Podcast
Root Causes 32: Why Do Browsers and Academic Research Say Different Things About EV SSL?


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
August 15, 2019
Breaking research from two esteemed universities shows that sites with Extended Validation SSL certificates are much less likely to be engaged in criminal behavior like malware and phishing. And yet, leading browsers are reducing or removing EV information from the interface. Join our hosts as they explore the research results, this paradoxical browser behavior, and the effect it's likely to have on consumer security.
Podcast Transcript
Lightly edited for flow and brevity.
They compared the groups of certificates against each other, and there are a number of interesting conclusions in there. Some conclusions that jumped out at me that directly talk to the idea of certificates and their value in providing identity for a site and providing information that people can use.
One is that on the whole, when they compared the phishing certs to the domains that they were trying to replicate, they say, “These phishing certs do not typically replicate issue and subject information from the sites they’re trying to imitate.” In other words, the certs that are used on the phishing sites are very unlikely to actually contain information that is imitative of the site that they are trying to spoof. So if I'm trying to spoof a major bank, I don’t have a cert on there that has the name of the major bank in the organization field, by way of example.
Of course, that says something about the original purpose of SSL certificates, which was to tell you who you’re connecting with. Even now, when we see these certs on these phishing sites, they use it to get the lock icon, but that original purpose still potentially has value.
So it was hard for relying parties to say, “I'm prepared to trust that this cert is telling me who this is.” However, EV is different because it’s codified, it’s transparent, it’s consistent, and ultimately it’s highly reliable. It’s very accurate information.
This comes to finding number two from the Aachen study that I thought was interesting. They compared the percentage of the known phishing certs that were EV to the percentage of known benign certs that were EV.
On the phishing sites, the percent that were EV was 0.4%. 0.4% of these roughly 10,000 phishing sites were EV. When you get over to the benign sites, of the roughly 40,000 benign certs, 7% of them were EV. That’s showing that there is an order of magnitude greater propensity for a legitimate site—a non-phishing site—to have an EV cert than a phishing site. I think that’s a very important finding.
The fallacy with the conclusion that a lot of people want to come to—which is that we must throw out EV—is that it was trivially easy to figure out what that company was and who the owner was. I’m sure Ian Carroll didn’t actually commit any fraud with this cert, but hypothetically if he had, it would’ve been trivially easy to find out who had committed that fraud.
That’s one of the points behind authentication. A CA can’t necessarily tell you that somebody isn’t going to go do something bad. We can’t predict the future. This isn’t Minority Report.
But the CA cantell you who did that bad thing. At that point we have alternatives like law enforcement and the legal system, and you can arrest somebody or you can sue somebody. Those are very real deterrents from people being fraudulent or dishonest or otherwise malicious.
So free and easy, right? Free and easy is what the bad guys are typically going to want. EV is neither of those two things.
Under these circumstances, part of the reason that it’s economically viable to do this is that it’s really, really cheap, and once you start doing things like making them create a business… Again, Ian Carroll says, “Oh, it only cost me $100.00 to buy my business license.” Yeah sure, but $100.00 changes the economics of this radically in a phishing world. Especially if it’s $100.00 per domain. That would make your classic, broad phishing attempt economically infeasible.
They tried to see how EV was connected to these forms of bad action and they came back that the propensity for an EV cert to be clean of these bad actors was 99.99%. I think these two data points in conjunction are important because those are the two halves of it. It’s malware distribution and classic phishing as the biggest threats that ordinary consumers who are just trying to go to their banks or the places where they shop online face. If you take those two pieces of research in conjunction, what they’re showing is that where an EV cert is present, the likelihood to run into these problems is exceedingly small.
I think those are very strong data points to talk about the fundamental point that in the event that an EV cert is present on a site, it is much less likely that that site is malicious than if an EV cert is not present.
