would worry me as it implies their IT support is a bit dodgy. If someone wants my credit card details and is using a self-signed certificate then I'm VERY worried.

    There are functional issues (the duplicate cert problems of Linksys has been mentioned here) that should be addressed. But the basic problem of warning users very strongly that a site is self-signed or has an expired certificate is a good thing.

    I'm using Firefox, I'm on a Mac and this problem just hasn't irritated me the way that Vista does because this does it when there is a REAL problem caused by a 3rd party, not a potential problem caused by me hitting a button. Expired or self-signed certs are a real 3rd party problem, not a scare story.
     

  • As a Safari user (Score:5, Insightful)

    by Tibor the Hun ( 143056 ) on Friday August 22, 2008 @08:49AM (#24703833)

    As a Safari user, i find that reading mainstream media and "security researchers" fucking hurts my head.
    First Safari is bad because it doesn't have anti-phishing.
    Then FireFox is bad because because it throws a fit on un-signed certificates.
    WTF do they all recommend? Exploder?

    I guess it all fits with the flow of uneducated American populace, too ignorant to learn to use a computer properly, so "Security Experts" need to be babysitting them.

    (for those of you wondering why I use Safari, it's because of its superb in page find feature.)

  • by I cant believe its n ( 1103137 ) on Friday August 22, 2008 @08:49AM (#24703839) Journal
    I think FF should just clearly show a warning sign and tell the user that any communication he or she has is encrypted, but that the receiver could be anyone. Therefore the user should not engage in any sensitive communication over this connection such as visiting banks etc.

    I feel that there is too much scaremongering going on. Usually programs will tell you, "you are about to do something really dangerous/stupid/embarasing, proceed yes or no?". It is better to inform the user why this is dangerous/stupid/embarasing and let him or her make up their own mind. Otherwise you are just putting the blame on the user for when things go wrong without him/her being able to make an informaed decision. Many users may act less than perfect, but at least give them a chance to understand.

    Yes I know that the new FF is much better at informing the user than older browsers where, but it is still too alarmist in my opinion.

    What do you think?
  • Re:Worth it. (Score:5, Insightful)

    by phoenix321 ( 734987 ) * on Friday August 22, 2008 @08:54AM (#24703903)

    Better yet: expect the non-technical crowd, the users, to put up with errors of the pro-technical crowd, the site maintainers.

    Excellent shift of responsibility towards, right?

    I think this is an issue of whiny webmasters, really. A proper certificate is around 10 bucks per year and although they issue it to anyone, it is security at a much higher level than using a self-signed crutch.

    If you're a website owner, put up those 10 dollars and stop complaining. Keep your house clean and your certificates valid.

    EVERYTHING you do by that is better than to accustom millions of non-technical users to click away any and all error messages when surfing. If all browsers would show these drastic certificiate errors AND all SSL-loving webmasters would keep their certs updated, we would have less issues in phising and scamming, much less.

    Either you have security or you don't. Encrypting to someone is useless or even dangerous when you mistake the identity of the receiver.

  • by Goaway ( 82658 ) on Friday August 22, 2008 @08:55AM (#24703917) Homepage

    b) Most experienced users are very happy with self-signed certificates - they are mainly trying to avoid middleman secutiry issues (ISP, employer and other big brother types).

    Uh, self-signed certificates are WIDE OPEN to MITM attacks. That's kind of the point here? Maybe you're not as experienced as you think?

  • by Anonymous Coward on Friday August 22, 2008 @08:58AM (#24703951)

    Before all the security fanatics start telling everyone to "just spend ten bucks on a cert"...

    1. Embedded appliances (you know, the hundreds of millions of routers, firewalls, etc.) cannot use an authority cert. The choice is between self-signed and no encryption only, and Firefox is pushing manufacturers towards the less secure option.

    2. Typically, you first encounter a self-signed cert in a secure context (for example, setting up such an appliance by plugging it directly into your PC and visiting the web interface). After that, all you care about is whether the cert changes. The whole man-in-the-middle thing is NOT a guaranteed problem with self-signed certs.

    3. Real cert authorities are not the invulnerable swiss banks everyone thinks they are. They can and have issued certs when they shouldn't have. And that isn't just new certs; last week there was a story about a Firefox-trusted cert authority that issued a Microsoft live.com domain cert to someone. So those who think authority certs are secure are deluding themselves.

    In the end, Firefox's current behavior does not promote security; it simply makes life hard and annoying for legitimate users.

  • by swilver ( 617741 ) on Friday August 22, 2008 @08:58AM (#24703953)
    Arguably, sites that use SSL are more secure than regular HTTP sites. Why then are no big red warnings displayed for every regular HTTP site visited?
  • Re:Worth it. (Score:5, Insightful)

    by Anonymous Coward on Friday August 22, 2008 @08:58AM (#24703955)

    amen. The error message seems to be designed for people who know about these things, not mom and pop users.

    I don't follow this sentence. That seems to describe *precisely* the old way of doing things, an easily dismissable box that only experts took note of and understood. The new method is *supposed* to bother users and get them to pay attention to the actual risk, while offering them a way to still accept it.

