Re: Intent to Ship - Support already-enrolled U2F devices with Google Accounts for Web Authentication

2018-01-30 Thread Joseph Lorenzo Hall
eb Authentication -- meaning not only
> >> will Google need to change to the Web Authentication API, they will also
> >> have to prompt users to go back through the enrollment ceremony. This
> >> process is likely to take several years.
> >>
> >> Tracking bug: https://bugzilla.mozilla.org/show_bug.cgi?id=webauthn
> >>
> >> Spec: https://www.w3.org/TR/webauthn/
> >>
> >> Estimated target release: 60
> >>
> >> Preference behind which this is implemented:
> >> security.webauth.webauthn
> >>
> >> DevTools support:
> >> N/A
> >>
> >> Support by other browser engines:
> >> - Blink: In-progress
> >> - Edge: In-progress
> >> - Webkit: No public announcements
> >>
> >> Testing:
> >> Mochitests in-tree; https://webauthn.io/; https://webauthn.bin.coffee/;
> >> https://webauthndemo.appspot.com/; Web Platform Tests in-progress
> >>
> >>
> >> Cheers,
> >> J.C. Jones and Tim Taubert
> >>
> >> [1]
> >> https://groups.google.com/d/msg/mozilla.dev.platform/tsevyqf
> >> BHLE/lccldWNNBwAJ
> >>
> >> [2] https://w3c.github.io/webauthn/#sctn-appid-extension and
> >> https://bugzilla.mozilla.org/show_bug.cgi?id=1406471
> >>
> >> [3]
> >> https://fidoalliance.org/specs/fido-u2f-v1.2-ps-20170411/
> >> fido-appid-and-facets-v1.2-ps-20170411.html
> >>
> >> [4]
> >> https://groups.google.com/d/msg/mozilla.dev.platform/UW6WMmo
> >> DzEU/8h7DFOfsBQAJ
> >> and https://bugzilla.mozilla.org/show_bug.cgi?id=1244959
> >>
> >> [5]
> >> https://chromium.googlesource.com/chromium/src.git/+/master/
> >> chrome/browser/extensions/api/cryptotoken_private/cryptotoke
> >> n_private_api.cc#30
> >>
> >> [6]
> >> https://chromium.googlesource.com/chromium/src.git/+/master/
> >> chrome/browser/extensions/api/cryptotoken_private/cryptotoke
> >> n_private_api.cc#161
> >> ___
> >> dev-platform mailing list
> >> dev-platform@lists.mozilla.org
> >> https://lists.mozilla.org/listinfo/dev-platform
> >>
> >
> >
> ___
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform
>



-- 
Joseph Lorenzo Hall
Chief Technologist, Center for Democracy & Technology [https://www.cdt.org]
1401 K ST NW STE 200, Washington DC 20005-3497
e: j...@cdt.org, p: 202.407.8825, pgp: https://josephhall.org/gpg-key
Fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: FYI: Short Nightly Shield Study involving DNS over HTTPs (DoH)

2018-03-21 Thread Joseph Lorenzo Hall
+1 (as a Moz fan and privacy expert)

On Tue, Mar 20, 2018 at 2:35 AM, Kris Maglione  wrote:
> On Mon, Mar 19, 2018 at 07:27:39PM -0700, Nicholas Alexander wrote:
>>
>> Hi all,
>>
>> On Mon, Mar 19, 2018 at 3:56 PM, Xidorn Quan  wrote:
>>
>>> It's fine to embed this experiment in the product, and blog about it, but
>>> it's definitely not fine to have it enabled by default and send every DNS
>>> request to a third-party.
>>>
>>> I can understand that the intent must be good, and for better privacy,
>>> but
>>> the approach of doing so is not acceptable. Users would think Firefox is
>>> going to just send data to arbitrary third-party without agreement from
>>> them.
>>>
>>> As you can see from the replies, almost all people outside the network
>>> team has expressed concerns about this, which should be considered a
>>> signal
>>> already that how other technical users may feel about this experiment,
>>> and
>>> how technical news would create a title for this.
>>>
>>
>> Let me add my voice as a person outside the network team who can
>> understand
>> the concerns and _still thinks we should be doing this_.
>
>
> I'll second this.
>
> I think it's reasonable to be concerned about the public reaction to this,
> but I also think it's worth doing. The end result of this will almost
> certainly be improved privacy and security for users who have this enabled
> by default, and we can't get to that point without doing a study like this.
>
> I think it's worth the risk of a backlash. But I also think we should do
> what we can to minimize that backlash.
>
> ___
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform



-- 
Joseph Lorenzo Hall
Chief Technologist, Center for Democracy & Technology [https://www.cdt.org]
1401 K ST NW STE 200, Washington DC 20005-3497
e: j...@cdt.org, p: 202.407.8825, pgp: https://josephhall.org/gpg-key
Fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871

CDT's Annual Dinner, Tech Prom, is March 29, 2018. Don't miss the tech
event of the year!
Reserve a table today.: https://cdt.org/annual-dinner/
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: Smart Card and WebCrypto (Re: On the future of and application/x-x509-*-cert MIME handling)

2015-09-01 Thread Joseph Lorenzo Hall
On Sun, Aug 30, 2015 at 1:50 AM, Anne van Kesteren  wrote:
> On Sun, Aug 30, 2015 at 7:33 AM, Tim Guan-tin Chien
>  wrote:
>> It's also worthy to point out many nation-state deploys Smart Card
>> identifications (despite the privacy concern), allow it's citizens (or
>> subjects) to authenticate with government services online.
>
> It seems a potential future for that which works within the web's
> security model is FIDO, see
>
>   https://fidoalliance.org/
>   https://support.google.com/accounts/topic/6103521
>
> I don't think we're currently working on this though.

(from the inveterate lurker...)

I've said this to a number of FF folks but it would be great to get
FIDO U2F support in FF; the U2F-enabled yubikeys/harware tokens etc.
are a great, usable 2-factor technology, but it's hard to recommend
people use them when they only work in Chrome. :/

best, Joe

-- 
Joseph Lorenzo Hall
Chief Technologist
Center for Democracy & Technology
1634 I ST NW STE 1100
Washington DC 20006-4011
(p) 202-407-8825
(f) 202-637-0968
j...@cdt.org
PGP: https://josephhall.org/gpg-key
fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: Fido U2F, two-factor authentication support

2015-11-05 Thread Joseph Lorenzo Hall
+1

I would love love love to have U2F in Firefox.

(Also, Dropbox supports it too, just as a data point:
http://blogs.dropbox.com/dropbox/2015/08/u2f-security-keys/ )