So EV has two different things: There has to be a registered business, obviously. In some jurisdictions, maybe that’s not as comprehensive as it is perhaps in the United States or Canada or others, but on the other hand, a lot of businesses that are likely to be spoofed are out of North America and Europe and places where there is some more comprehensive connection to an actual person’s identity.
And failing all of that, these things have to be paid for. There’s no such thing as a free EV certificate that I know of, and therefore some payment has to be made, and that obviously potentially connects to an identity as well.
For all those reasons, it winds up being highly negatively correlative with those activities.
Now, this brings us to another development that’s coming, and this is a real disservice to users, which is that we have seen the systematic de-emphasis of certificate identity information in popular browsers over time, especially with regard to EV.
The most visible example is Chrome. Chrome did take the green away, so that where the company name used to be green, now its gray, and in doing so, it became less visible. Chrome has announced that in its release 77, which is coming in October, that there will be no EV indicator in the address bar at all.
Then we saw an announcement from Firefox just a few days ago that their Version 70, which is also coming in October, is going to do the same thing. It’s going to strip out the EV indicator, and you’ll have to click on the lock to even know that there’s a difference. That there is identity information there at all. A DV and an EV cert will look identical, and it won’t be in any of these browsers until you actually click down a level that you even have the opportunity to see if identity information is available.
And I just don’t get it. I think they’re doing something really bad for their users, and because these browsers between the two of them have a majority of global market share, they feel they can get away with it. And unfortunately, they probably can.
But it will be bad for internet security. It’s going to bad for the safety of the user.
You know I use a lot of offline safety analogies in general. I like to talk a lot about seatbelts, so let’s talk about seatbelts. It would be like saying not everybody wears his seatbelt so therefore don’t give anybody the opportunity to wear a seatbelt. Why would you do that? It would be the wrong way to make a car. And yet, that’s essentially the argument that Google has made.
Thankfully there are browsers that still have it. Therefore, I use those browsers, but you know it just feels a little bit uncomfortable to be on a site that I know should have that green bar and now it does not.
My response to that is, “Ok, so what? Clearly the amount of benefit is more than zero. There are people out there that benefit from this, and we know that because they get vocal every time this happens. So, the amount of benefit is more than zero.” Nobody has been able to articulate the benefit of taking it away. There is no benefit of taking it away, so that means that this is a net negative for safety.
How do we defeat phishing? We do a bunch of things. We make it harder for the phishers to send emails. We make it harder for those emails to get delivered to inboxes. We take down their sites, and we make it harder for them to exactly imitate a site. You do all these things.
That last one is what we’re talking about. It doesn’t mean that you stop doing the others, but use a good, layered defense. And part of that is give the user at least the opportunity to save themselves and give them the tools they need to know the difference and then focus on making those tools better and more visible.
You know it’s funny to hear, “Well these people aren’t recognizing my indicators so I'm scrapping it.” If we were talking to the people at the Google online properties instead of the people who run the Chrome browser, if we were talking to the people who run Google Shopping and you were saying, “Well they can’t find the Buy button, therefore take away the Buy button,” I guarantee you the Google Shopping people would say, “No, we’re going to find a way to make the Buy button more visible.” Because at that point they have some skin in the game. And those people recognize that they’re able to do that. Those people say, “Look we can do a better job of interface design, and better interface design enables end users to do the things they want to do.” They know that.
One of the solutions was to use a certificate pinning technique to essentially only allow a specific certificate to be used by the actual native application in the mobile device. That solved a lot of that kind of grief. Do a mind experiment and say to yourself, “Well, if I'm going to X bank, and the browser knows I'm going there because perhaps it was typed in a certain way, and therefore only a certain specific certificate would be accepted,” right?
The CAs are already doing the good, hard work of identity verification. There are other pieces of information beyond what’s done today in EV with respect to things such as the legal entity. Perhaps it needs to be a more generic set of company information that’s vetted in a certain way. This isn’t baked out yet, but I think there’s still some hope here to come together for a way of doing this correctly. I think throwing the baby out with the bath water is not really the greatest solution.

