Google Chrome Will Soon Start Blocking Insecure Downloads (theverge.com) 139
"Google has revealed plans to initially warn Chrome users about 'insecure' downloads and eventually block them outright," reports The Verge.
The warnings will begin in April:
"Today we're announcing that Chrome will gradually ensure that secure (HTTPS) pages only download secure files," Joe DeBlasio of the Chrome security team wrote in a blog post. "Insecurely-downloaded files are a risk to users' security and privacy. For instance, insecurely-downloaded programs can be swapped out for malware by attackers, and eavesdroppers can read users' insecurely-downloaded bank statements."
Beginning with Chrome 82, due for release in April, Chrome will warn users if they're about to download mixed content executables from a secure website. Then, when version 83 is released, those executable downloads will be blocked and the warning will be applied to archive files. PDFs and .doc files will get the warning in Chrome 84, with audio, images, text, and video files displaying it by version 85. Finally, all mixed content downloads — a non-secure file coming from a secure site — will be blocked as of the release of Chrome 86. Right now, Google is estimating an October release for that build of the popular web browsing.
Beginning with Chrome 82, due for release in April, Chrome will warn users if they're about to download mixed content executables from a secure website. Then, when version 83 is released, those executable downloads will be blocked and the warning will be applied to archive files. PDFs and .doc files will get the warning in Chrome 84, with audio, images, text, and video files displaying it by version 85. Finally, all mixed content downloads — a non-secure file coming from a secure site — will be blocked as of the release of Chrome 86. Right now, Google is estimating an October release for that build of the popular web browsing.
Bad! (Score:5, Insightful)
Let me decide what to download and which sites to enter!
Re:Bad! (Score:5, Insightful)
Let me decide what to download and which sites to enter!
Exactly....as long as there's a way to override this then I'm okay with it, but stop holding my hand to the point where you won't fucking let go.
Warn me, nag me, chastise me, blah blah blah, but if I really really want to do it, get the hell out of my way.
Re:Bad! (Score:4, Interesting)
Google [maybe as a hired contractor] is weaponizing HTTPS to control what you see on the internet.
Re:Bad! (Score:5, Interesting)
Is this feasible, or am I being paranoid?
Re: (Score:2)
It's paranoia. If they did that it would be rejected by the rest of the world who want their own certificate authorities that they trust. For example the EU and China are not going to be okay with their certificate authorities, managing their local TLDs, being removed from browsers.
It would be easier for the US just to create a Chinese style firewall for the entire country, which I think it also highly unlikely.
Re: (Score:3)
The end game is that the United States National Security Agency previously infiltrated Google to take user data without a warrant and going forward Google is changing the whole world so that nobody can take user data without a warrant.
Compare that to Apple, who stores more customer private than any other company. Apple wanted to encrypt (end-to-end customer encrypte) this so that it could not access its customer's data. The FBI asked it not to do this and so Apple abandoned its plan.
Re: (Score:2)
Google is already a weapon. A terrible weapon. *Grabs Tin Hat*
Every credit card or bank login you have ever visited. Your security questions AND your two factor authentication.
You have ever typed into the Google product.
The economies of nations and it's peoples finances can be completely locked out. Go buy some gas? Get to work? Ship or buy food?
The top bidder isn't for money but for market share. *Cough* China * Cough*
Re: Bad! (Score:4, Insightful)
Re: (Score:2, Insightful)
Lol, Firefox, which now, when you open a new tab, tells you that you have to restart the whole browser before doing anything else because it updated in the background?
It's lovely when you have a bunch of shit open in other tabs that won't come back to the state you left it in if you reboot.
Re: (Score:2)
Re: (Score:2)
Not a problem in Linux where you control your upgrades. Just sayin... :)
Ummm, this happens on Linux too. It drives me bonkers, you literally can't get past it without doing the update.
Re: (Score:2)
Re: (Score:2)
I wonder how many people who know little past some basic terminal commands would even think of doing anything like this, let alone know how to do it. :\
unattended-upgrades by default (Score:2)
Yes, you can set it to auto update... But you can also not.