On Thu, Nov 5, 2015 at 5:18 PM, Jeroen Hoek  wrote:
> In December 2014 the first public release of the Fido alliance's
> Universal 2nd Factor (U2F) specification was published. The idea behind
> this open specification is to provide a secure two-factor authentication
> method with affordable hardware keys and a friendly UX.
>
> If I buy a hardware key that implements Fido U2F today, I can use it to
> log on to Google's GMail and Github. It is possible to use the same
> hardware key with any web service offering Fido U2F support, by design.
> The specification allows for three methods of communication: USB, NFC,
> and Bluetooth Low Energy (BLE).
>
> For Fido U2F to work, a browser implementing this technology is required.
>
>
> There is an issue about Fido U2F support in Firefox:
>
> https://bugzilla.mozilla.org/show_bug.cgi?id=1065729
>
> Unfortunately, this issue appears to receive no priority from Mozilla.
> Reading the comments in this issue, it appears that despite the
> attractiveness of the Fido U2F specification, developers see support in
> Firefox as a deal-breaker. Personally, I feel that a security technology
> such as this needs at least one free software browser to support it to
> provide a viable alternative.
>
> Judging from the bounty placed on this Firefox issue (currently
> exceeding 1000 USD), there appears to be a fairly strong community
> desire to see this feature implemented. Commenters on the issue are,
> however, worried about the (perceived lack of) priority afforded to this
> issue.
>
> Developers participating in the issue recommended we post questions
> about the prioritizing of this issue to the mozilla.dev.platform mailing
> list. My apologies if this is not the place to discuss this issue.
>
> --
>
> Is Fido U2F a technology that Mozilla can endorse and support?
>
> Could this technology be considered for inclusion in Firefox?
>
> --
>
> Some background on this technology for those who are unfamiliar with it:
>
> The full Fido U2F specifications are available for download here:
>
> https://fidoalliance.org/specifications/overview/
> https://fidoalliance.org/specifications/download/
>
> Specifically, the U2F overview may be interesting if you want a more
> in-depth architectural overiew:
>
> https://fidoalliance.org/specs/fido-u2f-v1.0-nfc-bt-amendment-20150514/fido-u2f-overview.html
>
>
> Google announced support for Fido U2F a year ago, in October 2014, and
> Chrome currently implements the Fido U2F standard:
>
> https://googleonlinesecurity.blogspot.nl/2014/10/strengthening-2-step-verification-with.html
>
>
> Microsoft is backing this standard as well:
>
> https://blogs.windows.com/business/2015/02/13/microsoft-announces-fido-support-coming-to-windows-10/
>
>
> Yubico is one of the driving forces behind the Fido specifications from
> the manufacturers side. They produce USB and NFC hardware tokens that
> can be used with open security standards such as OATH-HOTP and
> OATH-TOTP. Their recent line-up includes Fido U2F support as well:
>
> https://www.yubico.com/products/yubikey-hardware/
>
> Yubico on Fido U2F:
>
> https://www.yubico.com/applications/fido/
>
> Yubico is not the only manufacturer — other Fido-certified keys can be
> found on Amazon — but they do appear to have a leading edge.
>
>
> I am personally interested in Fido U2F from a professional standpoint.
> The possibility to provide affordable two-factor authentication either
> through USB, NFC, or BLE is appealing, and my employer is considering
> opting for this standard to secure the health care software services we
> provide — cross-browser support is, however, a requirement.
>
> I am not affiliated with the Fido alliance or its backers.
>
> --
> Kind regards,
>
> Jeroen Hoek
>
> Lable
> ✉ jeroen.h...@lable.nl
> GPG: 44D4 1D39 535A 1F9A 9509  92C5 A7A8 B913 D40D D022
>
> http://lable.nl — KvK № 55984037 — BTW № NL8519.32.411.B.01
>
>
> ___
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform
>



-- 
Joseph Lorenzo Hall
Chief Technologist
Center for Democracy & Technology
1634 I ST NW STE 1100
Washington DC 20006-4011
(p) 202-407-8825
(f) 202-637-0968
j...@cdt.org
PGP: https://josephhall.org/gpg-key
fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: Firefox Hello new data collection

2016-04-05 Thread Joseph Lorenzo Hall
On Tue, Apr 5, 2016 at 12:05 PM, Chris Hofmann  wrote:
> Thie passage in https://www.mozilla.org/en-US/privacy/firefox-hello/ also
> would lead me to believe that the contents of my communication with another
> user (including shared URLs) are encrypted (and would be private).
>
> We've just invested heavily in making this point and trying to make that
> association that encryption mean strong privacy and vice-versa.
> https://blog.mozilla.org/blog/2016/03/30/everyday-internet-users-can-stand-up-for-encryption-heres-how/

As an outside lurker on dev-platform but a big fan of Mozilla's data
stewardship folks, this is the core of the issue for me. WebRTC
conversations should be assumed to be highly private and any
exfiltration on the client without explicit opt-in is seems very
dangerous. I'm not saying it should never be done but it should be
very very important and done very very carefully. I don't get the
sense that this data is that crucial to innovative Hello features. You
could opt-in folks to the study just-in-time using tab sharing. I know
that clobbers the UX but if it's that important I think you need to
take that hit given the sensitivity of real-time comms.

-- 
Joseph Lorenzo Hall
Chief Technologist, Center for Democracy & Technology [https://www.cdt.org]
e: j...@cdt.org, p: 202.407.8825, pgp: https://josephhall.org/gpg-key
Fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871

CDT's annual dinner, Tech Prom, is April 6, 2016! https://cdt.org/annual-dinner
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: Intent to ship: Treat cookies set over non-secure HTTP as session cookies