    Whether or not you think being bothersome to users is a legitimate technique can and should be open to debate, but I don't think it targets experts at all...

  • by phoenix321 ( 734987 ) * on Friday August 22, 2008 @08:58AM (#24703957)

    How do you know it is YOUR wireless broadband router admin site, then? It could be anyone who just managed to re-route your connection.

    Why should you use encryption (securing transit lines) when you don't need authentication (securing transit endpoints)? When you're not sure if the endpoint you're talking to is the one you want, you could as well transmit everything in cleartext, because your receiving endpoint might as well be the eavesdropper himself.

  • Re:Worth it. (Score:5, Insightful)

    by HungryHobo ( 1314109 ) on Friday August 22, 2008 @09:03AM (#24704051)

    They could do with a red-yellow-green warning system.

    Red- sites with self signed certs which have changed since the last time you have visited them(keeping a record of all certs accepted to this point would be a good idea to help with this)
    Yellow- Self signed cert. Warning first time you go to the site with accept/reject.
    Green- Signed and verified by trusted 3rd party.

    Sites which have a signed and verified cert and which have marked themselves as "should always be HTTPS" but which you are visiting with HTTP -should be red as well.
    This way if some phisher sent you a link to http:\\paypal.com and paypal had registered with the trusted 3rd party that their site should always be using HTTPS then you get a red warning. Yes I know this would mean traffic to the trusted 3rd party whenever you visit any http site.

  • Re:Worth it. (Score:4, Insightful)

    by HungryHobo ( 1314109 ) on Friday August 22, 2008 @09:06AM (#24704079)

    yes but it shouldn't treat a self signed cert worse than no cert unless it has changed since your last visit and if this is your first visit then it shouldn't be more creepy than simple http(no warning at all so your average mom and pop won't even think they're being scammed).

  • by morgan_greywolf ( 835522 ) * on Friday August 22, 2008 @09:07AM (#24704093) Homepage Journal

    Expired or self-signed certs have no value, one would expect admins to have the minimum awareness (professionalism?) to maintain them correctly? Or is even that too much to ask?

    Internally in a network where you can trust all the traffic, self-signed certs aren't much of a problem. In fact, they work just fine. Yes, it would be nice if we could do away with them and generate our own through our own internal root CA, but then some devices just don't let you add your own cert.

    But, yes, self-signed certs have a time and a place. You have to be careful and validate the cert's fingerprint -- possibly even by hand.

  • by w4rl5ck ( 531459 ) on Friday August 22, 2008 @09:07AM (#24704095) Homepage

    which is the problem here.

    FF2 had a warning message about self-signed certificates, too. The problem in my opinion is the way it is presented, and how the "exception" thing is handled from a user perspective.

    In FF2, you simply had to accept the certificate, and "go" for it. So far so good. Warning message, "OK, I know what I'm doing".

    Downside: anyone just klicks "yes" in ANY message, so where's the security in that?

    Anyway, with the new scheme, it's simply annoying, even if you know what you are doing. I.e. I need to use some development installations of software for testing purposes, and of course, whe have to test the ssl-encrypted parts, too. Buying certificates for all this development setups would be stupid (like, throwing the money out of the window).

    Why do I have to click FOUR times to simply say "this site is OK for me", while I only have to click once for popups, for auto-fillin for login data, and so on?

    Just one simple "add an exception" that does the trick WITHOUT forcing me to:

    - *manually* (!!!) FETCH and DISPLAY the certificate before I can accept it (hell, I KNOW it's valid, I generated it myself! And a "normal user" can't understand ANYTHING in the certificate details, so what's the point? And no, they won't "learn", either!)
    - yes, I'm sure, I want an exception
    - yes, for real, I ...

  • by MiKM ( 752717 ) on Friday August 22, 2008 @09:11AM (#24704155)
    Unlike sites with self-signed certs, sites with vanilla HTTP make no claim about their security.
  • That's the point (Score:5, Insightful)

    by Anonymous Coward on Friday August 22, 2008 @09:11AM (#24704157)

    amen. The error message seems to be designed for people who know about these things, not mom and pop users.

    Mom and pop users should never, ever go to a website with self-signed or expired certs. It's true that there a lot of legitimate sites that fit the category, it might even be true that most of the self-signed sites are legit. The problem is that mom and pop users are not savvy enough to distrust anything, unless there's a big fat warning there.

    Firefox 3 allows you to permanently accept those certificates. If you're computer literate enough to know about these things, you whitelist those sites. If you're a mom and pop user, you call a tech savvy family member / friend / neighbor / neighbor's kid to vouch the site for you and whitelist it.

  • by Timothy Brownawell ( 627747 ) <tbrownaw@prjek.net> on Friday August 22, 2008 @09:13AM (#24704191) Homepage Journal

    Isn't scaring away inexperienced users from sites with questionable security the whole point of those warnings?

    I mean a user friendly message that lets someone get past it really easily wouldn't exactly get the job done.

    Plain http is even more questionable, and somehow it doesn't complain about that. Also, some people tend to think that CAs are more security theater than real security, and there are better ways to do things.

  • by William Ager ( 1157031 ) on Friday August 22, 2008 @09:19AM (#24704275)
    Because it's the same certificate that was there last year?