And most people don't change the default, which for Ubuntu is to turn on unattended-upgrades [debian.org]. I'm aware that Ubuntu is only one of many distributions of X11/Linux, but do more desktop Linux distributions have auto update on or off after installation?
Re: (Score:2)
You can set Mint to ask permission for all updates. but Firefox will still sometimes ambush you and force you to update, often losing some screens that have any kind of in-process thing going like forms or deeply-scrolled pages.
Re: (Score:2)
I'm trying to remember when we got to the point where the vast majority became willing to just bend down and take it :\
Heartless Multinational corporation: "We will abuse you and you will like it"
Heartless World LLC: "We won't abuse you as much as HMnC but we will abuse you" :\
Re: (Score:3)
I think the trick will be to copy the link and paste it in the address bar of a new tab.
The same trick that is used to hide the referer, for example to bypass anti-hotlinking protections.
Re: (Score:2)
Re: (Score:2)
Chrome has a lot of negative attributes (it's a resource hog for one) but their insistence on moderating my ability to use the web as I see fit has pretty much sealed the deal for me. Chrome is a heaping pile of garbage for anyone looking to do things on the web other then the corporately sanctioned activities.
Re: (Score:2)
The whole HTTPS thing is also bogus, it's a trap, designed to control the "unauthorized" distribution of information. Just hack the cert, and you can redirect/block anything.
Re: (Score:2)
Seriously, either skip SSL completely so your downloads work, or use SSL on both the downloads and the links to them!
This will only encourage site operators to "skip SSL completely so your downloads work," especially for (say) a page hosting an index of download URLs submitted by users.
Re: Bad! (Score:3)
Why? You might want https to process payments or authenticate users. But you may not care that your public files are not sent encrypted.
I don't have any problem with mixing HTTP and HTTPS. Both have their use case.
Signing-only TLS? (Score:2)
But you may not care that your public files are not sent encrypted.
Is there a way to send them digitally signed (by the server) but not encrypted? I'm not aware of any signing-only cipher suites in TLS.
Re: (Score:2)
""Not care" generally means it doesn't matter either way."
Not true, it requires effort and therefore expense to needlessly encrypt. Also you are pretending that the site which links files also controls them and that is not necessarily the case.
You don't have to go very far out of your way to create this scenario at all. Slashdot has submissions all days long, some of them link to files such as the NSA python FOIA request thing not too far back. If those files happen to be on http:// sources they'll be block
this is crazy (Score:5, Insightful)
Re: (Score:3)
Re: (Score:3)
"It's only mixed content sites where it appears to the user that the page is secure but actually the download is insecure that are affected."
Right, like when a pdf is linked in a slashdot summary and happens to be from an http source.
Notification makes sense, blocking does not. Anywhere final authority doesn't rest with the user is a problem. It isn't unfair to consider Chrome itself malware given this attitude.
Re: (Score:3)
No, because when you link to another site it's a link, not mixed content. The PDF doesn't display on slashdot.org, you have to navigate away from Slashdot to view it. It would only be an issue when the PDF is being displayed in an iFrame or something.
Re: (Score:2)
I haven't gone to extremes like RTFA but this specifically indicates downloads and while technically all content is a download in a literal sense the jargon typically references a file download for offline/external usage of some sort like a pdf, torrent, zip, etc.
Mixed content of the sort you mention wouldn't make much sense because you already get an alert when a secure site downloads insecure content. So the initial change wouldn't be a change if that is what they are referring to.
Re:this is crazy (Score:4, Informative)
Internet best practice: Do not use Chrome....
Net Nanny? (Score:2)
Next they'll start blocking torrent tracker info.
And then any site that makes unwanted comments about Google.
Re:Net Nanny? (Score:4, Funny)
Next they'll start blocking torrent tracker info.
Naq gura nal fvgr gung znxrf hajnagrq pbzzragf nobhg Tbbtyr.
Sorry... I can't make out that second line there...