2016-04-14 Thread Joseph Lorenzo Hall
 Firefox 49
>>>
>>> Preference behind which this will be implemented:
>>> network.cookie.lifetime.httpSessionOnly
>>>
>>> Do other browser engines implement this? No
>>>
>>> [1]
>>> https://groups.google.com/d/msg/mozilla.dev.platform/xaGffxAM-hs/aVgYuS3QA2MJ
>>> [2] http://www.alexa.com/topsites/category/Top/News
>>> ___
>>> dev-platform mailing list
>>> dev-platform@lists.mozilla.org
>>> https://lists.mozilla.org/listinfo/dev-platform
>>>
>> ___
>> dev-platform mailing list
>> dev-platform@lists.mozilla.org
>> https://lists.mozilla.org/listinfo/dev-platform
> ___
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform



-- 
Joseph Lorenzo Hall
Chief Technologist, Center for Democracy & Technology [https://www.cdt.org]
e: j...@cdt.org, p: 202.407.8825, pgp: https://josephhall.org/gpg-key
Fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: Proposed W3C Charter: Web of Things Working Group

2016-10-13 Thread Joseph Lorenzo Hall
+1 on keeping w3c charter discussions here (or at least letting those
of us organizational friends of Moz know where we go for that part of
our Moz fix)

On Thu, Oct 13, 2016 at 6:11 AM, Anne van Kesteren  wrote:
> On Thu, Oct 13, 2016 at 1:18 PM, Benjamin Francis  
> wrote:
>> dev-platform is now only really about the back end of Firefox which isn't
>> very relevant here. WoT mainly concerns the server side of the web stack.
>
> I don't really agree with this. 1) We can't really consider Firefox
> frontend and backend as isolated entities. What happens in platform
> affects the UX and vice versa. This is more and more true as we get
> closer to the metal. 2) The browser could play a very interesting role
> in the UX side of discovering new devices and getting them set up
> (rather than letting that run through proprietary app stores). 3)
> Discussion of W3C groups and their publications has always taken place
> here.
>
>
> --
> https://annevankesteren.nl/
> ___
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform



-- 
Joseph Lorenzo Hall
Chief Technologist, Center for Democracy & Technology [https://www.cdt.org]
1401 K ST NW STE 200, Washington DC 20005-3497
e: j...@cdt.org, p: 202.407.8825, pgp: https://josephhall.org/gpg-key
Fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871

Tech Prom, CDT's Annual Dinner, is April 20, 2017! https://cdt.org/annual-dinner
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: Intent to unship: navigator.getBattery (Battery Status API)

2016-11-02 Thread Joseph Lorenzo Hall
Speaking on behalf of the privacy community (writ large and vaguely) thank
you very much for this!

best, Joe

On Mon, Oct 31, 2016 at 4:24 AM, Chris Peterson 
wrote:

> As proposed earlier on the dev-platform list [1], I made the Battery
> Status API chrome-only in Firefox Nightly 52 (bug 1313580 [2]). The battery
> code and tests remain, available to Gecko code and Firefox add-ons.
>
> There should be little risk of web compat regressions. The battery API was
> never implemented by IE, Edge, or Safari, so web content should already be
> feature-detecting the API. Also, I know of no non-trivial websites using
> the API for anything other than fingerprinting users in the four years
> since Firefox introduced the API in 2012 (Firefox 10 [3]). Chrome added
> support in 2014.
>
> We always have the option to make the API available to web content again
> if a website or app demonstrates an interesting use case using Chrome's
> battery API. However, I feel the supposed use cases for the battery API
> would be better served by something like a lifecycle event API that
> includes low battery/memory warnings. That would expose less identifying
> information and allow the user and UA to customize the lifecycle settings.
>
>
> [1] https://groups.google.com/d/msg/mozilla.dev.platform/5U8NHoU
> Y-1k/9ybyzQIYCAAJ
> [2] https://bugzilla.mozilla.org/show_bug.cgi?id=1313580
> [3] https://bugzilla.mozilla.org/show_bug.cgi?id=678694
> ___
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform
>



-- 
Joseph Lorenzo Hall
Chief Technologist, Center for Democracy & Technology [https://www.cdt.org]
1401 K ST NW STE 200, Washington DC 20005-3497
e: j...@cdt.org, p: 202.407.8825, pgp: https://josephhall.org/gpg-key
Fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871

Tech Prom, CDT's Annual Dinner, is April 20, 2017!
https://cdt.org/annual-dinner
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: Intent to deprecate: Insecure HTTP

2015-04-13 Thread Joseph Lorenzo Hall
Late to the thread, but I'll use this reply to say we're very
supportive of the proposal at CDT.

On Mon, Apr 13, 2015 at 4:48 PM,   wrote:
> I have given this a lot of thought lately, and to me the only way forward is 
> to do exactly what is suggested here: phase out and eventually drop plain 
> HTTP support. There are numerous reasons for doing this:
>
> - Plain HTTP allows someone to snoop on your users.
>
> - Plain HTTP allows someone to misrepresent your content to the users.
>
> - Plain HTTP is a great vector for phishing, as well as injecting malicious 
> code that comes from your domain.
>
> - Plain HTTP provides no guarantees of identity to the user. Arguably, the 
> current HTTPS implementation doesn't do much to fix this, but more on this 
> below.
>
> - Lastly, arguing that HTTP is cheaper than HTTPS is going to be much harder 
> once there are more providers giving away free certs (looking at StartSSL and 
> Let's Encrypt).
>
> My vision would be that HTTP should be marked with the same warning (except 
> for wording of course) as an HTTPS site secured by a self-signed cert. In 
> terms of security, they are more or less equivalent, so there is no reason to 
> treat them differently. This should be the goal.
>
> There are problems with transitioning to giving a huge scary warning for 
> HTTP. They include:
>
> - A large number of sites that don't support HTTPS. To fix this, I think the 
> best method is to show the "http://"; part of the URL in red, and publicly 
> announce that over the next X months Firefox is moving to the model of giving 
> a big scary warning a la self-signed cert warning if HTTPS is not enabled.
>
> - A large number of corporate intranets that run plain HTTP. Perhaps a 
> build-time configuration could be enabled that would enable system 
> administrators to ignore the warning for certain subdomains or the RFC 1918 
> addresses as well as localhost. Note that carrier grade NAT in IPv4 might 
> make the latter a bad choice by default.
>
> - Ad supported sites report a drop in ad revenue when switching to HTTPS. I 
> don't know what the problem or solution here is, but I am certain this is a 
> big hurdle for some sites.
>
> - Lack of free wildcard certificates. Ideally, Let's Encrypt should provide 
> these.
>
> - Legacy devices that cannot be upgraded to support HTTPS or only come with 
> self-signed certificates. This is a problem that can be addressed by letting 
> the user bypass the scary warning (just like with self-signed certs).
>
> Finally, some people conflate the idea of a global transition from plain HTTP 
> to HTTPS as a move by CA's to make more money. They might argue that first, 
> we need to get rid of CA's or provide an alternative path for obtaining 
> certificates. I disagree. Switching from plain HTTP to HTTPS is step one. 
> Step two might include adding more avenues for establishing trust and 
> authentication. There is no reason to try to add additional methods of 
> authenticating the servers while still allowing them to use no encryption at 
> all. Let's kill off plain HTTP first, then worry about how to fix the CA 
> system. Let's Encrypt will of course make this a lot easier by providing free 
> certs.
> ___
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform



-- 
Joseph Lorenzo Hall
Chief Technologist
Center for Democracy & Technology
1634 I ST NW STE 1100
Washington DC 20006-4011
(p) 202-407-8825
(f) 202-637-0968
j...@cdt.org
PGP: https://josephhall.org/gpg-key
fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: Intent to deprecate: Insecure HTTP

2015-04-15 Thread Joseph Lorenzo Hall
If you're addicted to cleartrext, the future is going to be hard for you...

On Tue, Apr 14, 2015 at 2:26 PM,   wrote:
> HTTPS has its moments, but the majority of the web does not need it. I 
> certainly wouldn't appreciate the encryption overhead just for visiting 
> David's lolcats website. As one of the most important organizations related 
> to free software, it's sad to see Mozilla developers join the war on 
> plaintext: http://arc.pasp.de/ The owners of websites like this have a right 
> to serve their pages in formats that do not make hypocrites of themselves.
> ___
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform



-- 
Joseph Lorenzo Hall
Chief Technologist
Center for Democracy & Technology
1634 I ST NW STE 1100
Washington DC 20006-4011
(p) 202-407-8825
(f) 202-637-0968
j...@cdt.org
PGP: https://josephhall.org/gpg-key
fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: Intent to deprecate: Insecure HTTP

2015-05-01 Thread Joseph Lorenzo Hall
On Thu, Apr 30, 2015 at 10:49 PM, Matthew Phillips  wrote:
> I understand that there are proposed solutions to these problems but they 
> don't exist today and won't be ubiquitous for a while.  That *has* to come 
> first. Nothing is more important than the free speech the web allows. Not 
> even security.

This is a false choice... you cannot have free speech without safe
spaces. Many, many have written about this, e.g.,
https://cdt.org/files/2015/02/CDT-comments-on-the-use-of-encryption-and-anonymity-in-digital-communcations.pdf

-- 
Joseph Lorenzo Hall
Chief Technologist
Center for Democracy & Technology
1634 I ST NW STE 1100
Washington DC 20006-4011
(p) 202-407-8825
(f) 202-637-0968
j...@cdt.org
PGP: https://josephhall.org/gpg-key
fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: Intent to deprecate: Insecure HTTP

2015-05-01 Thread Joseph Lorenzo Hall
+freaking1

On Fri, May 1, 2015 at 2:16 PM, Martin Thomson  wrote:
> On Fri, May 1, 2015 at 11:06 AM, Eric Shepherd  wrote:
>> There are a lot of things that don't need encryption,
>
> This assertion is made quite often in this context. It's been shown to
> be false in every example I've seen.  I think Richard provided several
> citations where this was believed to be correct, to the detriment of
> us all (great cannon being a prime example).
>
>> and sites that serve
>> legacy purposes and/or audiences, and cannot be updated to https in the
>> first place.
>
> There are two aspects to this: the software, and the content.
>
> If software cannot be updated, that a problem in its own right.  The
> idea that you could release your server onto the Internet to fend for
> itself for 20 years was a dream of the 90s that has taken a while to
> die.  Just as you have to feed it electricity and packets, you have to
> maintain software too.
>
> The content issue is a serious one, but there are several answers that
> could fit (HSTS, upgrade-insecure, and maybe opportunistic security).
> ___
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform



-- 
Joseph Lorenzo Hall
Chief Technologist
Center for Democracy & Technology
1634 I ST NW STE 1100
Washington DC 20006-4011
(p) 202-407-8825
(f) 202-637-0968
j...@cdt.org
PGP: https://josephhall.org/gpg-key
fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: Intent to deprecate: Insecure HTTP

2015-05-01 Thread Joseph Lorenzo Hall
On Fri, May 1, 2015 at 2:37 PM, Patrick McManus  wrote:
> It is afterall likely stored in cleartext on each computer. This is an
> important distinction no matter the nature of the content because  Firefox,
> as the User's Agent, has a strong interest in the user seeing the content
> she asked for and protecting her confidentiality (as best as is possible)
> while doing the asking.Those are properties transport security gives you.
> Sadly, both of those fundamental properties of transport are routinely
> broken to the user's detriment, when http:// is used.

Yes, I'll add something Patrick knows very well, but just to hammer it
home: HTTPS as transport protection isn't just about confidentiality
but integrity of the transport.

So, even if those of you out there are saying "The web doesn't have
much private stuff! jeez!" the web sure has a lot of stuff that is
highly dynamic with javascript and other active content. That stuff
needs be protected in transit lest the Great Cannon or any number of
user-hostile crap on the net start owning your UAs, even if you don't
think the content need be private.

best, Joe

-- 
Joseph Lorenzo Hall
Chief Technologist
Center for Democracy & Technology
1634 I ST NW STE 1100
Washington DC 20006-4011
(p) 202-407-8825
(f) 202-637-0968
j...@cdt.org
PGP: https://josephhall.org/gpg-key
fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: Update: Intent to Ship Adjust SDK in Fennec

2015-05-20 Thread Joseph Lorenzo Hall
On Wed, May 20, 2015 at 1:07 PM, Winston Bowden  wrote:
>
> Adjust hangs onto the following data permanently:
>
>  * Attribution source (allowing us to measure which channel produced
>the best ROI)
>  * Storage of hashed MAC address and/or device ID hashes together with
>app token

nit: s/hashes/hashed/ here, no?

That is Adjust will store a single hash performed as

hash(hash(MAC/DeviceID) + App token)

Correct?

