Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Firefox Privacy Security The Internet IT

Firefox Extension HTTPS Everywhere Does What It Sounds Like 272

climenole writes "HTTPS Everywhere is a Firefox extension produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. It encrypts your communications with a number of major websites. Many sites on the web offer some limited support for encryption over HTTPS, but make it difficult to use. For instance, they may default to unencrypted HTTP, or fill encrypted pages with links that go back to the unencrypted site. The HTTPS Everywhere extension fixes these problems by rewriting all requests to these sites to HTTPS."
This discussion has been archived. No new comments can be posted.

Firefox Extension HTTPS Everywhere Does What It Sounds Like

Comments Filter:
  • by gouttonio ( 1700654 ) on Friday June 18, 2010 @08:30AM (#32611634)
    ... how does this work without risk of compromising the data at the end of the tor route if the webserver won't accept https. I'll be waiting for SPEEDY which looks like a cleaner way of encrypting everything.
  • by roman_mir ( 125474 ) on Friday June 18, 2010 @08:36AM (#32611676) Homepage Journal

    Firefox itself does not really make it easy for the users or for admins to use https everywhere.

    I just made a small site, it's for a business, that runs everything through https, I redirect http to https completely. Firefox 3.6.3 on Windows had no problem running the site. IE on windows couldn't open the encrypted pages, Firefox 3.5 on any GNU/Linux distro couldn't open them either, to fix this, I had to add this to /etc/conf.d/ssl.conf : SSLInsecureRenegotiation on

    That fixed the IE and FF3.5 on Linux problem.

    Here is the description of this flag from apache mod_ssl directive description page:

    SSLInsecureRenegotiation Directive
    Description: Option to enable support for insecure renegotiation
    Syntax: SSLInsecureRenegotiation flag
    Default: SSLInsecureRenegotiation off
    Context: server config, virtual host
    Status: Extension
    Module: mod_ssl
    Compatibility: Available in httpd 2.2.15 and later, if using OpenSSL 0.9.8m or later

    As originally specified, all versions of the SSL and TLS protocols (up to and including TLS/1.2) were vulnerable to a Man-in-the-Middle attack (CVE-2009-3555) during a renegotiation. This vulnerability allowed an attacker to "prefix" a chosen plaintext to the HTTP request as seen by the web server. A protocol extension was developed which fixed this vulnerability if supported by both client and server.

    If mod_ssl is linked against OpenSSL version 0.9.8m or later, by default renegotiation is only supported with clients supporting the new protocol extension. If this directive is enabled, renegotiation will be allowed with old (unpatched) clients, albeit insecurely.
    Security warning

    If this directive is enabled, SSL connections will be vulnerable to the Man-in-the-Middle prefix attack as described in CVE-2009-3555.
    Example

    SSLInsecureRenegotiation on

    The SSL_SECURE_RENEG environment variable can be used from an SSI or CGI script to determine whether secure renegotiation is supported for a given SSL connection.

    I wonder if there are other ways of making this work with my other directives:

    SSLEngine on
    SSLCipherSuite HIGH:MEDIUM:!aNULL:+MD5

    SSLVerifyClient none - I am thinking about switching it to 'require' right now, but will have to test all browsers with it again, but have to do it I think.

    Oh, and getting it all to run together with apache httpd with mod_ssl + mod_jk + apache tomcat is quite a hassle.

    But most unfortunate thing about FF is how it treats the self-signed certificates. It shows it as an SSL ERROR, to which exceptions must be made for the user to be able to enter the site. Can FF developers think about this fact for like longer than a second? It is not an error to run a site with a self-signed certificate, it is a configuration choice and it provides an important role to the site: encrypted traffic for login and for the data transferred to and from the client.

    Why is FF showing this to the users as an error? This is not an error, this is by design and it is a special case of usage. Who is not frustrated by the browser treating self signed certificates as if they are some sort of a disease? They provide an important role - a way to secure communications between the server and the browser.

    Can this be looked at, because I am SURE this prevents various sites from using encrypted traffic in the first place and it is a BAD thing, not a good one. All traffic needs to be encrypted, but especially user name/password traffic shouldn't be sent around in plain text.

    Name it what it is: an exceptional case of using security to encrypt traffic, a case where the site may not necessarily be what it wants to be seen as, but at least the traffic is actually encrypted. It's terrible if someone comes to your site just to see: SSL ERROR on it, OF-COURSE admins don't want THAT message to be shown on their sites, why do you think so few sites do security properly?

