From nobody Mon Apr 7 05:36:14 2014 Return-Path: X-Original-To: wpkops@ietfa.amsl.com Delivered-To: wpkops@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B13E31A06EB for ; Mon, 7 Apr 2014 05:36:11 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.91 X-Spam-Level: X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y0YBMTVlQTwO for ; Mon, 7 Apr 2014 05:36:06 -0700 (PDT) Received: from extmail1.yaanatech.com (extmail1.yaanatech.com [63.128.177.51]) by ietfa.amsl.com (Postfix) with SMTP id 5F0BC1A0668 for ; Mon, 7 Apr 2014 05:36:06 -0700 (PDT) Received: from [192.168.1.51] (pool-71-171-106-160.clppva.fios.verizon.net [71.171.106.160]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by extmail1.yaanatech.com (Postfix) with ESMTP id 1FE375808C for ; Mon, 7 Apr 2014 12:36:03 +0000 (UTC) Message-ID: <53429BAF.50002@yaanatech.com> Date: Mon, 07 Apr 2014 08:35:59 -0400 From: Tony Rutkowski Organization: Yaana Technologies User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.4.0 MIME-Version: 1.0 To: wpkops@ietf.org References: <000601cf5230$5abd0a80$10371f80$@x500.eu> In-Reply-To: <000601cf5230$5abd0a80$10371f80$@x500.eu> X-Forwarded-Message-Id: <000601cf5230$5abd0a80$10371f80$@x500.eu> Content-Type: multipart/alternative; boundary="------------060000090401010601080201" Archived-At: http://mailarchive.ietf.org/arch/msg/wpkops/Dtg4j0JIycPr8cWD_QlpmMwuJNA Subject: [wpkops] Fwd: [T17Q11] Trust anchor information X-BeenThere: wpkops@ietf.org X-Mailman-Version: 2.1.15 Precedence: list Reply-To: tony@yaanatech.com List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 07 Apr 2014 12:36:11 -0000 This is a multi-part message in MIME format. --------------060000090401010601080201 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: quoted-printable FYI -------- Original Message -------- Subject: [T17Q11] Trust anchor information Date: Mon, 7 Apr 2014 09:09:41 +0200 From: Erik Andersen To: Directory list , SG17-Q11=20 CC: SG17-Q10 After some useful discussions, I have prepared an update of DR_394 (see=20 http://x500standard.com/uploads/Ig/DR_394.pdf). Comments are welcome. Regards, Erik --------------060000090401010601080201 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable FYI


-------- Original Message --------
Sub= ject: [T17Q11] Trust anchor information
Dat= e: Mon, 7 Apr 2014 09:09:41 +0200
Fro= m: Erik Andersen <era@x500.eu>
To:= Directory list <x500standard@freelists.org>, SG17-Q11 <T13sg17q11@lists.itu.int>
CC:= SG17-Q10 <t13sg17q10@lists.itu.int>


After some useful discussions, I have prepared an update of DR_394 (see http:/= /x500standard.com/uploads/Ig/DR_394.pdf).

 

Comments are welcome.

 

Regards,

 

Erik

 



--------------060000090401010601080201-- From nobody Tue Apr 29 11:59:00 2014 Return-Path: X-Original-To: wpkops@ietfa.amsl.com Delivered-To: wpkops@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 78B0A1A097A for ; Tue, 29 Apr 2014 11:58:58 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.252 X-Spam-Level: X-Spam-Status: No, score=-2.252 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.651, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jvuFN0ljr9Q8 for ; Tue, 29 Apr 2014 11:58:56 -0700 (PDT) Received: from mail.digicert.com (mail.digicert.com [64.78.193.232]) by ietfa.amsl.com (Postfix) with ESMTP id 08D101A0979 for ; Tue, 29 Apr 2014 11:58:56 -0700 (PDT) Received: from BWILSONL1 (unknown [67.137.52.8]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.digicert.com (Postfix) with ESMTPSA id A79F37FA38D for ; Tue, 29 Apr 2014 12:58:54 -0600 (MDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=digicert.com; s=mail; t=1398797934; bh=1edtvrb1A0Mq2ZNq3MRGEnecMXRBXUiY+wct5WnCNho=; h=Reply-To:From:To:Subject:Date; b=xdGmUS0TiM58tGjSCaSfe4NADy7bIfMlVgDH5FCobhnX67BJgeiSPVT9jWzCTnYtM L9zQDSgE3QCLE5bhTJukFMSPigwbSdM8EIy67A0nptF2cN0252OM3VWFlE9v2uk0vj E1J53jTDiSBkK08+Brz9d6DGCEafBtbccTyohJkE= From: "Ben Wilson" To: Date: Tue, 29 Apr 2014 12:58:50 -0600 Organization: DigiCert Message-ID: <029801cf63dd$0f484330$2dd8c990$@digicert.com> X-Mailer: Microsoft Outlook 14.0 Thread-Index: Ac9j3Q10HtNKjLCHSyqk1X1AnOH2aw== Content-Language: en-us MIME-Version: 1.0 Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_0290_01CF63AA.C4271700" Archived-At: http://mailarchive.ietf.org/arch/msg/wpkops/EQkgBpY13Vr5zynJO4f5WxJiSIw Subject: [wpkops] Taxonomy of Browser Behaviors - "Hard Fail", "Soft Fail" and "Reload Request" X-BeenThere: wpkops@ietf.org X-Mailman-Version: 2.1.15 Precedence: list Reply-To: ben@digicert.com List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 29 Apr 2014 18:58:58 -0000 This is a multipart message in MIME format. ------=_NextPart_000_0290_01CF63AA.C4271700 Content-Type: multipart/alternative; boundary="----=_NextPart_001_0291_01CF63AA.C4271700" ------=_NextPart_001_0291_01CF63AA.C4271700 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit In working on the next version of the Certificate Processing document, I have come across two different uses of "hard fail." I am also concerned that use of the phrase, "soft fail," might encounter similar problems. Also I've seen "Retry" or "Reload" messages, which are hard fail, but with an option to try loading again. I've seen "hard fail" used (1) when referring to a session that is stopped because of certificate revocation, where the user is prevented from proceeding, and also (2) when referring to intentional client behavior when encountering other problems with the certificate that indicate it is not trustworthy. (I suppose it could also mean a crash or other unintentional behavior because of a bug in code.) With respect to (2), I have called this a "fatal error" - A behavior in which the browser detects an abnormal condition and halts (or technically cannot complete) session negotiation and drops the connection or otherwise blocks the user from continuing (also referred to as "hard fail")." However, in Phill's paper on revocation behavior, he uses "hard fail", too. I have used the term "bypassable error" instead of "soft fail", defined as "behavior in which the browser detects an abnormal condition and asks the user whether to proceed with (i.e. click-through to) the SSL/TLS connection." Is this the same as "soft fail"? (I'm assuming that a negative visual indicator or a "downgrade" of security indicators like removal of the lock icon, removal of EV indication, etc., are not "soft fail." I hope that everyone agrees.) Any thoughts? Does it matter what kind of "next step" is provided in the dialogue presented to the user? For instance, the distinction between hard and soft fail might be as simple as whether the error window lacks or contains buttons or links that allow the user to proceed toward making the SSL/TLS connection. For "hard fail," here is what I've seen: [Error Message] Firefox - "Fix connection problems" Opera - "This webpage is not available" Chrome - "This webpage is not available" Internet Explorer - "IE cannot display the webpage" "What you can try: Diagnose Connection Problems" Internet Explorer - "This page cannot be displayed. Fix connection problems" In looking at soft fail / bypassable errors, here are some of the buttons provided for a variety of different conditions, such as invalid certificates: [Error Message] Firefox - "Get me out of here" "Technical Details" "I understand the risks" Safari - "Show Certificate" "Cancel" "Continue" Internet Explorer - "Click here to close" ""Continue to this website (not recommended)" "More Information" Chrome - "Proceed anyway" or "Back to safety" and "Help me understand" Opera - "Show Certificate" "Continue Anyway" and "Cancel" or "Back to Safety" A third option I've noticed is a "reload request", which I think is different than a bypassable error or hard fail. Am I right? Here are some messages: Chrome - "More" or "Reload" Firefox - "Try again" Thanks, Ben ------=_NextPart_001_0291_01CF63AA.C4271700 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

In working = on the next version of the Certificate Processing document, I have come = across two different uses of “hard fail.”   I am = also concerned that use of the phrase, “soft fail,” might = encounter similar problems.  Also I’ve seen = “Retry” or “Reload” messages,  which are = hard fail, but with an option to try loading again.