This seems to be yet another way of control (Score:5, Insightful)
Re: (Score:2)
I was with you until you mentioned XMLdsig.
If XMLdsig is involved, then I expect the system it's a part of to be insecure. Not because of any known breach -- who knows, XMLdsig might even be theoretically secure, in the unlikely event that it's implemented correctly -- but because anyone choosing to do things the XMLdsig way is incompetent when it comes to security.
Signatures embedded within the data that it's signing, need I say more?
Re: (Score:2)
Re: (Score:2)
You speak as though XMLdsig is the only way to sign something. But there's PGP and S/MIME. Why, you could even roll your own simple file format with SHA and ECDSA and a little randomness mixed in, and it would probably still be better than XMLdsig, because there'd be no XML normalisation, no signature-within-the-signed, no partial document signing, and no downgrade attacks.
Xmldsig is [....] part of the European mandatory eIDas framework
Maybe the brits were right to leave.
Re: (Score:3)
WTF? It's literally an ad populum and a false dich (Score:2)
That is exactly, why his arguments are invalid and childish nonsense!
Flamebait? Really??
My arguments could not have been more precise, clear an concise!
What moron got mod points again??
Do I really need to explain why it's an ad populum and a false dichotomy, because even the moderators are too stupid to see it?
Jeez, buch of morons in here... --.--
Really? (Score:2)
That is your response?
Sorry, you're literally not even making any arguments. So I got nothing that needs replying too.
Call us when you qualify for a reasonable discussion. And when you learned what "ad populum" and "false dichotomy" dven means.
Teenage mutant ninja trolls getting the mod points. Great job, Slashdot!
Re: (Score:2)
Signatures embedded within the data that it's signing, need I say more?
I'd normally agree with you, there shouldn't be any need to use HTTPS for large downloads if the content is signed. But that really only works if you also check the signature and confirm that it's the one you're expecting.
There's absolutely nothing stopping Alice from signing her own substitute content that she knows Bob will download from Charlie's HTTP web site over her MiTMd connection.
Re: (Score:2)
Re: (Score:2)
You can still create an insecure HTTP site if you really want. It's mixing HTTP and HTTPS that is the problem. There is no good way to warn the user that random parts of the page are insecure while the rest is okay.
Insecure caching or malware, take your choice. As we learned from Snowden and many other attacks over the years, if it's insecure it will be exploited, no exceptions.
Re: (Score:2)
Except it is the NSA tracing HTTP that is the end of the anonymous internet. HTTPS makes it harder for them to do so.
Gatekeeper (Score:2, Interesting)
Seems in order to 'protect' it's users, Google is more and more acting as a gate keeper. Not only can they decide what shows up in the search results - as in - Google more or less decides who exists on the net and who doesn't. Now it also decides what we can download. Youtube already decides what we can and cannot watch.
2030 - Google applies for virtual government status.
Re: (Score:2)
Youtube already decides what we can and cannot watch.
I use another video site too. No boogeyman jumps out to stop me.
Re: (Score:2)
Re: (Score:2)
Fahrenheit 451 wants to have a chat with you.
https I get! But what is a (Score:3)
Just my 2 cents
Niche software getting censored (Score:3)
Define insecure (Score:2)
Well, they have, but really really badly.
But, I guess unless you keep flailing around coming up with rubbish ideas you are no longer âoeinnovative.â
Ok then pay my hardware upgrade bill to get ipmi (Score:2)
Ok then pay my hardware upgrade bill to get systems with that nice ipmi HTML5 that can mount ISO.
Upgrade all my switches and routers to new ones with HTML5 config.
Give me an 5 year cert for my ldap / ad system.
Re: (Score:2)
I wonder how much of this is controllable, say, by the Chrome ADMX GPO stuff.
Re: (Score:2)
The old java and flash don't even run in Chrome any more. Firefox dropped old java.
Waterfox does run the older java.
Re: (Score:2)
Is there a browser that is NOT as strict out of the box? Chrome has already pissed me off from removing the https in the browser bar, as for YEARS we have told our users this is how to at least check if a site is using HTTPS or not.
