Security and usability

Alex Russell alex at netWindows.org
Mon Aug 18 22:03:27 BST 2003


On Monday 18 August 2003 15:33, Datschge wrote:
> Thank you for taking the time to collect all the exceptions, but I don't
> see how your collection is representative of the whole internet. Also I'd
> prefer you to use a less flaming tone in your responses. You're wrong if
> you think you are doing anyone including yourself a favor by flaming
> around.
>
> > Great, now almost all my sites are broken because I usually have all
> > static information (pictures, css, js) served from another domain because
> > I use mod_rewrite.
>
> Why spreading out the source over different domains? Most sites which do so
> use subdomains for this purpose, if at all.

I think this is a naive and broken assumption. As a web application security 
specialist, I can tell you that blocking these types of data isn't likely to 
yeild a significant positive outcome, but that's kind of orthoginal to the 
bigger picture.

The hardest part of security is figuring out what is _really_ important in a 
system, and what the credible attacks are. I don't see any indication that a 
threat model has been put togeather for this proposal, rather the proposal 
was more along the lines of "I think this will be good, what do you think?" 
(this is not a slam or meant to be denigrating, the disucssion of privacy 
features is something I wholeheartedly support). So far the debate has 
generally continued in this vein with examples and counter examples from each 
side. This is not the way to design or discuss security features.

Rather, let's break down the suggested features, one by one. Let's look at the 
threats posed by each type of data/action, figure out the frequency/impact of 
the problem, and take action based on consensus around those results. If you 
constrain your actions to those in which the benefit clearly outweighs the 
cost/inconvenience to the user (with the potential to lower that cost via new 
features), you'll wind up with a system your users actually want to use, not 
least of all because it does what they think it should (and provides options 
where those expectations differ) and only "breaks" things where there is 
tangible benefit to doing so.

Anyway, if this discussion were really about privacy, we'd be talking about 
making things like anonymizer.com easier to use from inside the browser 
(avoid explicit login w/ them, remove need for explicit anonymizer frame, 
etc...) as well as encrypting temp files and throwing away the key at the end 
of a browser session, those kinds of things. As it stands, it sounds like a 
pissing match, which really isn't helping us get anywhere quickly.

So what do you say? Anyone up for some threat tree modeling? I know I'm game.

-- 
Alex Russell
alex at burstlib.net
alex at netWindows.org




More information about the kfm-devel mailing list