With Great Power
Comes Great
Responsibility

Powerful Features and 

Encryption on the Web

Daniel Appelquist (@torgo), Open Web Advocate

Co-Chair, W3C Technical Architecture Group (@w3ctag)

These slides: https://slides.com/torgo/power2015

The TAG - w3.org/tag

Tim Berners-Lee (W3C, Chair, “web developer”)
Mark Nottingham (Akamai; http wg chair)
Daniel Appelquist (Invited Expert, Chair)
Yan Zhu (Yahoo!)
Hadley Beeman (W3C Invited Expert)


 

Peter Linss (HP, Chair)
Travis Leithead (Microsoft)
Yves Lafon (W3C, staff contact)
Alex Russell (Google)
David Baron (Mozilla, not shown)

The web needs to clean up its act on security & privacy

Why now?

Because Snowden!!!1!!

Ok, yes… and…

  • the web is becoming more powerful
  • the web is an essential part of everyday life
  • web privacy is a punch line (and that has to change)
  • the balance of power on the web is heavily weighted towards big services / big ad networks / big governments
  • public wifi hotspots are injecting script
  • government surveillance is on the rise
    • there are more than one government
    • these surveillance powers are being abused
  • what you “like” can get you tortured and killed

SRINT Workshop

February 2014 in London

+

“Pervasive Monitoring
is an Attack”

  • Pervasive monitoring is “surveillance at widespread observation points, without any particular target in mind at time of surveillance, and without any modification or injection of of network traffic.” - Trammell, et al.
  • “The IETF community has expressed strong agreement that PM is an attack that needs to be mitigated where possible, via the design of protocols that make PM significantly more expensive or infeasible.” - Farrell & Tschofenig

It's all about Trust

  • The web is supporting more and more of the world’s communications
  • Trustworthiness is key
  • Pervasive monitoring undermines that trust
  • HTTPS was originally deployed so that people could have trust in spending money online
  • Now, more and more of what we do online requires that level of trust

Is the web
fit for purpose?

So what's happening?

TAG Finding: Securing the Web

  • Moving the Web to https
  • Motivations thereof
  • Coordinating with the web community

https://www.w3.org/2001/tag/doc/web-https

US Whitehouse Moving US Federal Websites to https

UK Government Data Services

  • It’s very important that this information can’t be intercepted by malicious third parties as it travels over the Internet.”
  • “all services accessed through service.gov.uk domains MUST only be accessible through secure connections”
  • “use HSTS”

https://www.gov.uk/service-manual/domain-names/https.html

How can we move to a secure web?

Secure Contexts

  • Née “Privileged Contexts,” née “Powerful Features
  • Joint work between TAG and Web Apps Security Group

https://w3c.github.io/webappsec/specs/powerfulfeatures/

What's a Powerful Feature?

  • The feature provides access to sensitive data
  • The feature provides access to sensor data on a user’s device 
  • The feature provides access to or information about other devices a user has access to
  • The feature exposes temporary or persistent identifiers
  • The feature introduces some state for an origin which persists across browsing sessions
  • The feature manipulates a user agent’s native UI in some way which could trick the user
  • The feature requests user permission 

…and the web is adding more and more of these, all the time!

Some commonly raised objections to HTTPS

(and why they’re wrong)

Credit to Yan Zhu of Yahoo! & member of W3C TAG

1. HTTPS is expensive and hard to set up

  • This is getting better
  • Many hosting providers already offer point-and-click wizards for setting up TLS
  • EFF “LetsEncrypt” initiative in the near future
    • New certificate authority
    • Free certificates
    • New cert management protocol: ACME
    • Entire process < 30 seconds
    • Wide industry support
  • First cert issued
  • Launching November(ish)

2. There is no value in using HTTPS for public data (e.g. news articles)

  • Cousin of the “if you have nothing to hide you have nothing to fear” mindset
  • Misses the point that aggregating browser data can reveal a lot
  • What’s public and non-controversial in one country may be subversive in another
  • What symptoms you search for on health websites are could raise your insurance premiums
  • What article you leave a comment on in The Guardian or what you “like” on Facebook can get you thrown in prison

3. TLS is Slow

  • Mostly not
  • Modern versions optimize away most of the performance issues
  • c.f. https://istlsfastyet.com (spoiler: it is)
  • HTTP/2 also offers performance gains

4. TLS breaks feature “X”

  • Usually having to do with “mixed content”
  • Yes, there is more work to do than just switching to https
  • Modern developer tools can help you debug these issues
  • “https everywhere” tool also can help to debug issues
  • Does this break the web?
  • probably still the thorniest issue

Upgrade Insecure Requests

  • There's a lot of legacy content out there in file systems, databases, etc...
  • A CSP directive
  • Makes it easier for site owners to transition to https
  • Directs the browser to change insecure requests to secure ones

5. HTTPS offers “false sense of security”

  • …compared to what?
  • Yes, there are holes in the current CA system, these are being addressed
  • It’s better than the alternative which is no encryption
  • It mitigates against pervasive monitoring
  • It minimizes the data “on the wire”

Asking Permission

Permissions API

Finer-grained control over permissions-requesting APIs

For example:

You can't tell whether a website already has geolocation permission before you try to use it.

A permissions anti-pattern

Ask permission
for a purpose

Multiple permissions requests can be a mess

Permissions API

  • Finer-Grained Control for the Web developer
  • Compose permissions asks together
  • Allows developer to lead the user through the permissions-granting process
  • More meaningful permissions dialog with the user

Finding: End-to-End Encryption

Finding: Unsanctioned Web Tracking

Explicitly calling out inappropriate use of web technology for tracking purposes as harmful and against web architecture

https://www.w3.org/2001/tag/doc/unsanctioned-tracking/

Side note:

Don't do this!

That “s” – and some of the web's other greatest mistakes

Opportunistic Encryption

Maybe coming to a browser near you…

HTTP/2

Another Powerful Feature

  • http/2 is here and you are already using it
  • It offers great performance gains over ubiquitously deployed http/1.1 (especially for mobile)
  • Derived from Google’s SPDY project
    • is binary, instead of textual
    • is fully multiplexed
    • can therefore use one connection for parallelism
    • uses header compression to reduce overhead
    • allows servers to “push” proactively
  • Browsers are only implementing http/2 over HTTPS
  • If you’re not already working with it, you should be

Demos: http://www.http2demo.iohttps://http2.akamai.com/demo

Site: https://http2.github.io​

One does not simply…

…encrypt the web.

This is our web

  • The web is now a part of every aspect of our daily lives
  • Think progressively about security and privacy
  • ​Move towards an encrypted web
  • Embrace web superpowers but wield them carefully

Thanks!

Daniel Appelquist

@torgo@w3ctag 

With Great Power comes Great Responsibility

By Daniel Appelquist

With Great Power comes Great Responsibility

Talk for FOWA 2015 by Daniel Appelquist

  • 3,761