  • by Anonymous Coward on Friday June 18, 2010 @08:45AM (#32611738)
    Unfortunately. No https for slashdot.org - why not Slashdot? Comments on politically orientated stories from "sensitive" countries does not deserve to be encrypted? You should know better Slashdot
  • by tepples ( 727027 ) <tepples.gmail@com> on Friday June 18, 2010 @08:46AM (#32611740) Homepage Journal

    It is not an error to run a site with a self-signed certificate

    A man in the middle could insert his own self-signed certificate, decrypting the traffic from your site and reencrypting it with his own key pair, and users would be none the wiser. One workaround is to start your own CA, sign its root certificate with PGP, and distribute that cert to your users to install. But then that starts to depend on the PGP web of trust, which in turn depends on air travel to get keys signed.

  • Re:Default to HTTP? (Score:3, Interesting)

    by icebraining ( 1313345 ) on Friday June 18, 2010 @08:52AM (#32611792) Homepage

    If anyone wants to protect his/her login data, why don't they use OpenID and a secure provider?

  • facebook (Score:2, Interesting)

    by aneamic ( 1116327 ) <anaemic&gmail,com> on Friday June 18, 2010 @09:11AM (#32611946)
    Am I the only person getting a 'chat is disabled on this page' bubble everywhere when using this plugin on facebook?
  • by Anonymous Coward on Friday June 18, 2010 @09:30AM (#32612126)

    Mod parent up.

    We know HTTPS isn't "cheap". But seriously, now would be the time for /. to offer TLS.

  • by ConceptJunkie ( 24823 ) on Friday June 18, 2010 @10:11AM (#32612554) Homepage Journal

    It's not /.'s job to provide a secure means for posting politically sensitive stories. It would be nice if that's possible but that's not what they are in the business of doing, so I don't think it's fair to suggest /. "should know better".

    I'm sure they know perfectly well, and I'm sure that the decision support HTTPS this way is also an economic and technological decision. /. is a business, not a charity, and not a public service (although it provides public service as part of its business model). If /. advertised itself _primarily_ as a forum for free, uncensored speech or a forum for communicating with people in less free circumstances then it's a fair cop.

    It's one thing to suggest /. _should_ do this (and I think they should, all things being equal), but it's another to say (or imply) it is wrong for them not to.

    On the other hand, like Microsoft, busting on /. is fun and often justified, so I wouldn't mind piling on. They're such insensitive clods!

  • by roman_mir ( 125474 ) on Friday June 18, 2010 @10:53AM (#32613100) Homepage Journal

    You are still missing the point. There is no SSL Error, there only needs to be an SSL Warning: self signed certificate.

    The users are given certificate numbers as well as user names / temporary passwords. They are instructed to check that the certificate is correct when the browser makes the connection or to install certificate if they can by themselves.

    --

    Every single person replying to me has completely ignored this issue:

    SSLInsecureRenegotiation on

    which is a much more important one - regardless of whether the certificate is signed by CA or not, the MITM is still possible and my business model actually fixes this but not technologically, it fixes it operationally.

    Nobody is talking about it here at all, looks like they don't get it. IE and earlier FF versions cannot even make the connection unless this flag is on.

  • Re:Link (Score:3, Interesting)

    by Nixoloco ( 675549 ) on Friday June 18, 2010 @11:09AM (#32613286)
    Another extension that some might find useful is SSLPasswdWarning [mozilla.org]. It evaluates password input fields and pops up a warning whenever they post via non HTTPS.
  • by Peach Rings ( 1782482 ) on Friday June 18, 2010 @11:37AM (#32613602) Homepage

    So you'd rather have extensions updating themselves through their own downloader code than have them just use the Firefox update framework?

  • by clone53421 ( 1310749 ) on Friday June 18, 2010 @11:42AM (#32613636) Journal

    Of course I would. The Firefox update process requires a complete restart of the browser. If an extension can update its filter set without requiring a complete extension update and the corresponding browser restart, it should.

    In fact, since Javascript is capable of self-modification it’d be nice to see extensions that could update themselves on-the-fly, only updating the actual files on the disk when the browser is restarted.

  • by jesset77 ( 759149 ) on Friday June 18, 2010 @06:25PM (#32620052)

    If it's not wrong for them to not do something, then why should they do it?

    Wait.. Let me make sure I'm getting your double negatives straight here. Are you saying that the amorality of an inaction robs motive from the corresponding action? It's not wrong for me to not eat a potato chip right now. So why eat a potato chip? Do I have to be arrested for setting the potato chip down before I can omnom with a clear conscience?

    Dewd, your world sux! I am glad I don't live there. ;D

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (5) All right, who's the wiseguy who stuck this trigraph stuff in here?

Working...