    Self-signed certs do not necessarily constitute poor security. That said, they generally do. In my case, I sign my certs with a single CA, and then add that cert to all of my computers.
  • Re:Worth it. (Score:5, Insightful)

    by exi1ed0ne ( 647852 ) * <exile@pessim[ ]s.net ['ist' in gap]> on Friday August 22, 2008 @09:20AM (#24704295) Homepage

    A proper certificate is around 10 bucks per year and although they issue it to anyone, it is security at a much higher level than using a self-signed crutch.

    Currently the only difference between a self signed cert and a $10 one is that the latter leaves you $10 poorer. There is no practical difference between the two. As a matter of fact, the current methodology of including certain CAs in browsers provides a false sense of security - which decreases the value of the system as a whole.

  • Re:Worth it. (Score:3, Insightful)

    by erikina ( 1112587 ) <eri.kina@gmail.com> on Friday August 22, 2008 @09:20AM (#24704297) Homepage
    Good idea. But the browser should automatically accept self signed certs. After all, it'll automatically accept insecure (http) connections.

    Just give them both yellow. And make know they need a green before doing anything really sensitive.
  • Re:Worth it. (Score:5, Insightful)

    by Zeinfeld ( 263942 ) on Friday August 22, 2008 @09:23AM (#24704335) Homepage
    It's supposed to be creepy, because it may be the only warning you're the victim of a DNS poisoning and you're not at the site you think you are, or you're the victim of a man-in-the-middle attack and your "encrypted" communications are being intercepted and read.

    This whole debate is rather off the point. Making changes to a security protocol in response to the last Slashdot thread is not exactly the best idea. There are more issues than just whether people can save a buck and get encryption. As you point out the point of the certificate is authentication, not encryption.

    Back in 1995 the Netscape folk decided to write the protocol in such a way that you had to have authentication of the server public key to do encryption. As it happens I argued against that choice at the time, and again when the self-signed certs issue came up again a few years ago I have consistently argued that the browser should allow ANY connection to be encrypted with ANY key, just don't bother to worry the user about it unless the cert is trustworthy according to the user spec.

    There are in fact changes in the works here. I am part of a W3C working group where we have discussed this exact issue. I have consistently argued for eliminating all security pop-up warnings of all types - they are designed to dump responsibility for security onto the user rather than be actually useful. I have also argued to make use of self-signed certificates easier as we should be moving to a position where security is the default on the Web.

    Yes I do work for a CA, no I am not speaking for them on this particular occasion, but we have consistently argued to make use of unpaid cryptography as easy as possible because anything that expands the use of cryptography is going to eventually expand the demand for authenticated keys. I really don't think that we will have large numbers of people stop paying the price of a Thawte or GeoTrust cert and switch to a self-signed. More businesses will go the other way.

    Its the same argument on code signing: all code should be signed, even development compiles. But only final production code should be signed with a trustworthy key - or the key is not going to be trustworthy very long. And only some final code will be signed by CA accredited keys. But that is fine if the O/S allows you to make statements of the sort 'drivers have to be signed by a trusted root, programs signed off a Web o' Trust key can run but only with restricted privs'.

  • Re:Worth it. (Score:5, Insightful)

    by MadnessASAP ( 1052274 ) <madnessasap@gmail.com> on Friday August 22, 2008 @09:28AM (#24704427)

    I agree totally, the problem isn't the scary browser notices. It's websites and their poor security practices perhaps now that those practices are having a noticeable impact on their business these websites will change said practices and it wont be a problem anymore.

  • by clare-ents ( 153285 ) on Friday August 22, 2008 @09:29AM (#24704435) Homepage

    My router cost £20. A certificate costs ~ £60/year. I've used my router for nearly 5 years. Could you explain in detail how much benefit I would get from the extra £300/year - a 15000% increase in price ? Please bear in mind I can trace the cable all the way from my desktop machine to my router.

    In particular, please give reference to the increased utility compared to other things I could do with that £300, for example buying a sanitation block for 150 Indian School children.

    http://www.wateraid.org/uk/donate/4467.asp [wateraid.org]

    Just to clarify, the UK tax system with gift aid would increase the £300 to £384, given charitably, which is close enough to the £385 purchase price listed there.

    Other things you might like to consider in your answer are why an SSL certificate for my router is more worthwhile than an eeePC (£200), six weeks food (~£300), a Linlithgow 30 year old whisky (£289) or a 24inch widescreen monitor (~£230).

  • by Lord Ender ( 156273 ) on Friday August 22, 2008 @09:31AM (#24704455) Homepage

    A false sense of security is worse than a known insecurity.

  • Re:Worth it. (Score:2, Insightful)

    by Anonymous Coward on Friday August 22, 2008 @09:31AM (#24704463)
    i guess color-blind people will be pretty screwed then
  • Re:Worth it. (Score:2, Insightful)

    by dr.ka0s ( 549707 ) on Friday August 22, 2008 @09:32AM (#24704467)
    Damn straight! Instead of picking of FF for doing an effective job of exposing risk, we should be picking on those who run "legitimate" sites that haven't seen the need to stay on top of certificate updates. The whole point here is to make VERY clear to the user that FF is unable to determine the legitimacy of a "supposedly secure" site because the site owners haven't kept up their end of the bargain!
  • by huge ( 52607 ) on Friday August 22, 2008 @09:35AM (#24704499)

    You are talking about encryption while the error message is about authentication. While these two are closely related in this context, they are different things.

