On Tue, Jan 2, 2018 at 1:40 PM, Mateusz Jończyk <mat.jonc...@o2.pl> wrote:
> CCing Ted Lemon <mellon at fugue.com> as the author of previous > proposition. > > W dniu 02.01.2018 o 21:20, Eric Rescorla pisze: > > On Tue, Jan 2, 2018 at 12:08 PM, Mateusz Jończyk <mat.jonc...@o2.pl > > <mailto:mat.jonc...@o2.pl>> wrote: > > > > Then the browser should display a message inside the warning screen > that the > > string cannot be trusted. > > > > Users tend to ignore that kind of warning. > Not any more then they ignore certificate warnings [2]. That's not clear. We would be providing some sort of attacker-controlled text to the user with a warning that says "you can't trust this". That's difficult to pull off. Moreover, the certificate warnings are under control of the browser, but we actively work to discourage the user from ignoring them. Moreover, for HSTS sites, the browser doesn't allow the user to override them, so providing some attacker-controlled information would make the situation materially worse. And given that a lot of the sites which people are likely to hit with captive portals are in fact HSTS sites (because HSTS is common in big sites) instead showing attacker controlled information would make things materially worse. -Ekr
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls