Podcast
Root Causes 27: Pending Safe Browser Guidelines from Germany


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
July 18, 2019
The German government has published a draft of its latest guidelines for safe browsers, which include requirements for how SSL certificates are supported and treated. Join our hosts as they discuss the German safer browser requirements and their potential impact on Germany, other governments, and industry worldwide.
Podcast Transcript
Lightly edited for flow and brevity.
Must support TLS. I don’t think that’s new. I think that’s pretty important.
Must have a list of trusted certificates. I think they mean trusted certificate roots. So once again, not new.
Now this third one is new. Must support Extended Validation (EV) SSL certificates. So EV SSL support is a requirement, and I actually looked up that requirement in the original document. My German’s a little rusty but that’s essentially what it says.
Certificates must be checked against a CRL or OCSP. Which again, I don’t think is new, but I think that’s important.
Here is an interesting one. The browser must use icons or color highlights to show when communications to a remote server are encrypted or in plain text. So basically, there’s got to be a visual indicator that you can see as the user to know whether or not this is encrypted communication. That’s what the lock icon used to be.
Connections to remote websites riding on expired certificates must be allowed only after specific user approval.
Then there are a few things that get a little more weedsy. Must support HSTS. Must support same origin policy. Must support content security policy. Then it gets into a bunch of stuff that isn’t really certificate-related.
It’s there to interact with a human being therefore it requires something. An icon, a color, something to show you this is a trusted site.
It’s interesting. Phishing is a practice that goes back to the 1990’s. It is such an old attack, and yet it’s still very prevalent. It’s still effective. It’s still is a cornerstone of online criminal activity. I ask myself, “How is this possible?” And part of the reason is I don’t think that browser interfaces have worked hard enough or effectively enough to solve that problem.
Part of that is because they get an inconsistent experience across different browsers. Part is because the browsers have made those indicators small and weak and obscure. It’s like they want to make the indicators as poor as they can and still be able to check the mark to say that they have the indicator.
And some of it is that because of these weak indicators, companies haven’t been able to get behind EV with real bold messages like, “If you don’t see my company name at the top of your browser, stop interacting with that website.”
I remember back in the late 2000’s when we introduced EV, we talked to large companies that were big phishing targets, and that’s exactly what they did. They were marketing to their consumers at the time and they were saying, “If you’re in this browser and you don’t see my name at the top, you’re not at the right place.” Because back then they could do it. It was big and bold.
As the browsers watered down their ability or their willingness to say this is the company that you’re talking to, then the consequence of that was that companies had to back off of those messages. And that’s what got us to the situation we’re in now.
So, if you think about the act, the antivirus industry over the past X number of years—and they still exist and they still have their purpose—but let’s be honest, blacklisting of bad things in the most generic terminology possible, is incredibly difficult.
And that’s back when there was just a handful of viruses or variants. Back then that might’ve been viable, but malware became thousands and hundreds of thousands and millions, just unthinkable numbers of variations where it really became every single attack was unique based on the way the nature of the attack was. Then antivirus really started to have a hard time.
And so, the analogy of this plays well also into phishing websites. Which is, the bad guys have figured out ways to create on the order of tens of thousands of phishing websites in very short order, and therefore for a phishing website, its length of existence being operational for the bad guy might be very, very short. Which is sufficient for the purpose.
So therefore, if you as a browser are trying to tell me that you’re going to protect me by blacklisting this, I’ve been in the industry long enough, Tim, I'm going to laugh at you. Because I know you’re going to fail.
We’ve seen an example of where it perhaps is technically possible to have a site of the same name created and have it issued an Extended Validation certificate. But if you take a look at the reality of it, that exact concept of thousands of phishing sites created is not possible for Extended Validation certificates. You’re not going to be able to have tens of thousands of EV certificates issued within a day for a phishing campaign. It won’t work.
You and I used the example of passports in earlier podcast. The analogy that you said, Jay, was, “Well ok, Jason Bourne might have a shoebox under the floorboards with ten different passports in it, but that doesn’t mean your average small-time criminal has a false passport.” And I think that’s exactly right. It might be that someone somewhere can come up with a trick to make it look like they have the same name as someone they’re trying to attack, but that is light years away from the kind of widespread, trivially easy website counterfeiting we see today.
Therefore it’s an incredibly effective solution, and all we’re saying here on this podcast is, take a look at the German specification for what makes a safe browser. They’re actually agreeing with us where support of Extended Validation certificates as well as human user interface indicators such as icons and colors can be very important for the user.
If you’re doing business with German government and that could include… Goodness, take a look at all the things in Germany that are centralized, from their pharmacy system up to all kinds of things that are centralized. You know any time you hear the word, Bundes anything, essentially it could, we might call this the Bundesbrowser, right?
The other thing is, Germany in terms of individual privacy is really the leader in the world. And so, a lot of people view - if you’re a European multinational andyou want to make sure you’re not running afoul of regulations, you usually say, “Well can I pass Germany?” If I can pass Germany, there’s a good chance I can pass everybody.
It’s the same as you and I talked about how in the energy world Texas is considered to be a leader and people take place from it. Similar thing happens in Germany with regard to individual privacy. And so, in that regard it’s very likely to have an effect on corporations throughout Europe who just say, “I don’t want someday to learn that I'm in trouble in Germany. So, I'm going to make sure that my people are using browsers that are compliant.”

