I've known this for a while
Now all I really want is a list of sites that don't work, so I can either avoid them or try to pressure them to update. By now Mozilla must have done surveys and have a list or two.
Mozilla has warned Firefox users they may be cut off from more of the web than expected – now that the browser rejects new HTTPS certificates that use the weak SHA-1 algorithm. If you use Firefox with some antivirus products, or on a network fitted with a box that inspects traffic for malicious stuff, and visit a site that …
all I want is the ability to override this behavior, firefox should treat this as a self signed cert in the worst case. Other times they have decided to drop support for some SSL feature or function they completely bocked it with a very cryptic error message, there's no reason to treat it any worse than a self signed cert and force the user to accept it.
But this would be the case should Mozilla was acting in the interest of their users, and not trying to make "an impact on the industry" and "laser focusing on the web".
Mozilla lost the plot a while back.
Their insistence on copying the dumbed down Chrome has driven many people to... Chrome.
Heck even I use Chrome more and more simply because it doesn't eat my CPU for no reason, and if a page does eat CPU shit+esc and I can tell where the problem lies.
One would think that Mozilla would try to copy/fix these issues on Firefox, but what do they come with?
* Useless changes to the UI
* More useless changes to the UI
* Lots and lots of changes to the UI no one asked for, and lots clamoured against (Australis)
* Remove all the functionality they can get away with and which people some times depend on
* Remove back end functionality used by people to regain missing functionality through add-ons.
* And the latest one... get rid of Thunderbird!? because it is not popular or needed...? sorry what?
Now they are thinking on killing SHA1 so if you have an old device lingering around that uses these type of certificate you can not connect because Mozilla wants to prevent you from harm. Setting an exception you crazy? You silly, use a Windows XP computer with IE 6,7,8, because we can not bother to treat our users like intelligent beings and allow them to set an exception or set a setting somewhere to re-enable it in case someone truly needs it.
I used to recommend Firefox, but I can not any more.
Now all I really want is a list of sites that don't work, so I can either avoid them or try to pressure them to update.
Unless you're referring to use of SHA-1 certificates in general, I think maybe you're missing the point; this article is about security devices between you and the internet that MITM your connection by generating their own SHA-1 certificates. In these circumstances every HTTPS site you try to connect to will be borked.
The description doesn't makes sense or the third party scanning is flawed.
The scanning device Is taking a valid certificate (albeit potentially week), and replacing it with a third party certificate, and end users are expected to trust it? Having spent years trying to stop the users from trusting just anything and only trusting the proved original?
I guess I'm missing something...
An AV system, firewall that uses 'deep scanning' technology allows a company to decrypt ssl traffic so it can be checked for viruses, company information, unauthorised use, bandwidth management policies, caching etc. The way it does this is to place itself as a trusted root in your certificate store then generate certificates on the fly for HTTPS sites you visit. It acts as a proxy.
So you ask the 'security' device for https://www.securesite.com and the 'security' device pretends it is the secure site - in the background it asks the real securesite.com for the requested information (using its normall connection). The traffic flow in the 'security' device is therefore unencrypted (Man in the Middle) and can be analysed.
Does this mean that an organisation can snoop on all your secured comms and banking passwords etc? Yes, it does.
Does it break end-to-end trust relationship of the user <-> website? Yes it does.
However, with malware using SSL now, it can be useful for securing a company network and data.
Firefox is getting more and more flaky as they go out on their own and far too many websites are now unusable. It is all very well doing this but they shoukd have some mechanism for informing the more important websites of their security problems. I have tried several times informing banks etc etc about their certificate issues and support for insecure protocols but they just deny everything and don't understand or care about the issues. Don't suggest changing banks because they all have similar problems.
On top of it all Firefox has the nerve to include insecure messaging protocols and other garbage that you can't uninstall.
Perhaps the Register could have an ongoing headline front page item with a hall of shame for the worst security issues of big organisations. Of course they would complain that this is helping the hackers.
"Bear in mind, though, that you're trading one security problem (the inability to filter malicious traffic) against another (the inability to securely verify the integrity of the HTTPS connection)."
Just to be entirely clear:
* Nobody has yet created any two documents with the same SHA-1 hash, even random birthday collisions
* The $75,000 theoretical attack is not for a pre-image attack (i.e. where you make a document with some chosen content)
Maybe these things will become feasible in the next year or two - that's why SHA-1 is being retired now.
But if your PC is sitting behind a man-in-the-middle device, which decrypts all your traffic and then provides a spoof certificate to convince your browser it is actually connected directly to the target site, then you have much more serious security issues to worry about than that.
Thanks. Tried that, but for some reason it had no effect here. Chrome with Vanilla, Context Menu Search, uBlock Origin and ScriptBlock works for me. Blocking Google in uBlock only seems to affect the New Tab page. All of the other Google extensions are turned off. FF used to crash periodically; Chrome never does. Just can't find a reason to go back to FF.
I have to manage various bits of kit via embedded web-servers. Manufacturers can have gone out of business, or simply not be interested in providing updated firmware - so I'd like Firefox to have the ability to whitelist certain ip addresses and/or domain names so that in general using SHA1 won't work, but for particular sites/devices, it will. I don't want to simply allow all sites. the current approach seems to be all or nothing, which is not particularly helpful.
If you're directly connected to the internet, then Firefox is doing the right thing, stopping you using a "secure" connection that isn't.
If you are behind an AV box using fake certificates to MITM and scan your traffic, the developer should be updating the product and should have already moved to SHA256. If the box isn't being updated (you're not paying the subscription, or the developer's discontinued it), you're better off without it.
The biggest issue I find these days is logging onto routers and other consumer level web enabled devices.
They all have legacy or flawed implementations of SSL and Java, and there is absolutely no chance of ever getting it updated - the manufacturers don't care, they'd rather sell you a new device.
Yet Chrome and Firefox both have the idea that THIS IS BAD THEREFORE BLOCK BLOCK BLOCK. While I agree with the concept for web based sites, it really should be possible to whitelist a local network IP.
At the moment I'm forced to use a dedicated old version of FF so that the NPAPI plugins work, and half the time I have to dig out IE 9 to access the login pages. Not exactly safe, but Chrome and FF are both actively preventing me doing my work in the real world.
I completely agree Firefox lost the plot ages ago. They are very selective about support for security and privacy. Look at all the uninstallable junk protocols, advertising and monitoring that are impossible or very difficult to remove. They even force the use of DRM unless you went for the DRM free EME-Free fork.
I found I had to keep using addons to fight against the privacy and security issues they keep creating.
Like most "free" software they have infinite development time for tweaking the appearance and making meaningless changes to the UI, but deliberately make it difficult to customise the simplest options by removing the capability to configure from the menus.
Don't even mention the Android version, which is completely out of control.
I gave up with Firefox and went for the Palemoon derivative which is simpler, more privacy oriented, mostly Google-free (unlike Firefox), but can be more flakey as they don't have many developers.
.deb
packages