    SSL without proper chain of trust (authentication) is secure against eavesdropping but not MitM. Properly implemented SSL is resistant against both. SSL was designed for both authentication and encryption so it shouldn't automatically degrade to encryption-only.

    The difference is that admins of the SSL site want that their users make sure that they are connecting to the correct server. It's the admin of the site who is requesting the browser to flag up any potential problem with the connection. If they wouldn't care, they wouldn't have used SSL in the first place.

  • Re:Worth it. (Score:3, Insightful)

    by blowdart ( 31458 ) on Friday August 22, 2008 @09:35AM (#24704511) Homepage
    Oh goodness no; think of the phishing problems. If you automatically accept without warning then phishing sites will look more legitimate. You may argue that the yellow will help but users don't pay attention to things like that; as long as it indicates there's some protection they'll accept that.
  • by unity100 ( 970058 ) on Friday August 22, 2008 @09:38AM (#24704539) Homepage Journal
    when i criticized it and said it will hurt a lot of small businesses and communities, some people came up with darwinian shit like 'if they are not able to afford a $100 buck a year ssl, they dont deserve to be on the internet anyway'.

    and look now, even the biggest can be affected by this overzealous, self righteous implementation in ff3, not only small businesses and communities who are 'so easily forfeitable'.

    i wonder what those people have to say now.
  • by itsdapead ( 734413 ) on Friday August 22, 2008 @09:43AM (#24704625)

    I know using actual evidence is unfashionable, but lets try connecting to a self-signed https page from some popular browsers, shall we?

    Firefox 3

    Secure Connection Failed

    phishing.itsdapead.org uses an invalid security certificate.
    The certificate is not trusted because the issuer certificate is unknown.
    The certificate is only valid for mycomputer.itsdapead.com

    • This could be a problem with the server's configuration, or it could be someone trying to impersonate the server.
    • If you have connected to this server successfully in the past, the error may be temporary, and you can try again later.

    [Or you can add an exception]

    Internet explorer 7:

    There is a problem with this website's security certificate.
    The security certificate presented by this website was not issued by a trusted certificate authority.
    The security certificate presented by this website was issued for a different website's address.
    Security certificate problems may indicate an attempt to fool you or intercept any data you send to the server.
    We recommend that you close this webpage and do not continue to this website.

    Click here to close this webpage.
    Continue to this website (not recommended).

    Or Safari 3:

    The certificate for this website was signed by an unknown certifying authority. You might be connecting to a website that is pretending to be "phishing.itsdapead.org" which could put your confidential information at risk. Would you like to connect to the website anyway?

    How about Opera 9.5?

    The server's certificate chain is incomplete, and the signer(s) are not registered. Accept?

    [Help] [Reject] [Approve]

    Sorry, I don't believe that - Opera is meant to be good isn't it? Let's try again: (ahem) Opera 9.5?

    The server's certificate chain is incomplete, and the signer(s) are not registered. Accept?

    [Help] [Reject] [Approve]

    Ye gods - I wasn't imagining it! Deary, deary me...

    Now, from where I'm standing:

    1. All browsers show minor variations on the same behavior - so why is Firefox singled out?
    2. For my money, Safari does slightly better at explaining the issue with an appropriate level of detail. Marginally.
    3. Only IE and Firefox have bothered to warn me that, not only is the cert self-signed but the URLs don't match
    4. Opera's risible message was presumably written by someone who expects all internet users to have a CS degree. Hope that's fixed in later versions.

    Plus, Firefox is pushing the extended info scheme whereby the certificate holder's name gets displayed on the info bar (as opposed to the old scheme where ploughing through the certificate might reveal the holder's name), which should be a good thing.

  • Re:Worth it. (Score:5, Insightful)

    by Anonymous Conrad ( 600139 ) on Friday August 22, 2008 @09:44AM (#24704645)

    Good idea. But the browser should automatically accept self signed certs. After all, it'll automatically accept insecure (http) connections.

    No! You switch to https to get a secure connection to who you're intending to talk to. A self-signed certificate doesn't tell you anything about who you're talking to. If you don't want security, stay on http.

  • Re:Worth it. (Score:4, Insightful)

    by illumin8 ( 148082 ) on Friday August 22, 2008 @09:46AM (#24704669) Journal

    As it happens I argued against that choice at the time, and again when the self-signed certs issue came up again a few years ago I have consistently argued that the browser should allow ANY connection to be encrypted with ANY key, just don't bother to worry the user about it unless the cert is trustworthy according to the user spec.

    Don't you see a small problem with that? Don't let the user know that the free wifi access point they're using internet from is doing a man in the middle attack when they login to their bank account with what they think is SSL? Because, after all, encryption is better than no encryption.