I have no idea if what I'm thinking is correct, but I'll throw it out there anyway: perhaps Chromium browser is "not as strict". Also, it may be easier to configure it to show the entire URL, including the 'http(s)'. And because it's open source, even if it doesn't do what you want OOTB, it may be easy for a programmer with the appropriate experience to modify it.
It's been a long time since I've used Firefox - I switched to Pale Moon when they introduced the stupid Australis UI, and was glad I had done so w
Re: (Score:2)
So... (Score:3)
Since literally anyone can gets a certificate with zero verification (lets encrypt, anyone?), all this does is break things and add annoyance.
Re: (Score:2)
No it doesn't. (Score:3)
Anybody at any CA in your browser's list of blindly trusted root CAs can play MITM.
That is a LOT of people. Even entire shady governments and corporations.
Oh, and depending on how you got your browser... OS... computer... :D ... But let's leave that for another Halloween bedtime story. :D
Let's just say, if you want a security existential crisis, look up the paper on dopant-level hardware trojans.
Re: (Score:2)
Because anyone can get a cert and make the address bar look exactly like it does right now to you.
How do you do that?
Re: (Score:2)
A sufficiently dedicated attacker can insert their hardware between your DNS or HTTP server and the Internet, hijack your DNS or your port 80, and obtain a certificate for your domain name from Let's Encrypt through its ACME endpoint.
Re: (Score:2)
Re: (Score:2)
There's a difference between telling something to an unknown person and shouting it to them across a crowded room.
I'm glad that I never switched to Chrome, (Score:4, Interesting)
even when it used to be a lot faster many years ago....
Re: (Score:2)
Why? Do you hate security so much that attempts in improving it make you glad you're not a part of it?
Re: (Score:3)
Web pages with out private or sensitive data do not need to be "secure". You don't need a secure connect to download a piece of software from a trusted source.
Re: (Score:2)
Web pages with out private or sensitive data do not need to be "secure". You don't need a secure connect to download a piece of software from a trusted source.
But how do you know that you are really downloading from your trusted source? With things like DNS spoofing [wikipedia.org], plain http could be connecting you to a bogus version of your trusted source. https is not just about encryption; it also verifies that the server you are connected to (at say foo.com) has a valid X.509 [wikipedia.org] certificate for the foo.com domain.
Re: (Score:2)
> But how do you know that you are really downloading from your trusted source?
You could use a local host file for your trusted source. :p
> it also verifies that the server you are connected to (at say foo.com) has a valid X.509 [wikipedia.org] certificate for the foo.com domain.
Which requires that everyone now pay the certificate tax to be a trusted site. What if I don't want to pay that tax?
Re: (Score:2)
> it also verifies that the server you are connected to (at say foo.com) has a valid X.509 [wikipedia.org] certificate for the foo.com domain.
Which requires that everyone now pay the certificate tax to be a trusted site. What if I don't want to pay that tax?
Well, it's not a "certificate tax"; you are paying a widely recognised (and trusted) certificate authority (CA) to issue you with a certificate, having verified that you are the legitimate owner of the domain. And, if you really don't want to pay for a certificate, these days there is always the Let's Encrypt [letsencrypt.org] option.
The thing about X.509 certificates is that they "just work" for anybody with web browser. You can (as I do) download software that is GPG signed [gnupg.org] by the author. But that is a level of complexity
Re: (Score:2)
>Well, it's not a "certificate tax"; you are paying a widely recognised (and trusted) certificate authority (CA) to issue you with a certificate, having verified that you are the legitimate owner of the domain. And, if you really don't want to pay for a certificate, these days there is always the Let's Encrypt [letsencrypt.org] option.
Sounds like a tax to me. People don't need a CA to verify that my static website is authentic. That's called overkill.
Likewise, I don't need Google or any other browser dev
The internet just seems to get (Score:2)
Makes me think I should load up Tor and check out the Dark Web where all the media keeps saying the criminals hang out and see what it is like.
