1 of 58

Improving SSL warnings

Adrienne Porter Felt

Chrome security team

felt@chromium.org

2 of 58

3 of 58

THE HOLY GRAIL

1. Warn only when under attack

4 of 58

THE HOLY GRAIL

2. Users understand warnings

5 of 58

THE HOLY GRAIL

3. Users follow warning advice

6 of 58

How can browsers stop crying wolf?

Photo credit: https://www.flickr.com/photos/tambako

7 of 58

Webmaster mistakes

Real

attacks

HOW I IMAGINED ERRORS

8 of 58

0%

DEVELOPER

SSL ERRORS,

MEASURED

10%

20%

WWW SUBDOMAIN

SUBDOMAIN

SUBDOMAIN REV

OUTSIDE WILDCARD

UNKNOWN TLD

MULTI-TENANT

LOCALHOST

PRIVATE URL

% OVERRIDABLE SSL ERRORS

9 of 58

a248.e.akamai.net

Client clock wrong

Captive

portal

Client missing

root certificate

Certificate mis-issuance

Anti-virus software

School or employer

State attacks

Malware

ISP adding advertisements

Gov’t content filter

Expired certificate

FALSE POSITIVE

REAL ATTACK

10 of 58

a248.e.akamai.net

Client clock wrong

Captive

portal

Client missing

root certificate

Certificate mis-issuance

Anti-virus software

School or employer

State attacks

Malware

ISP adding advertisements

Gov’t content filter

Expired certificate

FALSE POSITIVE

REAL ATTACK

11 of 58

a248.e.akamai.net

Client clock wrong

Captive

portal

Client missing

root certificate

Certificate mis-issuance

Anti-virus software

School or employer

State attacks

Malware

ISP adding advertisements

Gov’t content filter

Expired certificate

FALSE POSITIVE

REAL ATTACK

12 of 58

a248.e.akamai.net

Client clock wrong

Captive

portal

Client missing

root certificate

Certificate mis-issuance

Anti-virus software

School or employer

State attacks

Malware

ISP adding advertisements

Gov’t content filter

Expired certificate

FALSE POSITIVE

REAL ATTACK

13 of 58

a248.e.akamai.net

Client clock wrong

Captive

portal

Client missing

root certificate

Certificate mis-issuance

Anti-virus software

School or employer

State attacks

Malware

ISP adding advertisements

Gov’t content filter

Expired certificate

FALSE POSITIVE

REAL ATTACK

14 of 58

Blame

the clock

Wrong clocks cause 20% of HSTS errors

15 of 58

Captive

portals

4.5% of all errors caused by redirects

16 of 58

Wonky

trust stores

Expired and missing certificates

17 of 58

Traffic shaping

Throttle or block expensive streaming

18 of 58

Schools &

employers

Network admins want to filter content

19 of 58

Traffic

is $$$$$

Monetizing traffic with ads, search, etc.

20 of 58

Clear-cut

attack

More common than we think?

21 of 58

define,

identify,

fix

22 of 58

define,

identify,

fix

23 of 58

define,

identify,

fix

24 of 58

define,

identify,

fix

25 of 58

How do we explain this to users?

Photo credit: https://www.flickr.com/photos/sandras_weeds

26 of 58

WHAT WE WANT TO CONVEY

Threat source: the attacker is on the network, not a malicious website

27 of 58

WHAT WE WANT TO CONVEY

Data risk: the data on foo.com is at risk (and no other data)

28 of 58

WHAT WE WANT TO CONVEY

False positives: be more concerned about errors on well-regarded sites

29 of 58

  • Non-technical language _
  • Sixth grade reading level _
  • As brief as possible _
  • Specific about risk _
  • Enough information _

30 of 58

...the server presented a certificate issued by an entity that is not trusted by your computer’s operating system.

31 of 58

The security certificate presented by this website

was not issued by a trusted certificate authority.

32 of 58

...security is

up to date on

your computer

33 of 58

...security is

up to date on

your computer

I don’t know if my information is safe…

I don’t know what encrypted means

34 of 58

  • Non-technical language F
  • Sixth grade reading level F
  • As brief as possible B
  • Specific about risk A
  • Enough information A

35 of 58

Your connection is not private. Attackers might be trying to steal your information from www.irs.gov (for example, passwords, messages, or credit cards).

36 of 58

  • Non-technical language A
  • Sixth grade reading level A
  • As brief as possible A
  • Specific about risk C
  • Enough information D

37 of 58

Threat source

CORRECT

Chrome 37

49%

Chrome 36

38%

Safari

36%

Firefox

39%

IE

39%

38 of 58

Data risk

BANK

ALL

Chrome 37

18%

65%

Chrome 36

18%

62%

Safari

14%

67%

Firefox

20%

69%

IE

19%

51%

39 of 58

None succeed yet; how do we do better?

40 of 58

Can we nudge users to heed our advice?

Photo credit: https://www.flickr.com/photos/lara604/

41 of 58

  • Clear instruction _
  • Attractive preferred choice _
  • Unattractive other choice _

42 of 58

OLD CHROME SSL WARNING

43 of 58

OLD CHROME SSL WARNING

44 of 58

OLD CHROME SSL WARNING

45 of 58

  • Clear instruction B
  • Attractive preferred choice F
  • Unattractive other choice F

46 of 58

47 of 58

48 of 58

49 of 58

50 of 58

  • Clear instruction C
  • Attractive preferred choice A
  • Unattractive other choice A

51 of 58

52 of 58

53 of 58

54 of 58

ADHERENCE

N

30.9%

4,551

32.1%

4,075

58.3%

4,644

55 of 58

Opinionated design works where text fails

56 of 58

So in conclusion...

Photo credit: https://www.flickr.com/photos/sandras_weeds

57 of 58

TODO LIST

  • Warn only when under attack
  • Users understand warnings
  • Users follow warning advice

58 of 58

Adrienne Porter Felt

felt@chromium.org

In collaboration with...

Mustafa Acer

Alex Ainslie

Alan Bettes

Radhika Bharghava

Sunny Consolvo

Lucas Garron

Helen Harris

Elisabeth Morant

Chris Palmer

Robert W. Reeder

Ryan Sleevi

Parisa Tabriz

Somas Thyagaraja

Joel Weinberger