    Encryption is not always a good thing, especially if there is no trust. You work at a CA, you should know that. Encryption without trust gives you the false impression that your data is safe. When really, all it takes is a trivial Linux box serving as a transparent proxy at the local free wifi hotspot to capture hundreds or thousands of banking passwords. After all, you get a certificate (even though it's invalid), so you should be able to just not let the user know about it and trust it anyway, right?

  • Re:Worth it. (Score:5, Insightful)

    by jeroen94704 ( 542819 ) on Friday August 22, 2008 @09:49AM (#24704713)
    The problem is that mom and pop users are not the ones who should solve this issue, cannot be educated about cryptography in a warning message AND are the most likely victims of phishing attacks and such. The people who complain about the number of steps to set up an exception are also the people who can make an informed judgment about the trustworthiness of a site to begin with. We should NOT be putting mom and pop at risk for the convenience of the knowledgeable minority of users. The sites mom and pop are most likely to visit will have their certificates in order anyway (or should have, at least). Not being able to access some legitimate sites that insist on using self-signed certificates is a small price to pay.
  • by swilver ( 617741 ) on Friday August 22, 2008 @09:52AM (#24704765)

    Which is exactly what HTTP does, it provides you with a false sense of security (as in, no warnings at all), while a slightly more secure solution is billed as something you must avoid like the plague.

    Self-signed certificates should be accepted automatically and displayed and treated as a regular HTTP site. No green status bar. Issue a warning though if the certificate changed.

  • by illumin8 ( 148082 ) on Friday August 22, 2008 @09:53AM (#24704783) Journal

    You see, self-signed certificates are only wide open to MITM attacks if the person monitoring you was replacing all certificates pro-actively before you even visited the website once. If you however have visited the site before, Firefox will warn you that the certicate has changed when a MITM changes it. At this point Firefox should display a big red warning.

    You conveniently ignore the fact that there are many times when a customer might be visiting the website for the first time from a new computer. Let's say I'm on vacation, pop into a public library to check my bank balance, and logon to my bank website. How do I know if I'm safe from MITM without a trusted cert? You expect me to remember the fingerprint of my bank's real SSL certificate and check every digit? You expect Joe Average to do this?

    Trust and CAs exist for a reason. Underqualified webmasters just need to let this one go. They don't understand the reason trust is required to secure financial data on the internet, and they're just asking us to make everyone less secure because they can't do their job properly and keep their certs up to date.

  • by skeeto ( 1138903 ) on Friday August 22, 2008 @09:57AM (#24704851)

    In many cases, people are perfectly happy with SSL just keeping the traffic from the prying eyes

    That's the whole point: self-signed certs don't prevent prying eyes in the slightest. For example, it would be trivial for a tor exit node to intercept and swap self-signed certs and read all your traffic without you knowing. It is just security theater. No security (http) is better than false scurity (blindly trusting self-signed certs).

  • Comment removed (Score:5, Insightful)

    by account_deleted ( 4530225 ) on Friday August 22, 2008 @10:02AM (#24704909)
    Comment removed based on user account deletion
  • by gambino21 ( 809810 ) on Friday August 22, 2008 @10:02AM (#24704917)

    Mom and pop users should never, ever go to a website with self-signed or expired certs.

    You might want to add that Mom and pop users should never go to a website using basic http. Since many phishing sites don't bother with https. The ones that do use https could set up a domain name like www.phish.com/paypal and get their certificate signed by a thirdparty. Now those Mom and pop users can go to the https site will a full sense of security. Do you think that mom and pop users will tell the difference? I know my Mom wouldn't.

  • Re:Worth it. (Score:5, Insightful)

    by Matthieu Araman ( 823 ) on Friday August 22, 2008 @10:05AM (#24704943)

    No, if the site uses SSL and the certificate is invalid, it may be a "Man in the middle attack".
    You can't just treat this like a http connection and not warn the user.
    There are many sites which should use real encrypted connections (ie with a signed certificate + SSL). I'm not fond of sending sensitive info in the clear (that's about the same thing with a self-signed certificate...)
    StartCom/StartSSL certificate are free and works with Firefox (and other CA are mostly cheap) so price is no longer an excuse...

  • by Goaway ( 82658 ) on Friday August 22, 2008 @10:06AM (#24704957) Homepage

    You see, self-signed certificates are only wide open to MITM attacks if the person monitoring you was replacing all certificates pro-actively before you even visited the website once.

    I don't know about you, but personally I have not yet visited the majority of the sites on the internet. Thus this is a pretty significant attack vector for me.

    Furthermore, and this is the part that people like you donot seem to grasp, there IS use for encryption beyond protection from MITM attacks. Using SSL encryption protects me from password sniffers that sit on my network, or in my wireless neighbourhood or from some comprimised router my request travels over.

    Except of course if that router MITM's you instead of just trying to eavesdrop. Or if that password sniffer on your local network manages to redirect your traffic through itself so it can MITM you too.

  • Re:Worth it. (Score:5, Insightful)

    by croddy ( 659025 ) * on Friday August 22, 2008 @10:12AM (#24705025)

    No, I use SSL to obscure my messages from people in between me and the server. If I want to verify the party to whom I'm speaking, I'll go over there myself with a 6-pack.

    The funny thing about that 6-pack is that it costs more than the "real" SSL certificate, and I actually have to show ID sometimes to get it.

