Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Chrome Google Security The Internet Technology

No More SSL Revocation Checking For Chrome 152

New submitter mwehle writes with this bit from Ars Technica: "Google's Chrome browser will stop relying on a decades-old method for ensuring secure sockets layer certificates are valid after one of the company's top engineers compared it to seat belts that break when they are needed most. The browser will stop querying CRL, or certificate revocation lists, and databases that rely on OCSP, or online certificate status protocol, Google researcher Adam Langley said in a blog post published on Sunday. He said the services, which browsers are supposed to query before trusting a credential for an SSL-protected address, don't make end users safer because Chrome and most other browsers establish the connection even when the services aren't able to ensure a certificate hasn't been tampered with."
This discussion has been archived. No new comments can be posted.

No More SSL Revocation Checking For Chrome

Comments Filter:
  • Why? (Score:5, Insightful)

    by John Hasler ( 414242 ) on Tuesday February 07, 2012 @12:37PM (#38955223) Homepage

    ...Chrome and most other browsers establish the connection even when the services aren't able to ensure a certificate hasn't been tampered with.

    Why?

  • Great idea. (Score:3, Insightful)

    by Targen ( 844972 ) on Tuesday February 07, 2012 @12:41PM (#38955305) Homepage

    Chrome and most other browsers establish the connection even when the services aren't able to ensure a certificate hasn't been tampered with.

    And the solution, obviously, is not checking at all. Slick.

  • Re:Why? (Score:5, Insightful)

    by Spad ( 470073 ) <`slashdot' `at' `spad.co.uk'> on Tuesday February 07, 2012 @12:42PM (#38955313) Homepage

    Because otherwise (as I've discovered by switching it on in Seamonkey) about 20% of the time the connection to the CRL/OCSP server fails for whatever reason and so your site won't load, even though there's nothing wrong with its certificate.

    Now you might argue that false positives are preferable to ignoring problems, but it does break the user experience pretty badly.

  • Re:Why? (Score:5, Insightful)

    by Richard_at_work ( 517087 ) on Tuesday February 07, 2012 @12:49PM (#38955423)

    Yes. Because if you are in a MITM position to inject your own compromised cert for site Y, then you are also in the perfect position to deny access to the cert validation servers to stop the validation happening.

    The solution is more resilient servers and services, not eliminating the checking.

  • Re:Why? (Score:5, Insightful)

    by Imagix ( 695350 ) on Tuesday February 07, 2012 @12:53PM (#38955497)

    Now you might argue that false positives are preferable to ignoring problems, but it does break the user experience pretty badly.

    And this is the problem with security. People want the security/safety.... unless it's inconvenient. And yes, there is something "wrong" with the certificate. It is unverifiable as to whether it is still valid. Which you asked it to do.

  • Re:Why? (Score:4, Insightful)

    by vlm ( 69642 ) on Tuesday February 07, 2012 @12:56PM (#38955553)

    The solution is more resilient servers and services, not eliminating the checking.

    Such as, say, having the Mighty GOOG distribute that "CRL in all but name". Which brings us full circle back to the original article, and what they're doing.

  • Re:Why? (Score:5, Insightful)

    by kbg ( 241421 ) on Tuesday February 07, 2012 @12:58PM (#38955597)

    "CRL/OCSP server fails for whatever reason".

    No it fails because the server administrators for the CRL are incompetent morons. A CRL server is a mission critical server that should stay up 24-7.

    If Chrome and other browsers would simply display an error page with text explaining the problem and point to the offending server, I am sure the problems would be fixed very quick.

  • Re:Why? (Score:5, Insightful)

    by kbg ( 241421 ) on Tuesday February 07, 2012 @01:03PM (#38955677)
    Yes it should. CRL server for X is mission critical and should always work. There is no excuse for it not working.
  • Re:Why? (Score:5, Insightful)

    by Anonymous Coward on Tuesday February 07, 2012 @01:11PM (#38955791)

    If a CA cannot keep their uptime, they shouldn't be in the business. Part of the fairly high cost of certificate purchases is the fact the CA is going to run multiple, geographically distributed data centers with adequate server coverage. That, or hire a provider that has is ready/willing/able to do this.

    It is just like banks -- if a bank's server failed causing a loss of transaction info for a period of time, nobody would care how hard it is to have 99.999% uptime -- the bank failed in its duties regardless of the reason (hardware failure, Internet issues, security issues, etc.) This is just the same with CAs and revocation.

  • Re:He's right (Score:4, Insightful)

    by xorsyst ( 1279232 ) on Tuesday February 07, 2012 @01:13PM (#38955823) Journal

    Opera didn't have to distribute a patch, because they use OCSP and CRLs properly. And I've never heard of anyone complaining that it causes a problem.

  • Re:Why? (Score:5, Insightful)

    by Guppy06 ( 410832 ) on Tuesday February 07, 2012 @01:17PM (#38955891)

    The real problem with false positives isn't that they are "inconvenient" but that they breed complacency. If 99% of the alerts you get are false, what are the odds you'll actually give enough due diligence to catch the remaining 1%?

  • Re:Why? (Score:5, Insightful)

    by Hentes ( 2461350 ) on Tuesday February 07, 2012 @01:31PM (#38956141)

    They could load the site and simultaneously display a small warning, thus letting the users decide whether they want to trust it or not. Loading an untrusted is not a tragedy by itself.

  • Re:Being Google (Score:5, Insightful)

    by Ferzerp ( 83619 ) on Tuesday February 07, 2012 @01:44PM (#38956407)

    Except now Google is presenting itself as an authority on the status of certificates that it has no business doing so with to the users of chrome.

    This is a bad thing.

  • Re:Why? (Score:4, Insightful)

    by Joce640k ( 829181 ) on Tuesday February 07, 2012 @02:13PM (#38956881) Homepage

    At the very least don't display the padlock icon as if everything is cool.

    (Also, keep retrying the certificate request to see if it succeeds. Change the padlock color when it does).

  • Re:Being Google (Score:4, Insightful)

    by swillden ( 191260 ) <shawn-ds@willden.org> on Tuesday February 07, 2012 @02:43PM (#38957401) Journal

    Except now Google is presenting itself as an authority on the status of certificates that it has no business doing so with to the users of chrome.

    This is a bad thing.

    Google is already the authority which decides which CAs will be trusted by Chrome. How does it really change anything if Google also collects the CA CRLs and pushes them to the browser? Other than making revocations much more reliable.

  • Re:Why? (Score:4, Insightful)

    by icebraining ( 1313345 ) on Tuesday February 07, 2012 @02:59PM (#38957647) Homepage

    That's not the only way to get a compromised certificate.

    Remember that any CA can create a certificate for any domain. So It might be that some attacker got hold of an intermediate CA certificate and issued a certificate for the bank's domain. Now, the CA detects the breach and revokes the intermediate certificate, but since Chrome fails to check them, it still gets accepted.

    You have a full MITM scenario without any fault from the bank or the bank's CA.

  • Re:Why? (Score:4, Insightful)

    by icebraining ( 1313345 ) on Tuesday February 07, 2012 @03:02PM (#38957683) Homepage

    Twitter as an example of reliability? Are you joking? You do know where the expression "fail whale" came from, right?

  • Re:Why? (Score:4, Insightful)

    by Guppy06 ( 410832 ) on Tuesday February 07, 2012 @05:04PM (#38959491)

    When was the last time you so much as looked out a window when you heard a car alarm?

"The one charm of marriage is that it makes a life of deception a neccessity." - Oscar Wilde

Working...