Issue metadata
Sign in to add a comment
|
Office icon security indicator should only show on pages where admin-provisioned certs are part of the validation chain |
||||||||||||||||||||||||
Issue descriptionChrome Version: ToT OS: Chrome, maybe others What steps will reproduce the problem? (1) Install a custom root certificate in CPanel (e.g. downloaded from cacert.org) (2) Navigate to cacert.org and click Join to trigger use of the root cert (3) Navigate to google.com What is the expected result? The security indicator should be a green lock icon. What happens instead? The "office building" security indicator is shown instead (cf. screenshot).
,
Jan 16 2018
Based on offline discussion with rsleevi: This is working as intended, however it is not ruled out that we may change the intention. Thus re-opening to discuss whether we should change the intention.
,
Jan 17 2018
Would it be possible to set a "tainted" bit on any resource that came through an admin-configured local trust anchor and base the security indicator on whether any tainted resource is being used on the page? I'm concerned about warning fatigue. In my opinion the current approach is very unsatisfying because it's close to impossible to understand for users.
,
Jan 18 2018
No, the //net stack does not allow setting such bits, by virtue of intentionally trying to separately layer these notions. Further, this doesn't achieve the security goal, given that a 'tainted' load may also affect any web storage mechanism - such as localStorage, cookies, etc. All of those would have to be enabled for taint tracking, and if the boundary was drawn in that way, we would have to expend significantly more effort to maintain it. I understand your concern about warning fatigue, but I also think we should do the right thing to the user and notify them when their connections may be affected. I would prefer we more consistently and thoroughly warn about potential monitoring, when said monitoring is unrestricted. We intentionally did not go down that route at the implementation time, due to the lack of ability to consistently restrict such usage (e.g. to domains), nor did UI and Enterprise want to offer that level of configurability. Do you have any information or data to suggest there is a risk of warning fatigue? For example, how many users have enterprise MITM certificates deployed, how and in what cases are they used, and what the potential user behaviour you think is desirable. Absent that, I think the current approach is the minimum necessary, and I don't think we have any new data that would justify re-evaluating.
,
Jan 18 2018
I don't think warning fatigue is the right lens to look at this. For one thing, I don't consider the office indicator to be a warning; it's more of a disclosure. IMO it's not realistic to expect users to notice and understand what's going on every time it appears and disappears. Instead, I would like users to understand that their browsing session is not private from the machine's owner. I also don't expect we're going to make a meaningful dent in how often the "warning" is shown by trying to taint resources: there will be many common situations in which every resource is MITMed or a content script is injected on every page. So rather than trying to reduce how often the office indicator is shown, I'd advocate for a once-per-session disclosure UI that the user sees, along with helpful Page Info strings.
,
Jan 22 2018
,
Apr 6 2018
Triage question: is there more to do here? OP - what are your thoughts about comment 4 and comment 5?
,
Apr 10 2018
Marking back as WontFix, if that is wrong please reopen.
,
Apr 11 2018
WontFix is fine, thanks. Discussion around the more general theme of enterprise disclosures will continue in issue 831572.
,
Apr 11 2018
Whoops, that was too fast. One more question for Ryan: Since an attacker may poison cache, cookies or any other kind of state, should the office building indicator not be shown if a local trust anchor has ever been used in the lifetime of the profile (and not only the current session)?
,
Apr 11 2018
Re #10: Isn't this already a property of the user profile, not the session? g_browser_process->local_state()->GetList(prefs::kUsedPolicyCertificates);
,
Apr 11 2018
Thank you, you're right. I guess that answers my questions, then... ;) |
|||||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||||
Comment 1 by rsleevi@chromium.org
, Jan 16 2018