  • Re:Worth it. (Score:4, Insightful)

    by huge ( 52607 ) on Friday August 22, 2008 @10:14AM (#24705061)

    Hell no!

    The difference is that when user is using HTTP there is no expectation of security while using SSL one assumes that connection is encrypted and authenticated.

  • Re:Worth it. (Score:3, Insightful)

    by scorp1us ( 235526 ) on Friday August 22, 2008 @10:17AM (#24705103) Journal

    Mod parent down, it is the opposite of insightful.

    In a perfect world, the parent is right, some cert > no cert.

    However, given the recent disclosure of the DNS vulnerability, and that the fix does not fix anything. Certs are fundamentally used to establish identity, not provide encryption. You can *NEVER* establish identity with a self-signed cert. Even with a cert from an authority the idea of "trust" is not binary. Gaining trust is subjective, and when you trust an authority, you implicitly effectively incorporate and endorse their verification methods them as your own.

    The only thing you can establish with a self-signed cert that is that the cert has not changed. For this to be secure, you need the first time you see the cert for it to be accurate. But there is a flip side. If an attacker get his cert to you first, and the attack ends, and the real cert is restored, then you don't know if the attack just ended or started. You have 0 additional information.

    Your mom and pops need to get authority-signed certs.

  • Re:Worth it. (Score:0, Insightful)

    by Anonymous Coward on Friday August 22, 2008 @10:25AM (#24705251)

    I use SSL to obscure my messages from people in between me and the server.

    Well, except for the person between you and the server running the successful man in the middle attack because you didn't bother to verify the certificate.

  • Re:Worth it. (Score:3, Insightful)

    by calmofthestorm ( 1344385 ) on Friday August 22, 2008 @10:25AM (#24705253)
    Um...there are plenty of legitimate sites that don't have signed certs by some arbitrary company. Mozilla is welcome to add our root CA to their trusted list whenever they want.
  • Re:Worth it. (Score:4, Insightful)

    by LordLucless ( 582312 ) on Friday August 22, 2008 @10:35AM (#24705437)
    If you visit a site that doesn't use SSL, you'll never get any warning that you may be the victim of a man-in-the-middle or DNS poisoning attack.

    What you say is true. It doesn't make the parent's post any less true though. SSL > Self-Signed > HTTP.
  • Re:Worth it. (Score:4, Insightful)

    by Sloppy ( 14984 ) on Friday August 22, 2008 @10:39AM (#24705513) Homepage Journal

    as long as it indicates there's some protection they'll accept that.

    So don't "indicate there's some protection." Just have it work at least as well as unencrypted connections, since it is at least as safe. If someone gets phished this way, then they're also getting phished every day on unencrypted connections.

  • by Hyppy ( 74366 ) on Friday August 22, 2008 @10:44AM (#24705601)

    You might want to add that Mom and pop users should never go to a website using basic http

    Really, now? So, you propose that the vast majority of internet servers are reconfigured to accept SSL connections? And then, should we upgrade the borderline-performance servers so the SSL encryption doesn't drag them down to the speed of an underclocked 486?

    I'll tell you what: you foot the bill, then I'll get the ball rolling.

  • Re:Worth it. (Score:3, Insightful)

    by Hyppy ( 74366 ) on Friday August 22, 2008 @10:46AM (#24705621)
    If an e-business can't even put forth that effort, than they don't deserve my business.

    Heck, if it's only 14 dollars and an email away, the only reason any website uses self-signed certs is philosophical at best.
  • Re:Worth it. (Score:3, Insightful)

    by exi1ed0ne ( 647852 ) * <exile@pessim[ ]s.net ['ist' in gap]> on Friday August 22, 2008 @10:47AM (#24705629) Homepage

    Bah, that's only true if you believe Verisign, et al, don't actually perform proper diligence to validate that the owner of the certificate is who they say they are.

    Last time I bought a cert, the only diligence performed was to make sure they could charge my credit card. That is hardly inspiring verification that I'm actually who I say I am.

  • Re:Worth it. (Score:5, Insightful)

    by initdeep ( 1073290 ) on Friday August 22, 2008 @11:09AM (#24706013)

    Do you feel the same way about UAC in Vista?

    It serves the EXACT same purpose.

  • by joebok ( 457904 ) on Friday August 22, 2008 @11:18AM (#24706193) Homepage Journal

    Why pay anything per year? If all you want is encryption between client and server then a self-signed cert is perfectly fine.

  • Re:Worth it. (Score:4, Insightful)

    by huge ( 52607 ) on Friday August 22, 2008 @11:29AM (#24706353)

    Most users probably don't choose to use SSL. Usually it's the server that decides it by redirecting or posting to a secure page (bad idea, anyway!) If the user types in, "mybank.com" into their address bar, the default is to try http on port 80 first. A man in the middle can intercept this, and then it's game over, anyway.

    If you rely on the end-user for security, you might as well give up.

    If I submit a form over HTTPS I expect the connection to be authenticated and encrypted. If somebody manages to stage a MitM attack on me, it'll be detected immediately as I'm using SSL. But what you are saying is that browser should just accept the invalid certificate and submit the data anyway. It could be that the attacker couldn't compromise the form I was filling in as it came from different server or from local disk.

