Security/Features/TLS Telemetry: Difference between revisions

Jump to navigation Jump to search
no edit summary
No edit summary
No edit summary
Line 18: Line 18:


The negotiated information may be sufficient for our uses.
The negotiated information may be sufficient for our uses.
|Feature privacy review=[[Privacy/Reviews/Telemetry/SSL_Certificates_And_Errors|Privacy review page]]
|Feature overview=The goal of this telemetry study is to collect SSL/TLS related data that our users encounter in their daily browsing. This data can be used to decide whether Firefox should support legacy / less secure protocols such as weak keys or SSLv2 .
|Feature users and use cases=The target users are Firefox users.
 
'''Use Cases'''
*Collect cipher suites exchanged during handshake and negotiated cipher
*Collect TLS/SSL version
*Collect certificate key strength (bits)
*Collect TLS/SSL certificate related errors
**What kind of errors are our users encountering?
**Domain mismatch, expired, untrusted issuer, etc
|Feature privacy review=Review is in progress. Please see [[Privacy/Reviews/Telemetry/SSL_Certificates_And_Errors|review page]]
|Feature implementation notes=Implementation bug
|Feature implementation notes=Implementation bug
* {{bug|707275}}
* {{bug|707275}}
Line 69: Line 79:
|Feature security health=OK
|Feature security health=OK
}}
}}
Goals of Study:
*Collect cipher suites exchanged during handshake and negotiated cipher
**[http://mxr.mozilla.org/mozilla-central/source/security/manager/ssl/public/nsISSLStatus.idl nsISSLStatus.idl] exposes <tt>cipherName</tt>
*Collect TLS/SSL version
*Collect certificate key strength (bits)
**[http://mxr.mozilla.org/mozilla-central/source/security/manager/ssl/public/nsISSLStatus.idl nsISSLStatus.idl] exposes <tt>keyLength</tt> and <tt>secretKeyLength</tt>
*Collect TLS/SSL certificate related errors
** [http://mxr.mozilla.org/mozilla-central/source/netwerk/socket/nsITransportSecurityInfo.idl nsITransportSecurityInfo.idl] exposes securityState
** [http://mxr.mozilla.org/mozilla-central/source/security/manager/ssl/public/nsIX509Cert3.idl nsIX509Cert3.idl]
**What kind of errors are our users encountering?
**Domain mismatch, expired, untrusted issuer, etc
Confirmed users
110

edits

Navigation menu