NNSquad - Network Neutrality Squad

NNSquad Home Page

NNSquad Mailing List Information

 


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[ NNSquad ] Google Modifies SSL Behavior -- and the Results Are Troubling


        Google Modifies SSL Behavior -- and the Results Are Troubling

                http://lauren.vortex.com/archive/000906.html


A few days ago in another venue, I noted that Google has moved toward
default SSL search for its logged-in users.  I have long been an
advocate for broader use of SSL encryption, as a means to protect
users' data from third-party observation and manipulation, so I
applauded this move by Google ( http://j.mp/r9gcRD [Google+] ).

In that posting, I noted that there were some issues related to Web
"referers" (that's the correct spelling in this context!) when used in
SSL environments.

This isn't the time or place to get into a philosophical discussion of
referers and whether or not data contained therein (such as user
search queries) really should or should not have become standard
operating procedure on the Web.  As I've discussed previously, I am
not in the "referers are always evil" camp, and I view the issues
surrounding referers as being complex ( http://j.mp/rmnip5 [Lauren's Blog] ).

I've now had time to further study the referer/SSL situation with
Google's new default SSL environment -- and to discuss the situation
with Google -- and I'm frankly troubled by some of what I've found.
In particular, certain changes that Google has apparently made in the
normally expected SSL handling of referers may be viewed by some
observers as at least creating the appearance of a "pay to play" push
toward Google advertising.

This gets rather complicated quickly, and I'm basing the description
that follows on the best information I have at this point.  If I learn
more later of note I will update as appropriate.

Please refer to my chart as we proceed:
http://j.mp/mUQF8w  (Lauren's Blog)

One of the basic rules of SSL is that data is supposed to be protected
from end-to-end.  In particular, when a SSL-based query is made of a
search engine, the expected behavior is that referer query data will
not be passed along to sites clicked in the results unless those sites
are also running SSL (subject to default browser and plugins settings,
which would normally pass through this data).

This is indeed the reported behavior on Google's original encrypted
search site -- branded as "SSL Beta" -- at
https://encrypted.google.com.  Users have been able to manually use
this site for quite some time, by specifying it as a direct URL
(either https:, or http: which diverts to https:).  As you can see on
the chart, referer query data from https://encrypted.google.com is
passed to both "Ordinary" and "Ad" sites if those sites are https:
(SSL), otherwise the referer query info is blocked.

However, Google has apparently altered this expected sequence for
their new https://www.google.com -- which can be reached either by
direct URL, or via automatic redirect from http: as described above
for logged-in Google users.

There are two variations reported from expected SSL behavior on this
version of the site, as denoted by the red boxes on the chart.

Normally, we would expect an ordinary destination site using SSL to
receive the referer query data as per standard SSL end-to-end
behavior.  But apparently Google is now blocking this data in this
case, as shown in the first red box.

Even more problematically, in the second red box we observe that for
user clicks on Google ads, the ad site will receive the referer query
info from the SSL search, even if that ad site is not using https: --
that is, isn't even using SSL at all -- seemingly directly violating
the normally expected end-to-end SSL protection sequence.

Again, I am not anti-referer.  I appreciate the value of referer query
data for legitimate Search Engine Optimization (SEO), for ordinary Web
site operators, and of course for advertisers.

Google notes a number of mitigating factors.  They feel that they
attempted to strike a balance between security and the needs of
advertisers, and point out that only a small percentage (logged-in
users, less than 10% of total searches currently) of queries are
diverted to https://www.google.com.  They also note that some search
query data (though clearly not of the same depth as raw referer query
data) is available through their (quite excellent, I will note)
Webmaster Tools.

Still, these are quantitative, not qualitative limitations, and use of
https://www.google.com can only be expected to expand.

So long as Google stayed within the normal, expected operating
parameters of SSL in relation to referer queries, as with
https://encrypted.google.com, they were on very firm ground.

But by changing the expected SSL behavior for https://www.google.com,
they have created the appearance of a situation where -- as far as
referer query data is concerned in this context -- it could be
construed as necessary to buy Google ads to either obtain query data
when you otherwise wouldn't be able to obtain it, or to keep receiving
it in a situation where you ordinarily would have expected to receive
it anyway.

My recommendation is fairly simple.  In the optimum case,
https://www.google.com should behave in the same manner that
https://encrypted.google.com does now.  As an alternative to ease the
situation for advertisers, they could keep receiving query data from
https://www.google.com -- even over http: links -- for a limited
period to provide transition time for them to move to full https: SSL.
This would also serve the laudable goal of further encouraging the
adoption of SSL.  At the end of the designated transition period, if
ad sites were still not on https:, they would no longer receive
referer query data.  And needless to say, any site that runs https: --
whether they buy ads or not -- should be able to receive referer query
data if ad sites can receive that data.

Google is clearly aware of the controversy surrounding their SSL
situation.  And one of Google's great strengths is their robust
internal deliberation process and willingness to change course as
appropriate.

It will be interesting to see how this saga transpires.

--Lauren--
Lauren Weinstein (lauren@vortex.com): http://www.vortex.com/lauren 
Co-Founder: People For Internet Responsibility: http://www.pfir.org 
Founder:
 - Network Neutrality Squad: http://www.nnsquad.org 
 - Global Coalition for Transparent Internet Performance: http://www.gctip.org
 - PRIVACY Forum: http://www.vortex.com 
Member: ACM Committee on Computers and Public Policy
Blog: http://lauren.vortex.com 
Google+: http://vortex.com/g+lauren 
Twitter: https://twitter.com/laurenweinstein 
Tel: +1 (818) 225-2800 / Skype: vortex.com