    Dude, you have to be on crack.

    Even if uninformed public would somehow benefit (which I highly doubt) from this 'solution' of yours, it would still hurt those that actually know what they are doing. It would also make sure that those few users that actually choose to use SSL couldn't use it for purposes it was intended.

  • by lord_sarpedon ( 917201 ) on Friday August 22, 2008 @11:34AM (#24706453)

    If you visit a website with either an expired or a self-signed SSL certificate, Firefox 3 will prevent the page from loading, to protect your secure cookies and personal info from what may be a malicious page. Instead it will display a warning... To get past this warning page, users have to go through four different steps before they can be understood to have declared intent to accept the possible consequences, which from a usability standpoint is far from ideal - the users are much more accustomed to signing their death warrants by pressing a single 'Allow' button, so multiple steps for an extremely rare security warning is heretical. This way of handling websites with expired or self-signed SSL certificates is bound to scare away a lot of inexperienced users, who, with their extensive knowledge of cryptography and public key infrastructure, really need not be intimidated with facts and scary words.

    This is quite obviously a debate among morons. I'm glad firefox is doing it right.

  • Re:Worth it. (Score:4, Insightful)

    by Sancho ( 17056 ) * on Friday August 22, 2008 @11:42AM (#24706581) Homepage

    You're not the average user. Most people on Slashdot aren't the average user.

    But what you are saying is that browser should just accept the invalid certificate and submit the data anyway.

    I didn't say that anywhere. Please do not put words in my mouth.

    What I am saying is that a lot of users don't have an expectation of privacy. They only notice problems. When there aren't warning dialogs popping up, they don't think about security. I'm saying that the entire paradigm is flawed because of this. Instead of SSL being the exception, it should be the rule, and deviation from the rule should be pointed out to the user every single time.

    But even then, it probably wouldn't be enough. People have to have their crazy cursors and their dancing baby desktops.

    You seem to have written your entire post with the assumption that I was agreeing or disagreeing with any of the posts directly above me. Not everyone automatically shares or rejects the opinions of the posts to which they reply. I simply thought it might spawn interesting discussion to point out that users may fall for MITM if they never even see a lock up in the corner of their browser window.

    Want some evidence? People fall for phishing. I work for an ISP which has monitored phishing in the past, and quite simply, people will reply to the e-mails with their passwords and visit the webpages entering in their credentials. Every major phishing event has included people doing this. What makes you think that these same people will suddenly be security-aware when someone is intercepting their connections to mybank.com over port 80?

    Take a major banking website:
    http://www.citibank.com/us/index.htm [citibank.com]
    (I found this page by simply typing citibank.com into my browser.)

    What happens when you go to that site? You go there, you click on "log me in" or whatever, and then it switches to SSL. Think the user is going to notice if it doesn't switch to SSL? Probably not. So one could MITM this site pretty easily and harvest logins. SSL never even comes into play. All of the "self-signed certs are no worse" or "ca-signed certs are way better" arguments don't even matter, now.

  • by Dr.Dubious DDQ ( 11968 ) on Friday August 22, 2008 @11:44AM (#24706613) Homepage
    "Why pay anything per year?"

    StartSSL supposedly offers free-as-in-free-beer SSL certificate-signing services, but even that's not really the issue in my opinion.

    Why are we being told that we must get permission from a "trusted" authority in order to "legitimately" use encryption?

    I wouldn't have even blinked if a commercial, proprietary browser started doing this...but "open source" Mozilla? Campaigning against do-it-yourself encryption? Just to "scare consumers" away from things that might possibly maybe be bad? That just seems completely wrong. The use-case mentioned above of the wifi router which can't necessarily get a "trusted authority" to verify due to lack of a FQDN is a good example of why this shouldn't just be of interest to do-it-yourself hobbyist nerds.

    I still fail to see how being driven away from anti-eavesdropping (but unauthenticated) communications to completely unencrypted AND unauthenticated communications makes people "safer" and am a bit baffled that Mozilla is now treating unauthenticated certificates exactly like fraudelently authenticated certificates.

    The usual retort here assumes that the only alternative is that self-signed certificates be treated the same as authenticated certificates and therefore people will somehow think they're "safe" even though there's a chance the site at the other end might possibly be involved with a "Man-in-the-middle" attack. There's also a disturbing assumption that only corporate "e-commerce" and government sites have any interest in "legitimate" encryption (the "they'll just go out of business if they don't 'buy' a certificate" arguments...). Of course, we do have to worry about the teeming masses of evildoers who break into people's houses to replace their wifi routers in order to steal their slashdot.org login password...

    Why they don't want to consider having a third "encrypted but not 'secure'" state for correct but unauthenticated (self-signed) certificates or certificates that have gone past the arbitrary expiration date encoded in it I also don't know. Does Mozilla corporation have some kind of "partnership" with some of the big "Trusted Authorities" or something?

