[security] The costs of HTTPS

Dan Lyke danlyke at flutterby.com
Thu Oct 26 18:35:06 UTC 2006


On Thu, 26 Oct 2006 11:04:05 -0700, Alaric Dailey wrote:
> "We have enough fast, insecure systems. We don't need another"

Good point, but if you're going to go to Six Apart and ask them to  
adopt HTTPS in version 2, and they say "it'll cost $X", it's good if,  
beforehand, you both know that it's going to cost $X and that you have  
justification for *why* they should bear that cost.

"We have this really cool technology and you should adopt it."

"That'll cost us $50k."

"But it's really really cool. And secure! And really cool!"

Versus:

"That'll cost us $50k."

"But we've explored the alternatives, and we believe that by spending  
that money you'll increase your uptake in use of this system by  
e-commerce sites which use the following three credit card processors,  
which comprise X% of sites in this demographic, giving you this  
additional publicity. And the risk of not doing this is that DNS  
poisoning could cause..."

That way they know you've already actually thought through the risks  
and rewards of the entire security system (and security is a system,  
not a technology), and are willing to discuss specifics.

I know, in my more naive years (circa 1993) I walked into a mid-sized  
city newspaper exec's office and said "The web is coming! It's really  
cool! You should get involved!". Thankfully he didn't laugh me out,  
but he did sit me down and give me a good education on why that was a  
foolish approach. It turns out that I was right and he should have  
done some things differently, but maybe if I'd been smarter in my  
pitch to him we'd both have made more money.

What I've heard thus far from the HTTPS with a signed CA side of the  
argument is not a risk/reward assessment of a system, it's a "let's  
throw this technology at it" approach, and most of the proponents have  
apparently (from some of the arguments being made), not even read the  
OpenID 2.0-10 spec.

And while I've gone off and found quite a bit of information on DNS  
security on my own, nobody on the pro "HTTPS for everything" side has  
been willing to talk about that, other than that, yes, some exploits  
have occurred.

Dan



More information about the security mailing list