 

I’ve = seen “hard fail” used (1) when referring to a session that = is stopped because of certificate revocation, where the user is = prevented from proceeding, and also (2) when referring to intentional = client behavior when encountering other problems with the certificate = that indicate it is not trustworthy.  (I suppose it could also mean = a crash or other unintentional behavior because of a bug in code.)  = With respect to (2), I have called this a “fatal error” - A = behavior in which the browser detects an abnormal condition and halts = (or technically cannot complete) session negotiation and drops the = connection or otherwise blocks the user from continuing (also referred = to as “hard fail”).”  However, in Phill’s = paper on revocation behavior, he uses “hard fail”, = too. 

 

I have used the term “bypassable error” = instead of “soft fail”, defined as “behavior in which = the browser detects an abnormal condition and asks the user whether to = proceed with (i.e. click-through to) the SSL/TLS = connection.”  Is this the same as “soft fail”? =  (I’m assuming that a negative visual indicator or a = “downgrade” of security indicators like removal of the lock = icon, removal of EV indication, etc., are not “soft = fail.”  I hope that everyone agrees.) 

 

Any = thoughts?  Does it matter what kind of “next step” is = provided in the dialogue presented to the user?  For instance, the = distinction between hard and soft fail might be as simple as whether the = error window lacks or contains buttons or links that allow the user to = proceed toward making the SSL/TLS connection. 

 

For = “hard fail,” here is what I’ve seen:

 

[Error = Message]

Firefox - “Fix = connection problems”

Opera = – “This webpage is not available”

Chrome – “This webpage is not = available”

Internet Explorer = – “IE cannot display the webpage”  “What = you can try:  Diagnose Connection Problems”

Internet Explorer – “This page cannot be = displayed.  Fix connection problems”

 

In looking = at soft fail / bypassable errors,  here are some of the buttons = provided for a variety of different conditions, such as invalid = certificates:

 

[Error Message]

 

Firefox = – “Get me out of here” “Technical Details” = “I understand the risks”

Safari – “Show Certificate” = “Cancel” “Continue”

Internet Explorer – “Click here to = close” ““Continue to this website (not = recommended)” “More Information”

Chrome - “Proceed anyway” or  = “Back to safety”  and “Help me = understand”

 

Opera = – “Show Certificate”  “Continue = Anyway” and “Cancel” or “Back to = Safety”

 

A third option I’ve noticed is a “reload = request”, which I think is different than a bypassable error or = hard fail.  Am I right?

 

Here are = some messages:

 

Chrome - = “More” or  “Reload”

Firefox – “Try = again”

 