  • by houstonbofh ( 602064 ) on Friday August 22, 2008 @11:58AM (#24706849)
    And for the 50 routers I manage and have to click a bazillion times to enter, that is still $1500 a year. The question remains, WHY CAN'T I TURN IT OFF?!!!
  • Re:Worth it. (Score:3, Insightful)

    by theCoder ( 23772 ) on Friday August 22, 2008 @12:30PM (#24707357) Homepage Journal

    The self-signed certificate LOOKS *EXACTLY* the same as a MAN IN THE MIDDLE ATTACK.

    Only if there is a MITM attack the first time you connect to the site. And every other time you connect to the site. I admit, there is a potential danger. But the same danger exists for SSH. The first time you connect to your ssh server, you download the server's key. Maybe you verify it, but now it's in the ssh client's cache of keys. The next time you connect to the server, the client compares the key to the cached version. If they're different, it lets you know something weird is going on. Otherwise, it connects without issue because the only way there could be a MITM attack the second (and third, and so on) time you connect is if there was always been a MITM attack going on.

    As others have pointed out, the security of connections goes like:

    CA signed cert > self signed cert > no cert

    However, FF3 makes the self signed cert a bigger PITA to deal with than no cert. There are lots of ways Firefox could make it clear that the self signed cert is not completely safe without subjecting users to confusing warning screens.

  • Re:Worth it. (Score:5, Insightful)

    by onefriedrice ( 1171917 ) on Friday August 22, 2008 @12:59PM (#24707839)
    All of this new talk about self-signed certificates is clouding over the real, critical issue which has been around for longer than FF3. It would make more sense for the browser to treat a self-signed certificate like a CA-signed certificate rather than a regular http connection because (and here's the point) authentication in the browser is a myth. Let me walk you through this.

    Authentication doesn't exist on the internet because getting a genuine CA-signed certificate from a CA with a root that is already in your browser is hardly any more difficult or expensive than making a self-signed certificate. The tragedy is that the lock icon makes people feel safe when in reality, the authentication of the transaction relies entirely on supposed background checks which may or may not have been done by some CA that you won't know about unless you examine the certificate.

    Does anyone else see the problem with this!?

    A better idea is for the browser to raise the big warning flags for changed certificates (CA-signed or otherwise) so users can check manually whether it is a man-in-the-middle attempt or an official updated certificate from the site, and treat all https transactions as encrypted and better than a transaction with no encryption (regular http).

    A better long-term fix for this problem is to create a system (or use the system we have) to actually ensure authentication on the internet. For this to happen, we need browsers to stop including CA roots from CAs which happily sign certificates with zero or insufficient background checks. Of course this isn't bulletproof, but it would go a long way to providing real authentication on the internet.

    In the meantime, people need to stop thinking CA-signed certificates are very much safer than self-signed certificates. A CA-signed certificate from a specific CA that is known to provide good background checks is useful for authentication, but a CA-signed certificate from some random hole-in-the-wall CA that has a root in your browser provides no more authentication than a self-signed certificate does. At least its a step in the right direction for FF3 to show some information about the certificate from the URL bar rather than making users examine the certificate so that we can make our own determination of whether we trust the site based on if we trust the CA or not. Anyway, it's really the changed certificate that you need to worry about, regardless of who signed it, and encryption is also better than no encryption since at least the sniffers won't also get your info.
  • by Dr.Dubious DDQ ( 11968 ) on Friday August 22, 2008 @01:15PM (#24708137) Homepage
    That really has nothing to do with what I said - I'm comparing unauthenticated (self-signed) encrypted sites with unauthenticated UNencrypted sites (no certificate at all). Neither is more subject to the "man in the middle attacks" than the other (unless unencrypted sites are marginally more popular for this due to not having the hassle of setting up encryption). The point is that encrypted but unauthenticated communications are at least secure from eavesdropping between the user and the site, giving it one layer of security (against what I presume is a much more common threat - traffic "sniffing" is much, much easier to accomplish than man-in-the-middle attacks). The seatbelt in my car doesn't protect me from "terrorism", but I'm far more at risk of an automobile accident. I'm not going to stop wearing a seatbelt just because I don't also have armed anti-terrorism agents riding around in my backseat at the same time.
  • by LarsG ( 31008 ) on Friday August 22, 2008 @03:22PM (#24710479) Journal

    Exactly.

    This is an UI issue. The "is this really $my_bank.com" question is already handled by the EV certs and green address bar.

    Making people jump through unnecessary hoops to use self-signed certificates is just counter-productive, since it makes using encryption that much harder. Self-signed doesn't protect you against mitm but it protects you against an eavesdropper; it moves eavesdropping from a passive to an active attack. So the right question to ask is "Why do we want to make encrypted non-authenticated harder to use than not encrypted at all?".

    having a third "encrypted but not 'secure'" state

    It is really four states.

    EV-cert, green address bar.
    Cert signed by trusted CA, padlock.
    Self-signed/expired, some indication that the connection is encrypted but not authenticated.
    Plain http, should really have a big red warning sign.

  • Re:Worth it. (Score:3, Insightful)

    by profplump ( 309017 ) <zach-slashjunk@kotlarek.com> on Friday August 22, 2008 @07:48PM (#24713813)

    It's not safer from MitM. But it's a lot safer from passive sniffing. I don't care what the /. trolls tell you -- MitM is quite a bit harder to pull off than passive sniffing.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...