How can I trust Firefox?

Discussion of general topics about Mozilla Firefox
User avatar
BenBasson
Moderator
Posts: 13671
Joined: February 13th, 2004, 5:49 am
Location: London, UK
Contact:

Post by BenBasson »

Since Firefox is open source, this is especially important. How do I know if I can trust a Firefox install from a domain? How do I know if it comes from Mozilla.org and not some wannabe hacker who's inserted some malicious code somewhere? This is where signing is important. Sure, a certificate saying "Mozilla.org" isn't a guarantee of trustworthyness, but it's better than nothing, and that's what's important.

I'm not sure whether I agree with you regarding a false sense of security... teaching users to ignore signed/unsigned application prompts is just as bad, if not worse.
User avatar
scratch
Posts: 4942
Joined: November 6th, 2002, 1:27 am
Location: Massachusetts

Post by scratch »

i suppose for the actual mozilla install, if it's coming from a mirror, this may be of some value. for extensions, though, it doesn't really make a difference if it's signed by joe extensionauthor.

i really don't think it is. i think that signatures on software are of little value in the majority of cases, and giving users the idea that a signature means it's safe is misleading at best.
User avatar
BenBasson
Moderator
Posts: 13671
Joined: February 13th, 2004, 5:49 am
Location: London, UK
Contact:

Post by BenBasson »

It doesn't mean it's safe... it means it's definitely from where it says it is, giving you a better idea of safety. That's my take, anyway. Admittedly, there's no point in extension authors individually signing their work, but if Mozilla.org moderators (such as those for UMO) could do so, it'd most likely be beneficial. The reason it's effective is not for the initial download/install, but if the files are kept for future use.
User avatar
scratch
Posts: 4942
Joined: November 6th, 2002, 1:27 am
Location: Massachusetts

Post by scratch »

but then that would require them to check each extension for malicious code before signing. in the case of some of the larger extensions, that might be a lot of work. i don't imagine mozilla.org would be up for the task without a lot more volunteers. i agree that, if it were to be implemented that way, it would help with security.
User avatar
Robert S.
Posts: 4399
Joined: April 24th, 2004, 3:04 am
Location: Bay Area, CA

Post by Robert S. »

Signing will guarantee that the file hasn't been modified since it was signed and if you view the org for the cert you can see who signed it which has no reference to the download site except if they happen to be the ones signing it. I could take a distribution, modify it, then sign it, and redistribute it. If an extension is installed from U.M.O. then the only additional assurance that signing will provide is that someone hasn't managed to replace an extension on one of U.M.O.'s download servers with their own which of course could also be signed. If this happens - and it is a big if - the time to resolution of this security breach will most likely be short. During this time people trying to install the extension will either

see the extension isn't signed if it isn't with some subset of these people
a) installing it anyways as they do today
b) will not install it because it isn't signed

or if it is signed with a different org some subset of these people will
a) notice this and not install it
b) another subset of users will see it is signed and install it
c) will install it and not notice if it is signed or not.

As for future use are you referring to if the extension is downloaded and then installed at some time in the future by the user? In this case the lifetime between releases of extensions reduces the value of this significantly and if the user's system is compromised to the point where someone can modify an extension there are much worse things that could / would happen before this would be the route someone would take.
JoJo Gunn
Posts: 265
Joined: May 9th, 2004, 11:34 am
Location: Tennessee

Post by JoJo Gunn »

I'm just an average Joe, and here's my take - certs don't mean anything to me. They can be faked, so I just trust my instincts. As others have noted, considering how MS uses dead people to write letters to editors of newspapers and Congressmen, etc, why should I trust them? And didn't Verisign themselves have a fiasco about routing people to a search site around the first of the year?

Speaking of redirects, how about all those redirects in IE bookmarks, such as the Media folder, like when you upgrade to IE6? :)
xexagon
Posts: 407
Joined: March 24th, 2004, 2:52 pm
Location: Eastern flatlands, UK
Contact:

Post by xexagon »

JoJo Gunn wrote:I'm just an average Joe, and here's my take - certs don't mean anything to me. They can be faked, so I just trust my instincts. As others have noted, considering how MS uses dead people to write letters to editors of newspapers and Congressmen, etc, why should I trust them? And didn't Verisign themselves have a fiasco about routing people to a search site around the first of the year?

Speaking of redirects, how about all those redirects in IE bookmarks, such as the Media folder, like when you upgrade to IE6? :)


Quite. I'd rather trust my (conservative) instincts than Microsoft. The way I see it, Microsoft is either trying to control my computer/internet usage (plus ca change), or it's trying to jump on some security bandwagon.

As for the idea of certificates in general, I only see it having any real value if Mozilla checks the code of extensions available on UMO.
adfergie
Posts: 27
Joined: August 17th, 2004, 8:30 am

Post by adfergie »

And you trust Internet Explorer?
Post Reply