Thanks,

Ben

------=_NextPart_001_0291_01CF63AA.C4271700-- ------=_NextPart_000_0290_01CF63AA.C4271700 Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIRUTCCA7cw ggKfoAMCAQICEAzn4OUX2Eb+j+Vg/BvwMDkwDQYJKoZIhvcNAQEFBQAwZTELMAkGA1UEBhMCVVMx FTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEkMCIGA1UE AxMbRGlnaUNlcnQgQXNzdXJlZCBJRCBSb290IENBMB4XDTA2MTExMDAwMDAwMFoXDTMxMTExMDAw MDAwMFowZTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3 LmRpZ2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNzdXJlZCBJRCBSb290IENBMIIBIjAN BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArQ4VzuRDgFyxh/O3YPlxEqWu3CaUiKr0zvUgOShY YAz4gNqpFZUyYTy1sSiEiorcnwoMgxd6j5Csiud5U1wxhCr2D5gyNnbM3t08qKLvavsh8lJh358g 1x/isdn+GGTSEltf+VgYNbxHzaE2+Wt/1LA4PsEbw4wz2dgvGP4oD7Ong9bDbkTAYTWWFv5ZnIt2 bdfxoksNK/8LctqeYNCOkDXGeFWHIKHP5W0KyEl8MZgzbCLph9AyWqK6E4IR7TkXnZk6cqHm+qTZ 1Rcxda6FfSKuPwFGhvYoecix2uRXF8R+HA6wtJKmVrO9spftqqfwt8WoP5UW0P+hlusIXxh3TwID AQABo2MwYTAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUReuir/SS y4IxLVGLp6chnfNtyA8wHwYDVR0jBBgwFoAUReuir/SSy4IxLVGLp6chnfNtyA8wDQYJKoZIhvcN AQEFBQADggEBAKIOvN/i7fDjcnN6ZJS/93Jm2DLkQnVirofr8tXZ3lazn8zOFCi5DZdgXBJMWOTT PYNJRViXNWkaqEfqVsZ5qxLYZ4GE338JPJTmuCYsIL09syiJ91//IuKXhB/pZe+H4N/BZ0mzXeuy CSrrJu14vn0/K/O3JjVtX4kBtklbnwEFm6s9JcHMtn/C8W+GxvpkaOuBLZTrQrf6jB7dYvG+UGe3 bL3z8R9rDDYHFn83fKlbbXrxEkZgg9cnBL5Lzpe+w2cqaBHfgOcMM2a/Ew0UbvN/H2MQHvqNGyVt bI+lt2EBsdKjJqEQcZ2t4sP5w5lRtysHCM4u5lCyp/oKRS+i8PIwggbBMIIFqaADAgECAhAHv9Jd b6GmlTp/jguOyky8MA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdp Q2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0IEFz c3VyZWQgSUQgQ0EtMTAeFw0xMzA2MDMwMDAwMDBaFw0xNjA4MzExMjAwMDBaMHQxCzAJBgNVBAYT AlVTMQ0wCwYDVQQIEwRVdGFoMQ0wCwYDVQQHEwRMZWhpMREwDwYDVQQKEwhEaWdpQ2VydDETMBEG A1UEAxMKQmVuIFdpbHNvbjEfMB0GCSqGSIb3DQEJARMQYmVuQGRpZ2ljZXJ0LmNvbTCCASIwDQYJ KoZIhvcNAQEBBQADggEPADCCAQoCggEBAK8EX23kpIJWkjmY6Sx23gtdJWUZ7R7xzitGNquNhRQs fVeKvt0/pvRdc+TSKtj58kQ0tQ1BISUuOjr5bB4TeICooUMryRzQ98Qla7SkKwREX6YtySqZl+vj c+JuW0X95Ax0aHjYe13pD+zLHmbGTumwNfxbNi2/j1EeO/tIWml1saD/nMLovWWuChPd0w4Cy4Ex v3Y6Bsl0OEIehbTAw1Mb2kBAioP/6cd70DVgBqrLz8C+kWaIfLpobTwD8/wwrGs0ANtNFx3Dxz8x sfMRHkE140Fkmhf8ogO1M/hne2OzQJUVARLYa15yIDlp5rcRDIFRfjTRXDaETUq3dPHeApcCAwEA AaOCA18wggNbMB8GA1UdIwQYMBaAFBUAEisTmLKZB+0e36K+Vw0rZwLNMB0GA1UdDgQWBBSUK0wr DI2kT+SUkmzvXtMaNBtUIzAbBgNVHREEFDASgRBiZW5AZGlnaWNlcnQuY29tMA4GA1UdDwEB/wQE AwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwQwfQYDVR0fBHYwdDA4oDagNIYyaHR0 cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEQ0EtMS5jcmwwOKA2oDSGMmh0 dHA6Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRENBLTEuY3JsMIIBxQYDVR0g BIIBvDCCAbgwggG0BgpghkgBhv1sBAECMIIBpDA6BggrBgEFBQcCARYuaHR0cDovL3d3dy5kaWdp Y2VydC5jb20vc3NsLWNwcy1yZXBvc2l0b3J5Lmh0bTCCAWQGCCsGAQUFBwICMIIBVh6CAVIAQQBu AHkAIAB1AHMAZQAgAG8AZgAgAHQAaABpAHMAIABDAGUAcgB0AGkAZgBpAGMAYQB0AGUAIABjAG8A bgBzAHQAaQB0AHUAdABlAHMAIABhAGMAYwBlAHAAdABhAG4AYwBlACAAbwBmACAAdABoAGUAIABE AGkAZwBpAEMAZQByAHQAIABDAFAALwBDAFAAUwAgAGEAbgBkACAAdABoAGUAIABSAGUAbAB5AGkA bgBnACAAUABhAHIAdAB5ACAAQQBnAHIAZQBlAG0AZQBuAHQAIAB3AGgAaQBjAGgAIABsAGkAbQBp AHQAIABsAGkAYQBiAGkAbABpAHQAeQAgAGEAbgBkACAAYQByAGUAIABpAG4AYwBvAHIAcABvAHIA YQB0AGUAZAAgAGgAZQByAGUAaQBuACAAYgB5ACAAcgBlAGYAZQByAGUAbgBjAGUALjB3BggrBgEF BQcBAQRrMGkwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcw AoY1aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEQ0EtMS5jcnQw DAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAQEAG2NW/zRakbPATZt2m3+Xq7P/YdUzO1R8 6vcG49KkiuNGbExefzzMJnDK67LOzHpuqIyZmbe1ssg8swdenzRsRPoOt9hY7XFwwo8JJxiElddu NPWERMBQWeIPDnfpry3ZC4bMrEPsCsVa0ClPrG2RgGpq5JkPIdgiWngnHyl3ZajiqYca7faWU8eq SDjsyHj6KSF0M9gXhuTjZ20aMA3DZ0exTE2XAYYJUXLSg49szMy28LRW6i0rLfAfx1uNXjGfzdnf gYFRdkdSXqRgdXgCHtSmbAOi077oIvyVeBb2W7P9o+G29sZ/x8bLYoE/K2uliJ8fBAswrsdcirv3 Jqo+fDCCBs0wggW1oAMCAQICEAb9+QOWA63qAArrPye7uhswDQYJKoZIhvcNAQEFBQAwZTELMAkG A1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNv bTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNzdXJlZCBJRCBSb290IENBMB4XDTA2MTExMDAwMDAwMFoX DTIxMTExMDAwMDAwMFowYjELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcG A1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgQXNzdXJlZCBJRCBDQS0x MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6IItmfnKwkKVpYBzQHDSnlZUXKnE0kEG j8kz/E1FkVyBn+0snPgWWd+etSQVwpi5tHdJ3InECtqvy15r7a2wcTHrzzpADEZNk+yLejYIA6sM NP4YSYL+x8cxSIB8HqIPkg5QycaH6zY/2DDD/6b3+6LNb3Mj/qxWBZDwMiEWicZwiPkFl32jx0Pd Aug7Pe2xQaPtP77blUjE7h6z8rwMK5nQxl0SQoHhg26Ccz8mSxSQrllmCsSNvtLOBq6thG9IhJtP QLnxTPKvmPv2zkBdXPao8S+v7Iki8msYZbHBc63X8djPHgp0XEK4aH631XcKJ1Z8D2KkPzIUYJX9 BwSiCQIDAQABo4IDejCCA3YwDgYDVR0PAQH/BAQDAgGGMDsGA1UdJQQ0MDIGCCsGAQUFBwMBBggr BgEFBQcDAgYIKwYBBQUHAwMGCCsGAQUFBwMEBggrBgEFBQcDCDCCAdIGA1UdIASCAckwggHFMIIB tAYKYIZIAYb9bAABBDCCAaQwOgYIKwYBBQUHAgEWLmh0dHA6Ly93d3cuZGlnaWNlcnQuY29tL3Nz bC1jcHMtcmVwb3NpdG9yeS5odG0wggFkBggrBgEFBQcCAjCCAVYeggFSAEEAbgB5ACAAdQBzAGUA IABvAGYAIAB0AGgAaQBzACAAQwBlAHIAdABpAGYAaQBjAGEAdABlACAAYwBvAG4AcwB0AGkAdAB1 AHQAZQBzACAAYQBjAGMAZQBwAHQAYQBuAGMAZQAgAG8AZgAgAHQAaABlACAARABpAGcAaQBDAGUA cgB0ACAAQwBQAC8AQwBQAFMAIABhAG4AZAAgAHQAaABlACAAUgBlAGwAeQBpAG4AZwAgAFAAYQBy AHQAeQAgAEEAZwByAGUAZQBtAGUAbgB0ACAAdwBoAGkAYwBoACAAbABpAG0AaQB0ACAAbABpAGEA YgBpAGwAaQB0AHkAIABhAG4AZAAgAGEAcgBlACAAaQBuAGMAbwByAHAAbwByAGEAdABlAGQAIABo AGUAcgBlAGkAbgAgAGIAeQAgAHIAZQBmAGUAcgBlAG4AYwBlAC4wCwYJYIZIAYb9bAMVMBIGA1Ud EwEB/wQIMAYBAf8CAQAweQYIKwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5k aWdpY2VydC5jb20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdp Q2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwgYEGA1UdHwR6MHgwOqA4oDaGNGh0dHA6Ly9jcmwzLmRp Z2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwOqA4oDaGNGh0dHA6Ly9jcmw0 LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwHQYDVR0OBBYEFBUAEisT mLKZB+0e36K+Vw0rZwLNMB8GA1UdIwQYMBaAFEXroq/0ksuCMS1Ri6enIZ3zbcgPMA0GCSqGSIb3 DQEBBQUAA4IBAQBGUD7Jtygkpzgdtlspr1LPUukxR6tWXHvVDQtBs+/sdR90OPKyXGGinJXDUOSC uSPRujqGcq04eKx1XRcXNHJHhZRW0eu7NoR3zCSl8wQZVann4+erYs37iy2QwsDStZS9Xk+xBdIO PRqpFFumhjFiqKgz5Js5p8T1zh14dpQlc+Qqq8+cdkvtX8JLFuRLcEwAiR78xXm8TBJX/l/hHrwC Xaj++wc4Tw3GXZG5D2dFzdaD7eeSDY2xaYxP+1ngIw/Sqq4AfO6cQg7PkdcntxbuD8O9fAqg7iwI VYUiuOsYGk38KiGtSTGDR5V3cdyxG0tLHBCcdxTBnU8vWpUIKRAmMYIDvjCCA7oCAQEwdjBiMQsw CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQu Y29tMSEwHwYDVQQDExhEaWdpQ2VydCBBc3N1cmVkIElEIENBLTECEAe/0l1voaaVOn+OC47KTLww CQYFKw4DAhoFAKCCAh0wGAYJKoZIhvcNAQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUxDxcN MTQwNDI5MTg1ODUwWjAjBgkqhkiG9w0BCQQxFgQUnPvO7t60GyRVVS8MXKiOxbBLV/QwgYUGCSsG AQQBgjcQBDF4MHYwYjELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UE CxMQd3d3LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgQXNzdXJlZCBJRCBDQS0xAhAH v9Jdb6GmlTp/jguOyky8MIGHBgsqhkiG9w0BCRACCzF4oHYwYjELMAkGA1UEBhMCVVMxFTATBgNV BAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGln aUNlcnQgQXNzdXJlZCBJRCBDQS0xAhAHv9Jdb6GmlTp/jguOyky8MIGrBgkqhkiG9w0BCQ8xgZ0w gZowCwYJYIZIAWUDBAEqMAsGCWCGSAFlAwQBFjAKBggqhkiG9w0DBzALBglghkgBZQMEAQIwDgYI KoZIhvcNAwICAgCAMAcGBSsOAwIHMA0GCCqGSIb3DQMCAgFAMA0GCCqGSIb3DQMCAgEoMAcGBSsO AwIaMAsGCWCGSAFlAwQCAzALBglghkgBZQMEAgIwCwYJYIZIAWUDBAIBMA0GCSqGSIb3DQEBAQUA BIIBAAk0NzH2aVga3dvZmnRAH2dmdlAHQyqpC4TRBTSxs85QPRxWzvD6G12cIcMpl9+BlT1si4zz 7WuGixAulA9m3t01ib9LER5MTsyJAfdNLiTmVyxZvfuiLfxtLGxMMCarGksqHzWTPiATGY26prX7 +zIrAZyGBa8Cf5xfmff9FgvILizeMxDQbw/menwmuyzbn5DJ6RfXPFHfZUUGAaODcxY+sohcPfmw 8TNGtuvgGQVQVUIJh3BXMPewTQm0WAdFO6+F+puFwV++vqsTm4eiXo2VkF2SbWGpPAtnV74z18Nw H26u2Pa3gaESaljRZZuLrUBhq54KDjJ2aUopc8e7g1UAAAAAAAA= ------=_NextPart_000_0290_01CF63AA.C4271700-- From nobody Tue Apr 29 15:02:48 2014 Return-Path: X-Original-To: wpkops@ietfa.amsl.com Delivered-To: wpkops@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 044F21A09A9 for ; Tue, 29 Apr 2014 15:02:47 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.901 X-Spam-Level: X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SuNWOWe94Thw for ; Tue, 29 Apr 2014 15:02:43 -0700 (PDT) Received: from na01-bn1-obe.outbound.protection.outlook.com (mail-bn1blp0182.outbound.protection.outlook.com [207.46.163.182]) by ietfa.amsl.com (Postfix) with ESMTP id 70B931A094B for ; Tue, 29 Apr 2014 15:02:42 -0700 (PDT) Received: from CO1PR02MB064.namprd02.prod.outlook.com (10.242.163.16) by CO1PR02MB063.namprd02.prod.outlook.com (10.242.163.14) with Microsoft SMTP Server (TLS) id 15.0.929.12; Tue, 29 Apr 2014 22:02:39 +0000 Received: from CO1PR02MB064.namprd02.prod.outlook.com ([169.254.5.121]) by CO1PR02MB064.namprd02.prod.outlook.com ([169.254.5.121]) with mapi id 15.00.0929.001; Tue, 29 Apr 2014 22:02:38 +0000 From: Wayne Thayer To: "ben@digicert.com" , "wpkops@ietf.org" Thread-Topic: [wpkops] Taxonomy of Browser Behaviors - "Hard Fail", "Soft Fail" and "Reload Request" Thread-Index: Ac9j3Q10HtNKjLCHSyqk1X1AnOH2awAGGE+g Date: Tue, 29 Apr 2014 22:02:37 +0000 Message-ID: <93c43a17f6194fdeb2df96d25188090e@CO1PR02MB064.namprd02.prod.outlook.com> References: <029801cf63dd$0f484330$2dd8c990$@digicert.com> In-Reply-To: <029801cf63dd$0f484330$2dd8c990$@digicert.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [64.202.160.225] x-forefront-prvs: 0196A226D1 x-forefront-antispam-report: SFV:NSPM; SFS:(10009001)(6009001)(428001)(164054003)(377454003)(189002)(199002)(74502001)(80976001)(76576001)(19300405004)(99286001)(46102001)(19580395003)(19580405001)(92566001)(83322001)(31966008)(101416001)(81542001)(74662001)(86362001)(99396002)(74316001)(81342001)(83072002)(33646001)(87936001)(2656002)(80022001)(20776003)(66066001)(79102001)(15202345003)(16236675002)(50986999)(85852003)(77982001)(76176999)(15975445006)(19609705001)(54356999)(4396001)(24736002); DIR:OUT; SFP:1101; SCL:1; SRVR:CO1PR02MB063; H:CO1PR02MB064.namprd02.prod.outlook.com; FPR:AFE6F4FC.A412C311.FED17D77.49E9F041.20454; MLV:sfv; PTR:InfoNoRecords; MX:1; A:1; LANG:en; received-spf: None (: godaddy.com does not designate permitted sender hosts) Content-Type: multipart/alternative; boundary="_000_93c43a17f6194fdeb2df96d25188090eCO1PR02MB064namprd02pro_" MIME-Version: 1.0 X-OriginatorOrg: godaddy.com Archived-At: http://mailarchive.ietf.org/arch/msg/wpkops/6GUW1ynkv6XJVBe8mgeSB_G0EDU Subject: Re: [wpkops] Taxonomy of Browser Behaviors - "Hard Fail", "Soft Fail" and "Reload Request" X-BeenThere: wpkops@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 29 Apr 2014 22:02:47 -0000 --_000_93c43a17f6194fdeb2df96d25188090eCO1PR02MB064namprd02pro_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Ben, In the context of revocation, I have a different concept of the terms "soft= fail" and "hard fail" than what you describe below. I think of soft fail a= s a scenario where a browser checks OCSP, does not receive a response, and = proceeds as if it had received a "good" response without any indication to = the user. Also, I think of revocation "hard fail" as the scenario you describe below = as "soft fail" where the browser presents a blocking error that the user ca= n then choose to bypass. Thanks, Wayne From: wpkops [mailto:wpkops-bounces@ietf.org] On Behalf Of Ben Wilson Sent: Tuesday, April 29, 2014 11:59 AM To: wpkops@ietf.org Subject: [wpkops] Taxonomy of Browser Behaviors - "Hard Fail", "Soft Fail" = and "Reload Request" In working on the next version of the Certificate Processing document, I ha= ve come across two different uses of "hard fail." I am also concerned tha= t use of the phrase, "soft fail," might encounter similar problems. Also I= 've seen "Retry" or "Reload" messages, which are hard fail, but with an op= tion to try loading again. I've seen "hard fail" used (1) when referring to a session that is stopped = because of certificate revocation, where the user is prevented from proceed= ing, and also (2) when referring to intentional client behavior when encoun= tering other problems with the certificate that indicate it is not trustwor= thy. (I suppose it could also mean a crash or other unintentional behavior= because of a bug in code.) With respect to (2), I have called this a "fat= al error" - A behavior in which the browser detects an abnormal condition a= nd halts (or technically cannot complete) session negotiation and drops the= connection or otherwise blocks the user from continuing (also referred to = as "hard fail")." However, in Phill's paper on revocation behavior, he use= s "hard fail", too. I have used the term "bypassable error" instead of "soft fail", defined as = "behavior in which the browser detects an abnormal condition and asks the u= ser whether to proceed with (i.e. click-through to) the SSL/TLS connection.= " Is this the same as "soft fail"? (I'm assuming that a negative visual i= ndicator or a "downgrade" of security indicators like removal of the lock i= con, removal of EV indication, etc., are not "soft fail." I hope that ever= yone agrees.) Any thoughts? Does it matter what kind of "next step" is provided in the d= ialogue presented to the user? For instance, the distinction between hard = and soft fail might be as simple as whether the error window lacks or conta= ins buttons or links that allow the user to proceed toward making the SSL/T= LS connection. For "hard fail," here is what I've seen: [Error Message] Firefox - "Fix connection problems" Opera - "This webpage is not available" Chrome - "This webpage is not available" Internet Explorer - "IE cannot display the webpage" "What you can try: Di= agnose Connection Problems" Internet Explorer - "This page cannot be displayed. Fix connection problem= s" In looking at soft fail / bypassable errors, here are some of the buttons = provided for a variety of different conditions, such as invalid certificate= s: [Error Message] Firefox - "Get me out of here" "Technical Details" "I understand the risks" Safari - "Show Certificate" "Cancel" "Continue" Internet Explorer - "Click here to close" ""Continue to this website (not r= ecommended)" "More Information" Chrome - "Proceed anyway" or "Back to safety" and "Help me understand" Opera - "Show Certificate" "Continue Anyway" and "Cancel" or "Back to Safe= ty" A third option I've noticed is a "reload request", which I think is differe= nt than a bypassable error or hard fail. Am I right? Here are some messages: Chrome - "More" or "Reload" Firefox - "Try again" Thanks, Ben --_000_93c43a17f6194fdeb2df96d25188090eCO1PR02MB064namprd02pro_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Ben,=