(Presumably this is to identify reinstalls or something.)

best and thanks, Joe

-- 
Joseph Lorenzo Hall
Chief Technologist
Center for Democracy & Technology
1634 I ST NW STE 1100
Washington DC 20006-4011
(p) 202-407-8825
(f) 202-637-0968
j...@cdt.org
PGP: https://josephhall.org/gpg-key
fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: W3C Proposed Recommendation: Web Authentication

2019-02-08 Thread Joseph Lorenzo Hall
+1 and thank you for all the hard work on the spec and landing so much in
FF, JCJ!!!

On Fri, Feb 8, 2019 at 4:09 PM J.C. Jones  wrote:

> Out of all multi-factor authentication solutions I know of, Web
> Authentication is our best technical response to the scourge of phishing.
> Tying public-key cryptography into web logins, it dramatically raises the
> bar for phishing: From a simple confusable website and replay attack, to an
> HTTPS network man-in-the-middle. In practice, Web Authentication forces
> adversaries to move to attack account recovery methods, which often have
> stronger controls than a standard login.
>
> The specification is large
> <https://www.w3.org/TR/2019/PR-webauthn-20190117/>, with many backward
> compatibility pieces that Firefox is likely to never need to implement. The
> compatibility pieces are useful for providing the installed base of
> existing FIDO or TCG devices a path forward. The core website functions
> aren't so complex; Duo's explainer is very good, at
> https://webauthn.guide/
> . There's also forward-extensibility, leading toward a password-less future
> built on digital signatures rather than disclosing shared secrets.
>
> Web Authentication is now supported by Edge, Firefox, and Chrome. Safari
> support is experimental.
>
> Websites have been slower to pick it up. Major sites I now of: For the
> United States, https://login.gov/ uses it -- so as an example applying for
> the Global Entry traveler program will exercise a Web Authentication
> security key, if you choose. Dropbox
> <
> https://blogs.dropbox.com/tech/2018/05/introducing-webauthn-support-for-secure-dropbox-sign-in/
> >
> has also supported Web Authentication since Firefox 60 shipped.
>
> Most other major properties have indicated they'll support Web
> Authentication sooner or later. Try it out at at https://webauthn.io/,
> https://webauthndemo.appspot.com/, https://demo.yubico.com/webauthn/, or
> even the lowly https://webauthn.bin.coffee/.
>
> I encourage Mozilla to support advancement of Web Authentication to a
> Recommendation, and its end-goal of a phishing-free future. (Or at least, a
> much-reduced prevalence.  Really, I just wanted to write and imagine
> 'phishing-free.' Can you blame me?)
>
> Cheers,
> J.C.
> [n.b., I'm an editor on this spec...]
>
>
>
> On Thu, Jan 31, 2019 at 5:58 PM L. David Baron  wrote:
>
> > A W3C Proposed Recommendation is available for the membership of
> > W3C (including Mozilla) to vote on, before it proceeds to the final
> > stage of being a W3C Recomendation:
> >
> >   Web Authentication
> >   https://www.w3.org/TR/webauthn/
> >   Deadline for responses: Thursday, February 14, 2019
> >
> > If there are comments you think Mozilla should send as part of the
> > review, please say so in this thread.  Ideally, such comments should
> > link to github issues filed against the specification.  (I'd note,
> > however, that there have been previous opportunities to make
> > comments, so it's somewhat bad form to bring up fundamental issues
> > for the first time at this stage.)
> >
> > Given that we implement this specification, one of the editors works
> > for us, and have been supporting this work for a while, I'm assuming
> > we should support this advancement as well...
> >
> > -David
> >
> > --
> > 𝄞   L. David Baron http://dbaron.org/   𝄂
> > 𝄢   Mozilla  https://www.mozilla.org/   𝄂
> >  Before I built a wall I'd ask to know
> >  What I was walling in or walling out,
> >  And to whom I was like to give offense.
> >    - Robert Frost, Mending Wall (1914)
> > ___
> > dev-platform mailing list
> > dev-platform@lists.mozilla.org
> > https://lists.mozilla.org/listinfo/dev-platform
> >
> ___
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform
>


-- 
Joseph Lorenzo Hall
Chief Technologist, Center for Democracy & Technology [https://www.cdt.org]
1401 K ST NW STE 200, Washington DC 20005-3497
e: j...@cdt.org, p: 202.407.8825, pgp: https://josephhall.org/gpg-key
Fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871

Don't miss out! CDT's Tech Prom is April 10, 2019, at The
Anthem. Please join us: https://cdt.org/annual-dinner/
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: Intent-to-Ship: Backward-Compatibility FIDO U2F support for Google Accounts

2019-03-28 Thread Joseph Lorenzo Hall
Thanks for being flexible here in the face of adversity, big fan of running
trains even if it seems icky in the short term.