I can still recall the first time I dialed up Delphi and got on Internet and IRC. The unknown, the thrill at the command prompt. I was on the Internet so where will this take me.
Just my 2 cents
Re: (Score:2)
The billable hours at the top of the job book always come first
One of Life's little realities
cost of https? (Score:2)
The problem I see here is the cost for certificates for non-commercial websites to support https.
What's a source for free HTTPS PKI certificates?
Re:cost of https? (Score:5, Informative)
Re: (Score:2)
I was pretty excited about it until I found it the certificates are just valid for one year.
Re: cost of https? (Score:3)
Theyâ(TM)re only valid for 3 months. Itâ(TM)s designed to be automated.
As a competent admin... (Score:2)
... you should find a way to automate that quickly. (I think there are tools for it.)
Re: (Score:2)
Yeah but for my little appliance devices it's just not worth the effort. Self signed are totally fine for this despite what chrome tells me.
Re: (Score:2)
Re: (Score:2)
Default install of let's encrypt on any system includes automated renewal.
You shouldn't be concerned. No one else using them are.
Re: cost of https? (Score:2)
There are ways to use letsencrypt without affecting the target machine. I have used the route53 me god successfully, but there are others available.
Having to buy a domain name for your home LAN (Score:3)
Using Let's Encrypt or any other public CA requires first buying a domain name. This is fine for websites on the Internet, not so much for appliances on private home LANs. What is the fully-qualified domain name of the router, printer, or NAS box on your LAN?
Re: (Score:2)
Re: (Score:2)
Chrome (Score:2)
Every time I am forced to use it I just go dam! this crap sucks!
Just my 2 cents
Cannot you already prohibit mixed content? (Score:2)
Cannot one already prohibit mixed content? If not, then why not? Every browser since, oh, I don't know, the first one to support HTTPS has had a switch to enable or disable mixed content. Why is Chrome so far (multiple decades) behind the times? Clearly Chrome is a badly designed piece of shit. Glad I do not permit it to infest any computer I use.
Security theater. (Score:3)
Given past experiences with CAs, I wouldn't trust CA-signed TLS connections one bit more than unencrypted connections.
There is no way around getting to actually know the person (and his software) you are trusting with your computer.
Trusting some unknown third party blindly, to declare another fourth party trustworthy, is insanity. Won't make much of a difference, except narrowing down access to a very specific set of assholes with more power over you.
Re: (Score:2)
So your of the opinion that telling a secret to a stranger and shouting a secret to a stranger across a crowded room have the same security implications?
Another ignorant post brought to you by BAReFO0t
No interest in https (Score:3)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
I am using the web as it was originally intended to be: a way to disseminate information. Nothing I'm doing is private in any way
Until an ISP injects advertising between your personal site and its viewers. Comcast, for example, has been caught doing this. Perhaps what we're missing is a signing-only cipher suite for HTTPS.
Re: (Score:2)
Ideally, DogDude's website would support both http and https. For those of us visiting at a coffee shop who don't want Comcast to inject ads, or for someone else to inject other crap, we would have the option of loading HTTPS. Additiona
Re: (Score:2)
It's not up to you to decide if the person reading your content may be persecuted for reading it. That's entitle up to those two parties.
Why not give them the tools to protect themselves? It's not a question of interest nor one of the purpose of the internet, just a question of of pure misguided laziness.
False sense of security. (Score:2)
This is just getting ridiculous. Perhaps we need a second internet for the participants that need a rubber room.
Re: (Score:2)
What does this mean for my simple http website? (Score:2)
Is this going to break them or make them unusable? Am I going to HAVE to get off my butt and learn WordPress and migrate the sites?
Re: (Score:2)
This is about Google Drive, right? (Score:2)
Total blocking is anti-user... (Score:2)
I was looking for a text representation of a basic food recipe, but only getting all kinds of bullshit amateur-youtube-cooking-show search results that were videos, trying to figure out what setting was wrong... and there was no wrong setting.
There was no setting to change?
Apparently that is what it was supp
great! (Score:2)
great, this will stop absolutely nothing bad from happening.