 

In the context of revo= cation, I have a different concept of the terms “soft fail” and= “hard fail” than what you describe below. I think of soft fail= as a scenario where a browser checks OCSP, does not receive a response, and proceeds as if it had received a “good” respon= se without any indication to the user.

 

Also, I think of revoc= ation “hard fail” as the scenario you describe below as “= soft fail” where the browser presents a blocking error that the user = can then choose to bypass.

 

Thanks,

 

Wayne

 

From: wpkops [mailto:wpkops-bounces@ietf.org]= On Behalf Of Ben Wilson
Sent: Tuesday, April 29, 2014 11:59 AM
To: wpkops@ietf.org
Subject: [wpkops] Taxonomy of Browser Behaviors - "Hard Fail&qu= ot;, "Soft Fail" and "Reload Request"

 

In working on the next version of the Certificate Pr= ocessing document, I have come across two different uses of “hard fai= l.”   I am also concerned that use of the phrase, “so= ft fail,” might encounter similar problems.  Also I’ve see= n “Retry” or “Reload” messages,  which are hard fail, but with an o= ption to try loading again.

 

I’ve seen “hard fail” used (1) whe= n referring to a session that is stopped because of certificate revocation,= where the user is prevented from proceeding, and also (2) when referring t= o intentional client behavior when encountering other problems with the certificate that indicate it is not trustworthy.  (= I suppose it could also mean a crash or other unintentional behavior becaus= e of a bug in code.)  With respect to (2), I have called this a “= ;fatal error” - A behavior in which the browser detects an abnormal condition and halts (or technically cannot complete) s= ession negotiation and drops the connection or otherwise blocks the user fr= om continuing (also referred to as “hard fail”).”  H= owever, in Phill’s paper on revocation behavior, he uses “hard fail”, too. 

 

I have used the term “bypassable error” = instead of “soft fail”, defined as “behavior in which the= browser detects an abnormal condition and asks the user whether to proceed= with (i.e. click-through to) the SSL/TLS connection.”  Is this the same as “soft fail”?  (I’m assuming that a nega= tive visual indicator or a “downgrade” of security indicators l= ike removal of the lock icon, removal of EV indication, etc., are not ̶= 0;soft fail.”  I hope that everyone agrees.) 

 

Any thoughts?  Does it matter what kind of R= 20;next step” is provided in the dialogue presented to the user? = ; For instance, the distinction between hard and soft fail might be as simp= le as whether the error window lacks or contains buttons or links that allow the user to proceed toward making the SSL/TLS connecti= on. 

 

For “hard fail,” here is what I’ve= seen:

 

[Error Message]

Firefox - “Fix connection problems”

Opera – “This webpage is not available&#= 8221;

Chrome – “This webpage is not available&= #8221;

Internet Explorer – “IE cannot display t= he webpage”  “What you can try:  Diagnose Connection = Problems”

Internet Explorer – “This page cannot be= displayed.  Fix connection problems”

 

In looking at soft fail / bypassable errors,  h= ere are some of the buttons provided for a variety of different conditions,= such as invalid certificates:

 

[Error Message]

 

Firefox – “Get me out of here” = 220;Technical Details” “I understand the risks”

Safari – “Show Certificate” “= ;Cancel” “Continue”

Internet Explorer – “Click here to close= ” ““Continue to this website (not recommended)” = 220;More Information”

Chrome - “Proceed anyway” or  ̶= 0;Back to safety”  and “Help me understand”

 

Opera – “Show Certificate”  &= #8220;Continue Anyway” and “Cancel” or “Back to Saf= ety”

 

A third option I’ve noticed is a “reload= request”, which I think is different than a bypassable error or hard= fail.  Am I right?

 

Here are some messages:

 

Chrome - “More” or  “Reload&#= 8221;

Firefox – “Try again”

 

Thanks,

Ben

--_000_93c43a17f6194fdeb2df96d25188090eCO1PR02MB064namprd02pro_-- From nobody Wed Apr 30 01:49:04 2014 Return-Path: X-Original-To: wpkops@ietfa.amsl.com Delivered-To: wpkops@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8FCE81A6F1F for ; Wed, 30 Apr 2014 01:48:51 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.278 X-Spam-Level: X-Spam-Status: No, score=-3.278 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_MISMATCH_ORG=0.611, HOST_MISMATCH_COM=0.311, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZXX-sGobwGPm for ; Wed, 30 Apr 2014 01:48:44 -0700 (PDT) Received: from smtp.mozilla.org (mx1.corp.phx1.mozilla.com [63.245.216.69]) by ietfa.amsl.com (Postfix) with ESMTP id 93BE11A6F25 for ; Wed, 30 Apr 2014 01:48:43 -0700 (PDT) Received: from [192.168.0.101] (93.243.187.81.in-addr.arpa [81.187.243.93]) (Authenticated sender: gerv@mozilla.org) by mx1.mail.corp.phx1.mozilla.com (Postfix) with ESMTPSA id CA327F2BDE; Wed, 30 Apr 2014 01:48:40 -0700 (PDT) Message-ID: <5360B8E6.7080106@mozilla.org> Date: Wed, 30 Apr 2014 09:48:38 +0100 From: Gervase Markham User-Agent: Mozilla/5.0 (X11; Linux i686; rv:30.0) Gecko/20100101 Thunderbird/30.0a2 MIME-Version: 1.0 To: Wayne Thayer , "ben@digicert.com" , "wpkops@ietf.org" References: <029801cf63dd$0f484330$2dd8c990$@digicert.com> <93c43a17f6194fdeb2df96d25188090e@CO1PR02MB064.namprd02.prod.outlook.com> In-Reply-To: <93c43a17f6194fdeb2df96d25188090e@CO1PR02MB064.namprd02.prod.outlook.com> X-Enigmail-Version: 1.7a1pre OpenPGP: id=9DF43DBB Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Archived-At: http://mailarchive.ietf.org/arch/msg/wpkops/d7koHBaZIiDUJ1m-SdcN7m4Wb70 Subject: Re: [wpkops] Taxonomy of Browser Behaviors - "Hard Fail", "Soft Fail" and "Reload Request" X-BeenThere: wpkops@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Apr 2014 08:48:51 -0000 On 29/04/14 23:02, Wayne Thayer wrote: > In the context of revocation, I have a different concept of the terms > “soft fail” and “hard fail” than what you describe below. I think of > soft fail as a scenario where a browser checks OCSP, does not receive a > response, and proceeds as if it had received a “good” response without > any indication to the user. > > Also, I think of revocation “hard fail” as the scenario you describe > below as “soft fail” where the browser presents a blocking error that > the user can then choose to bypass. ...or does not allow a bypass. Both are "hard fail" - the term does not distinguish. As Wayne says, certainly in discussions of revocation, hard-vs-soft fail is a very limited question of the behaviour of the browser when it does not receive a response of any kind from the OCSP server. In soft fail, it shows the site anyway. In hard fail, it does not. I would advise not carrying this terminology over to other areas. It's not very precise in other contexts. Gerv From nobody Wed Apr 30 05:25:47 2014 Return-Path: X-Original-To: wpkops@ietfa.amsl.com Delivered-To: wpkops@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 63E681A6F56 for ; Wed, 30 Apr 2014 05:25:46 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.999 X-Spam-Level: X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 681v1DsfeX7F for ; Wed, 30 Apr 2014 05:25:33 -0700 (PDT) Received: from mail-vc0-x231.google.com (mail-vc0-x231.google.com [IPv6:2607:f8b0:400c:c03::231]) by ietfa.amsl.com (Postfix) with ESMTP id 5D3C41A08C4 for ; Wed, 30 Apr 2014 05:25:33 -0700 (PDT) Received: by mail-vc0-f177.google.com with SMTP id if11so2026467vcb.8 for ; Wed, 30 Apr 2014 05:25:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=eb/1Ya0LH4I4S8D/iS0r+GN2rInv3Sf0cXUNyU0Nfjk=; b=MeOdGFcSTzwbRSCbG8c/vqa0l4+4R3ETEZKBta4YSvjWBBceBqF6mwDGcz5TmG4r6I SV3USBOGfqR0quHfA61OHCXDxMnibh5+WlbhmxFzHsvdLKLPGSyOXwlDKFSEeDQMHJK9 2vYfzm2NFbFgxXvOeO+RhK8r+5ON3wjbddwWe06JEUE5K7X0eeF+BNBScSshbSf8XFrN 5kxPfG0ff2vx5aQENNAdw/FQjYBx1IRia7wzYFMtnH8xfftKcyvVXdPaoPat4xszkGMh pyAPI92qWiL8etshgMMf2gqQtm+4Fy4TsOZ7k21kAXpMk0Ln7JaKBgYWUjm4Kn6Roy24 sEaQ== MIME-Version: 1.0 X-Received: by 10.221.40.193 with SMTP id tr1mr1320575vcb.31.1398860731541; Wed, 30 Apr 2014 05:25:31 -0700 (PDT) Received: by 10.58.246.97 with HTTP; Wed, 30 Apr 2014 05:25:31 -0700 (PDT) In-Reply-To: <029801cf63dd$0f484330$2dd8c990$@digicert.com> References: <029801cf63dd$0f484330$2dd8c990$@digicert.com> Date: Wed, 30 Apr 2014 08:25:31 -0400 Message-ID: From: Michael Jenkins To: Ben Wilson Content-Type: multipart/alternative; boundary=001a11336a8efe9a9c04f841a43c Archived-At: http://mailarchive.ietf.org/arch/msg/wpkops/oZIK75lzJEG8_IBoTj6j6u6In8g Cc: wpkops WG Subject: Re: [wpkops] Taxonomy of Browser Behaviors - "Hard Fail", "Soft Fail" and "Reload Request" X-BeenThere: wpkops@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Apr 2014 12:25:46 -0000 --001a11336a8efe9a9c04f841a43c Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable I have always used the term "hard fail" to mean the browser makes the determination for the operator - if validation fails, the operator is given no option to over-ride. I use the term "fail open" when the browser interprets inability to obtain revocation information as "not revoked". It's not really relevant that locks don't appear if the desired page shows up in the main window (especially if I put a picture of a closed lock on my main page, as some do :( I don't like the term "soft fail". If I did, I would use it for the case where the determination is handed from the browser to the operator (the get-me-out-of-here/i-understand-the-risks choice), which I don't consider a failure, it's the way things are supposed to work. I realize that's currently a somewhat academic interpretation, but it also leaves room for the operator to decide how hard he wants the browser to try (how much time to spend on this connection, how many mechanisms to invoke) and perhaps how much information the operator wants to broadcast in order to make this connection work, should alternative validation mechanisms be built into browsers. On Tue, Apr 29, 2014 at 2:58 PM, Ben Wilson wrote: > In working on the next version of the Certificate Processing document, I > have come across two different uses of =E2=80=9Chard fail.=E2=80=9D I a= m also concerned > that use of the phrase, =E2=80=9Csoft fail,=E2=80=9D might encounter simi= lar problems. > Also I=E2=80=99ve seen =E2=80=9CRetry=E2=80=9D or =E2=80=9CReload=E2=80= =9D messages, which are hard fail, but with > an option to try loading again. > > > > I=E2=80=99ve seen =E2=80=9Chard fail=E2=80=9D used (1) when referring to = a session that is stopped > because of certificate revocation, where the user is prevented from > proceeding, and also (2) when referring to intentional client behavior wh= en > encountering other problems with the certificate that indicate it is not > trustworthy. (I suppose it could also mean a crash or other unintentiona= l > behavior because of a bug in code.) With respect to (2), I have called > this a =E2=80=9Cfatal error=E2=80=9D - A behavior in which the browser de= tects an abnormal > condition and halts (or technically cannot complete) session negotiation > and drops the connection or otherwise blocks the user from continuing (al= so > referred to as =E2=80=9Chard fail=E2=80=9D).=E2=80=9D However, in Phill= =E2=80=99s paper on revocation > behavior, he uses =E2=80=9Chard fail=E2=80=9D, too. > > > > I have used the term =E2=80=9Cbypassable error=E2=80=9D instead of =E2=80= =9Csoft fail=E2=80=9D, defined as > =E2=80=9Cbehavior in which the browser detects an abnormal condition and = asks the > user whether to proceed with (i.e. click-through to) the SSL/TLS > connection.=E2=80=9D Is this the same as =E2=80=9Csoft fail=E2=80=9D? (= I=E2=80=99m assuming that a > negative visual indicator or a =E2=80=9Cdowngrade=E2=80=9D of security in= dicators like > removal of the lock icon, removal of EV indication, etc., are not =E2=80= =9Csoft > fail.=E2=80=9D I hope that everyone agrees.) > > > > Any thoughts? Does it matter what kind of =E2=80=9Cnext step=E2=80=9D is= provided in the > dialogue presented to the user? For instance, the distinction between ha= rd > and soft fail might be as simple as whether the error window lacks or > contains buttons or links that allow the user to proceed toward making th= e > SSL/TLS connection. > > > > For =E2=80=9Chard fail,=E2=80=9D here is what I=E2=80=99ve seen: > > > > [Error Message] > > Firefox - =E2=80=9CFix connection problems=E2=80=9D > > Opera =E2=80=93 =E2=80=9CThis webpage is not available=E2=80=9D > > Chrome =E2=80=93 =E2=80=9CThis webpage is not available=E2=80=9D > > Internet Explorer =E2=80=93 =E2=80=9CIE cannot display the webpage=E2=80= =9D =E2=80=9CWhat you can try: > Diagnose Connection Problems=E2=80=9D > > Internet Explorer =E2=80=93 =E2=80=9CThis page cannot be displayed. Fix = connection > problems=E2=80=9D > > > > In looking at soft fail / bypassable errors, here are some of the button= s > provided for a variety of different conditions, such as invalid > certificates: > > > > [Error Message] > > > > Firefox =E2=80=93 =E2=80=9CGet me out of here=E2=80=9D =E2=80=9CTechnical= Details=E2=80=9D =E2=80=9CI understand the risks=E2=80=9D > > Safari =E2=80=93 =E2=80=9CShow Certificate=E2=80=9D =E2=80=9CCancel=E2=80= =9D =E2=80=9CContinue=E2=80=9D > > Internet Explorer =E2=80=93 =E2=80=9CClick here to close=E2=80=9D =E2=80= =9C=E2=80=9CContinue to this website (not > recommended)=E2=80=9D =E2=80=9CMore Information=E2=80=9D > > Chrome - =E2=80=9CProceed anyway=E2=80=9D or =E2=80=9CBack to safety=E2= =80=9D and =E2=80=9CHelp me understand=E2=80=9D > > > > Opera =E2=80=93 =E2=80=9CShow Certificate=E2=80=9D =E2=80=9CContinue Any= way=E2=80=9D and =E2=80=9CCancel=E2=80=9D or =E2=80=9CBack to > Safety=E2=80=9D > > > > A third option I=E2=80=99ve noticed is a =E2=80=9Creload request=E2=80=9D= , which I think is > different than a bypassable error or hard fail. Am I right? > > > > Here are some messages: > > > > Chrome - =E2=80=9CMore=E2=80=9D or =E2=80=9CReload=E2=80=9D > > Firefox =E2=80=93 =E2=80=9CTry again=E2=80=9D > > > > Thanks, > > Ben > > _______________________________________________ > wpkops mailing list > wpkops@ietf.org > https://www.ietf.org/mailman/listinfo/wpkops > > --001a11336a8efe9a9c04f841a43c Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
I have always used the term "hard fail" to = mean the browser makes the determination for the operator - if validation f= ails, the operator is given no option to over-ride.

I use the term = "fail open" when the browser interprets inability to obtain revoc= ation information as "not revoked". It's not really relevant = that locks don't appear if the desired page shows up in the main window= (especially if I put a picture of a closed lock on my main page, as some d= o :(

I don't like the term "soft fail". If I did, I woul= d use it for the case where the determination is handed from the browser to= the operator (the get-me-out-of-here/i-understand-the-risks choice), which= I don't consider a failure, it's the way things are supposed to wo= rk. I realize that's currently a somewhat academic interpretation, but = it also leaves room for the operator to decide how hard he wants the browse= r to try (how much time to spend on this connection, how many mechanisms to= invoke) and perhaps how much information the operator wants to broadcast i= n order to make this connection work, should alternative validation mechani= sms be built into browsers.


On Tue,= Apr 29, 2014 at 2:58 PM, Ben Wilson <ben@digicert.com> wrote= :

In working on the next version of the Certificate Processing document, = I have come across two different uses of =E2=80=9Chard fail.=E2=80=9D =C2= =A0=C2=A0I am also concerned that use of the phrase, =E2=80=9Csoft fail,=E2= =80=9D might encounter similar problems.=C2=A0 Also I=E2=80=99ve seen =E2= =80=9CRetry=E2=80=9D or =E2=80=9CReload=E2=80=9D messages,=C2=A0 which are = hard fail, but with an option to try loading again.

=C2=A0

I=E2= =80=99ve seen =E2=80=9Chard fail=E2=80=9D used (1) when referring to a sess= ion that is stopped because of certificate revocation, where the user is pr= evented from proceeding, and also (2) when referring to intentional client = behavior when encountering other problems with the certificate that indicat= e it is not trustworthy.=C2=A0 (I suppose it could also mean a crash or oth= er unintentional behavior because of a bug in code.)=C2=A0 With respect to = (2), I have called this a =E2=80=9Cfatal error=E2=80=9D - A behavior in whi= ch the browser detects an abnormal condition and halts (or technically cann= ot complete) session negotiation and drops the connection or otherwise bloc= ks the user from continuing (also referred to as =E2=80=9Chard fail=E2=80= =9D).=E2=80=9D=C2=A0 However, in Phill=E2=80=99s paper on revocation behavi= or, he uses =E2=80=9Chard fail=E2=80=9D, too.=C2=A0

=C2=A0

I hav= e used the term =E2=80=9Cbypassable error=E2=80=9D instead of =E2=80=9Csoft= fail=E2=80=9D, defined as =E2=80=9Cbehavior in which the browser detects a= n abnormal condition and asks the user whether to proceed with (i.e. click-= through to) the SSL/TLS connection.=E2=80=9D=C2=A0 Is this the same as =E2= =80=9Csoft fail=E2=80=9D? =C2=A0(I=E2=80=99m assuming that a negative visua= l indicator or a =E2=80=9Cdowngrade=E2=80=9D of security indicators like re= moval of the lock icon, removal of EV indication, etc., are not =E2=80=9Cso= ft fail.=E2=80=9D=C2=A0 I hope that everyone agrees.)=C2=A0 <= /p>

=C2=A0

Any t= houghts?=C2=A0 Does it matter what kind of =E2=80=9Cnext step=E2=80=9D is p= rovided in the dialogue presented to the user?=C2=A0 For instance, the dist= inction between hard and soft fail might be as simple as whether the error = window lacks or contains buttons or links that allow the user to proceed to= ward making the SSL/TLS connection.=C2=A0

=C2=A0

For = =E2=80=9Chard fail,=E2=80=9D here is what I=E2=80=99ve seen:<= /p>

=C2=A0

[E= rror Message]

Firefox - =E2=80=9CFix connection problems=E2=80=9D

Opera =E2=80=93 =E2=80=9CThis webpage is not available=E2= =80=9D

Chrome =E2=80=93 =E2=80=9CTh= is webpage is not available=E2=80=9D

Internet Explorer =E2=80=93 =E2=80=9CIE cannot display the webpage=E2=80=9D= =C2=A0 =E2=80=9CWhat you can try:=C2=A0 Diagnose Connection Problems=E2=80= =9D

Internet Explorer =E2=80=93 =E2= =80=9CThis page cannot be displayed.=C2=A0 Fix connection problems=E2=80=9D=

=C2=A0

In lo= oking at soft fail / bypassable errors,=C2=A0 here are some of the buttons = provided for a variety of different conditions, such as invalid certificate= s:

=C2=A0

[Erro= r Message]

=C2=A0

=

Firefox =E2=80=93 =E2=80=9CGet me out of here=E2=80= =9D =E2=80=9CTechnical Details=E2=80=9D =E2=80=9CI understand the risks=E2= =80=9D

Safari =E2=80=93 =E2=80=9CShow Certificate=E2=80=9D = =E2=80=9CCancel=E2=80=9D =E2=80=9CContinue=E2=80=9D

Internet Explorer =E2=80=93 =E2=80=9CClick here to close= =E2=80=9D =E2=80=9C=E2=80=9CContinue to this website (not recommended)=E2= =80=9D =E2=80=9CMore Information=E2=80=9D

Chrome - =E2=80=9CProceed anyway=E2=80=9D or=C2=A0 = =E2=80=9CBack to safety=E2=80=9D =C2=A0and =E2=80=9CHelp me understand=E2= =80=9D

=C2=A0

Opera =E2=80=93 =E2=80=9CShow Certificate=E2=80=9D =C2= =A0=E2=80=9CContinue Anyway=E2=80=9D and =E2=80=9CCancel=E2=80=9D or =E2=80= =9CBack to Safety=E2=80=9D

=C2=A0

A thi= rd option I=E2=80=99ve noticed is a =E2=80=9Creload request=E2=80=9D, which= I think is different than a bypassable error or hard fail.=C2=A0 Am I righ= t?

=C2=A0

Here are some messages:

=C2=A0

Chrome - =E2=80=9CMore=E2=80=9D or=C2=A0 =E2=80=9CReload=E2=80=9D

Firefox =E2=80=93 =E2=80=9CTry again= =E2=80=9D

=C2=A0

Thank= s,

Ben


_______________________________________________
wpkops mailing list
wpkops@ietf.org
= https://www.ietf.org/mailman/listinfo/wpkops


--001a11336a8efe9a9c04f841a43c-- From nobody Wed Apr 30 07:43:44 2014 Return-Path: X-Original-To: wpkops@ietfa.amsl.com Delivered-To: wpkops@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D22091A6FB0 for ; Wed, 30 Apr 2014 07:43:42 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.9 X-Spam-Level: X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ciitsBrzjE7i for ; Wed, 30 Apr 2014 07:43:40 -0700 (PDT) Received: from smtp.domeneshop.no (smtp.domeneshop.no [194.63.252.54]) by ietfa.amsl.com (Postfix) with ESMTP id ECB691A08F1 for ; Wed, 30 Apr 2014 07:43:39 -0700 (PDT) Received: from 85.168.202.84.customer.cdi.no ([84.202.168.85]:63737 helo=killashandra.invalid.invalid) by smtp.domeneshop.no with esmtpsa (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.72) (envelope-from ) id 1WfVjV-00022d-VP; Wed, 30 Apr 2014 16:43:38 +0200 Content-Type: text/plain; charset=utf-8; format=flowed; delsp=yes To: "Ben Wilson" , "Michael Jenkins" References: <029801cf63dd$0f484330$2dd8c990$@digicert.com> Date: Wed, 30 Apr 2014 16:43:26 +0200 MIME-Version: 1.0 Content-Transfer-Encoding: Quoted-Printable From: "Yngve N. Pettersen" Message-ID: In-Reply-To: User-Agent: Opera Mail/12.16 (Win32) Archived-At: http://mailarchive.ietf.org/arch/msg/wpkops/oOi6NfVtc3dQIvCyTA-ol1qebP0 Cc: wpkops WG Subject: Re: [wpkops] Taxonomy of Browser Behaviors - "Hard Fail", "Soft Fail" and "Reload Request" X-BeenThere: wpkops@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Apr 2014 14:43:42 -0000 Hi, Actually, IMO "soft fail" does NOT include handing the question of wheth= er = to continue over to the user. I believe "soft-fail" means that the client continues to load the docume= nt = (what you call "fail open"), despite the detected problem condition(s), = = e.g. OCSP lookup failed. The client may or may not give a visual = indication that there was a problem, and may or not treat the next = connection to the server differently (e.g. Opera 12 will remove the = padlock for the displayed document, and would not not reuse the affected= = SSL session, in case revocation checks failed). What you mention as an example of "soft fail", displaying a warning = message that the user have to decide how to handle, is actually the = intermediate step between what is called "soft fail" and "hard fail", th= e = detected problem is serious enough (e.g. server name mismatch, missing C= A) = that the client is unwilling to continue without permission from the use= r. IOW, the four levels and actions are: No detected problem: Continue, no indications to the user necessary Low level problem: Continue, visual problem indications optional, aka = "soft fail" Serious problem: Stop connection, ask the user whether to continue Critical problem: Close connection, don't allow the user to continue, ak= a = "hard fail" On Wed, 30 Apr 2014 14:25:31 +0200, Michael Jenkins = = wrote: > I have always used the term "hard fail" to mean the browser makes the > determination for the operator - if validation fails, the operator is = = > given > no option to over-ride. > > I use the term "fail open" when the browser interprets inability to = > obtain > revocation information as "not revoked". It's not really relevant that= > locks don't appear if the desired page shows up in the main window > (especially if I put a picture of a closed lock on my main page, as so= me = > do > :( > > I don't like the term "soft fail". If I did, I would use it for the ca= se > where the determination is handed from the browser to the operator (th= e > get-me-out-of-here/i-understand-the-risks choice), which I don't = > consider a > failure, it's the way things are supposed to work. I realize that's > currently a somewhat academic interpretation, but it also leaves room = for > the operator to decide how hard he wants the browser to try (how much = = > time > to spend on this connection, how many mechanisms to invoke) and perhap= s = > how > much information the operator wants to broadcast in order to make this= > connection work, should alternative validation mechanisms be built int= o > browsers. > > > On Tue, Apr 29, 2014 at 2:58 PM, Ben Wilson wrote: > >> In working on the next version of the Certificate Processing document= , I >> have come across two different uses of =E2=80=9Chard fail.=E2=80=9D = I am also = >> concerned >> that use of the phrase, =E2=80=9Csoft fail,=E2=80=9D might encounter = similar problems. >> Also I=E2=80=99ve seen =E2=80=9CRetry=E2=80=9D or =E2=80=9CReload=E2=80= =9D messages, which are hard fail, but = >> with >> an option to try loading again. >> >> >> >> I=E2=80=99ve seen =E2=80=9Chard fail=E2=80=9D used (1) when referring= to a session that is = >> stopped >> because of certificate revocation, where the user is prevented from >> proceeding, and also (2) when referring to intentional client behavio= r = >> when >> encountering other problems with the certificate that indicate it is = not >> trustworthy. (I suppose it could also mean a crash or other = >> unintentional >> behavior because of a bug in code.) With respect to (2), I have call= ed >> this a =E2=80=9Cfatal error=E2=80=9D - A behavior in which the browse= r detects an = >> abnormal >> condition and halts (or technically cannot complete) session negotiat= ion >> and drops the connection or otherwise blocks the user from continuing= = >> (also >> referred to as =E2=80=9Chard fail=E2=80=9D).=E2=80=9D However, in Ph= ill=E2=80=99s paper on revocation >> behavior, he uses =E2=80=9Chard fail=E2=80=9D, too. >> >> >> >> I have used the term =E2=80=9Cbypassable error=E2=80=9D instead of =E2= =80=9Csoft fail=E2=80=9D, defined = >> as >> =E2=80=9Cbehavior in which the browser detects an abnormal condition = and asks = >> the >> user whether to proceed with (i.e. click-through to) the SSL/TLS >> connection.=E2=80=9D Is this the same as =E2=80=9Csoft fail=E2=80=9D= ? (I=E2=80=99m assuming that a >> negative visual indicator or a =E2=80=9Cdowngrade=E2=80=9D of securit= y indicators like >> removal of the lock icon, removal of EV indication, etc., are not =E2= =80=9Csoft >> fail.=E2=80=9D I hope that everyone agrees.) >> >> >> >> Any thoughts? Does it matter what kind of =E2=80=9Cnext step=E2=80=9D= is provided in = >> the >> dialogue presented to the user? For instance, the distinction betwee= n = >> hard >> and soft fail might be as simple as whether the error window lacks or= >> contains buttons or links that allow the user to proceed toward makin= g = >> the >> SSL/TLS connection. >> >> >> >> For =E2=80=9Chard fail,=E2=80=9D here is what I=E2=80=99ve seen: >> >> >> >> [Error Message] >> >> Firefox - =E2=80=9CFix connection problems=E2=80=9D >> >> Opera =E2=80=93 =E2=80=9CThis webpage is not available=E2=80=9D >> >> Chrome =E2=80=93 =E2=80=9CThis webpage is not available=E2=80=9D >> >> Internet Explorer =E2=80=93 =E2=80=9CIE cannot display the webpage=E2= =80=9D =E2=80=9CWhat you can try: >> Diagnose Connection Problems=E2=80=9D >> >> Internet Explorer =E2=80=93 =E2=80=9CThis page cannot be displayed. = Fix connection >> problems=E2=80=9D >> >> >> >> In looking at soft fail / bypassable errors, here are some of the = >> buttons >> provided for a variety of different conditions, such as invalid >> certificates: >> >> >> >> [Error Message] >> >> >> >> Firefox =E2=80=93 =E2=80=9CGet me out of here=E2=80=9D =E2=80=9CTechn= ical Details=E2=80=9D =E2=80=9CI understand the = >> risks=E2=80=9D >> >> Safari =E2=80=93 =E2=80=9CShow Certificate=E2=80=9D =E2=80=9CCancel=E2= =80=9D =E2=80=9CContinue=E2=80=9D >> >> Internet Explorer =E2=80=93 =E2=80=9CClick here to close=E2=80=9D =E2= =80=9C=E2=80=9CContinue to this website = >> (not >> recommended)=E2=80=9D =E2=80=9CMore Information=E2=80=9D >> >> Chrome - =E2=80=9CProceed anyway=E2=80=9D or =E2=80=9CBack to safety= =E2=80=9D and =E2=80=9CHelp me understand=E2=80=9D >> >> >> >> Opera =E2=80=93 =E2=80=9CShow Certificate=E2=80=9D =E2=80=9CContinue= Anyway=E2=80=9D and =E2=80=9CCancel=E2=80=9D or =E2=80=9CBack to >> Safety=E2=80=9D >> >> >> >> A third option I=E2=80=99ve noticed is a =E2=80=9Creload request=E2=80= =9D, which I think is >> different than a bypassable error or hard fail. Am I right? >> >> >> >> Here are some messages: >> >> >> >> Chrome - =E2=80=9CMore=E2=80=9D or =E2=80=9CReload=E2=80=9D >> >> Firefox =E2=80=93 =E2=80=9CTry again=E2=80=9D >> >> >> >> Thanks, >> >> Ben >> >> _______________________________________________ >> wpkops mailing list >> wpkops@ietf.org >> https://www.ietf.org/mailman/listinfo/wpkops >> >> -- = Sincerely, Yngve N. Pettersen Using Opera's mail client: http://www.opera.com/mail/ From nobody Wed Apr 30 07:58:55 2014 Return-Path: X-Original-To: wpkops@ietfa.amsl.com Delivered-To: wpkops@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 50F001A6F7B for ; Wed, 30 Apr 2014 07:58:54 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.29 X-Spam-Level: X-Spam-Status: No, score=-1.29 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_MISMATCH_NET=0.611, SPF_PASS=-0.001] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZU2oPE8MKFUW for ; Wed, 30 Apr 2014 07:58:52 -0700 (PDT) Received: from ian.brad.office.comodo.net (eth5.brad-fw.brad.office.ccanet.co.uk [178.255.87.226]) by ietfa.amsl.com (Postfix) with ESMTP id A75091A6F03 for ; Wed, 30 Apr 2014 07:58:50 -0700 (PDT) Received: (qmail 6126 invoked by uid 1000); 30 Apr 2014 14:58:46 -0000 Received: from nigel.brad.office.comodo.net (HELO [192.168.0.58]) (192.168.0.58) (smtp-auth username rob, mechanism plain) by ian.brad.office.comodo.net (qpsmtpd/0.40) with (AES128-SHA encrypted) ESMTPSA; Wed, 30 Apr 2014 15:58:46 +0100 Message-ID: <53610FA6.104@comodo.com> Date: Wed, 30 Apr 2014 15:58:46 +0100 From: Rob Stradling User-Agent: Mozilla/5.0 (X11; Linux i686; rv:24.0) Gecko/20100101 Thunderbird/24.4.0 MIME-Version: 1.0 To: "Yngve N. Pettersen" , Ben Wilson , Michael Jenkins References: <029801cf63dd$0f484330$2dd8c990$@digicert.com> In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Archived-At: http://mailarchive.ietf.org/arch/msg/wpkops/_USv1sf6HKdyBc3sq0QHB5PP49Y Cc: wpkops WG Subject: Re: [wpkops] Taxonomy of Browser Behaviors - "Hard Fail", "Soft Fail" and "Reload Request" X-BeenThere: wpkops@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Apr 2014 14:58:54 -0000 On 30/04/14 15:43, Yngve N. Pettersen wrote: > IOW, the four levels and actions are: > > No detected problem: Continue, no indications to the user necessary > Low level problem: Continue, visual problem indications optional, aka > "soft fail" > Serious problem: Stop connection, ask the user whether to continue > Critical problem: Close connection, don't allow the user to continue, > aka "hard fail" FWIW, I tend to label these four levels as... No Fail Soft Fail Hard Fail Block Fail But it's clear to me from this thread that my labels are too vague. ;-) -- Rob Stradling Senior Research & Development Scientist COMODO - Creating Trust Online