On Wed, Mar 27, 2019 at 1:00 PM JC Jones  wrote:

> On Tuesday, March 26, 2019 at 12:50:21 PM UTC-7, Alex Gaynor wrote:
> > Simply flipping the pref, and not including register support seems a bit
> > unfortunate, as it'll leave some websites in a works-sometimes state.
> While
> > some larger sites have UIs and help articles explaining that Firefox
> works
> > for login but not reigstering a key, many will not. If it's possible to
> > include register support in what rides the train, that seems preferable.
>
> I'm sorry to be unclear. I'm intending to include the register support as
> well.
>
> I have filed Bug 1539541 [0] to do this work:
>
> Enable the security.webauth.u2f by default, to ride the trains
>
> Remove the aOp == U2FOperation::Sign check from EvaluateAppID in
> WebAuthnUtil.cpp, permitting the Google override to work for Register as
> well as Sign.
>
> Further discussion is still welcome, either here or on the bug.
>
>
> [0] https://bugzilla.mozilla.org/show_bug.cgi?id=1539541
> ___
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform
>


-- 
Joseph Lorenzo Hall
Chief Technologist, Center for Democracy & Technology [https://www.cdt.org]
1401 K ST NW STE 200, Washington DC 20005-3497
e: j...@cdt.org, p: 202.407.8825, pgp: https://josephhall.org/gpg-key
Fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871

Don't miss out! CDT's Tech Prom is April 10, 2019, at The
Anthem. Please join us: https://cdt.org/annual-dinner/
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform


Re: Proposed W3C Charter: Media Working Group

2019-04-09 Thread Joseph Lorenzo Hall
(Mozilla fan boy here, not an employee)

Just to chime in that a number of us involved in the last great W3C EME/DRM
fight are going to chime in that we'd like to see protections for security
researchers that do privacy and security work on browsers, specs, etc. The
idea that didn't go very far last time was a "litigation non-aggression
covenant" that would forbid any W3C member contributing to the spec to
threaten or file suit against security researchers working in this area. As
you can see, last time this didn't end well and resulted in the EFF exiting
W3C (IIRC):
https://lists.w3.org/Archives/Public/public-html-media/2017Jun/0015.html It
seems important to have these conversations, but I must admit the apetite
to actually hammer out such a thing will not be big (imagine trying to
revise or propose a patent agreement, no one likes that). best, Joe

On Mon, Apr 8, 2019 at 4:22 PM L. David Baron  wrote:

> The W3C is proposing a new charter for:
>
>   Media Working Group
>   https://www.w3.org/2019/04/media-charter-draft.html
>   https://lists.w3.org/Archives/Public/public-new-work/2019Apr/0003.html
>
> Mozilla has the opportunity to send comments or objections through
> Friday, May 3.
>
> Please reply to this thread if you think there's something we should
> say as part of this charter review, or if you think we should
> support or oppose it.
>
> Given that we implement a number of the specifications the group
> will maintain, and are likely to implement others, we should almost
> certainly express *some* opinion on this charter, even it is just
> support.
>
> -David
>
> --
> 𝄞   L. David Baron http://dbaron.org/   𝄂
> 𝄢   Mozilla  https://www.mozilla.org/   𝄂
>  Before I built a wall I'd ask to know
>  What I was walling in or walling out,
>  And to whom I was like to give offense.
>- Robert Frost, Mending Wall (1914)
> ___
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform
>


-- 
Joseph Lorenzo Hall
Chief Technologist, Center for Democracy & Technology [https://www.cdt.org]
1401 K ST NW STE 200, Washington DC 20005-3497
e: j...@cdt.org, p: 202.407.8825, pgp: https://josephhall.org/gpg-key
Fingerprint: 3CA2 8D7B 9F6D DBD3 4B10  1607 5F86 6987 40A9 A871
___
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform