Closed
Bug 74320
Opened 24 years ago
Closed 4 years ago
[Classic and Modern] add "weak crypto" lock icon
Categories
(SeaMonkey :: Themes, defect)
SeaMonkey
Themes
Tracking
(Not tracked)
RESOLVED
INVALID
People
(Reporter: jgmyers, Unassigned)
References
Details
(Whiteboard: icon)
Attachments
(3 files, 5 obsolete files)
When PSM2 lands, it will distinguish between strong and weak SSL ciphers,
setting the level of the security-button to "low" for weak sites.
securityOverlay.css currently displays lock-secure.gif for both "high" and
"low". The theme should be using an icon other than lock-secure.gif for "low".
The two alternatives are:
1) Design a new icon for weak sites
2) Use lock-insecure.gif for weak sites.
My personal preference would be (2), as 40 bit ciphers offer virtually no
protection at this point (per http://www.counterpane.com/keylength.html) and
that would be the simplest and easiest interface for a user to understand.
Reporter | ||
Comment 1•24 years ago
|
||
(The Modern counterpart to this is bug 74322).
OS: Windows NT → All
Hardware: PC → All
Comment 2•24 years ago
|
||
Just tell me what attribute you set on the #security-button element to indicate
"weak crypto" and I'll update the CSS to show the correct image.
Status: NEW → ASSIGNED
Reporter | ||
Comment 4•24 years ago
|
||
We set the value of "level" to "low" in the weak crypto case.
Comment 5•24 years ago
|
||
Secure sites should display some kind of "locked" icon, otherwise users will be
confused. This means that option 2 is out (in my opinion). The current icon
should be displayed until a new one is designed to represent the weaker modes.
If a user doesn't want weak encryption, they should just turn off the weak ciphers.
The old summary: [Classic] add "weak crypto" lock icon
changed to
The new summary: [Classic and Modern] add "weak crypto" lock icon
The old summary: [Classic] add "weak crypto" lock icon
changed to
The new summary: [Classic and Modern] add "weak crypto" lock icon
Summary: [Classic] add "weak crypto" lock icon → [Classic and Modern] add "weak crypto" lock icon
Comment 8•23 years ago
|
||
Mass reassigning my theme bugs to Shuehan.
Assignee: hewitt → shliang
Status: ASSIGNED → NEW
Comment 10•23 years ago
|
||
The "weak crypto" icon needs to convey two distinct bits of information: (1)
encryption is active, and (2) the encryption is not the strongest form offered
by Mozilla.
The current crypto icons have two variations: (a) a line drawing of an unlocked
lock on a gray background, and (b) a line drawing of a locked lock on a yellow
background.
One option would be to indicate strong crypto with the current line drawing of a
locked lock on a yellow background. Then, indicate weak crypto with a locked
lock, gray background. The lack of encryption would still be indicated with an
unlocked lock, gray background.
Updated•23 years ago
|
Whiteboard: icon
Target Milestone: --- → mozilla1.0.1
Comment 11•23 years ago
|
||
Another thing. The "weaker crypto" icon should not send the message that the
level of security is useless. The "stronger crypto" icon should not send the
message that the level of security is perfect. Thus, my earlier suggestion in my
previous comment should probably not be implemented without modification.
How about a yellow background for both icons? For weaker encryption, we could
use a dark shade of yellow. For stronger encryption, we could use a bright shade
of yellow. For both icons, to indicate imperfect security (as all security is
necessarily imperfect), the icon could be shaded progressively darker from left
to right.
Comment 12•23 years ago
|
||
Proposed relnote: When visiting a SSL enabled site, the lock icon will take on a
yellow background, and will not indicate the relative strength of the SSL
encryption used.
Keywords: relnote
Comment 13•22 years ago
|
||
I have been thinking about this for some time, and I think this might work.
Please refer to the attachment I have made.
There were two ideas.
The first one is a standard color code for the locks Red for 40 bit encryption,
yellow for 56 bit encryption and finally Green for 128 bit encryption.
The second idea is to include the level of security as visible text above or
next to the locked icon.
Also on the MouseOver for the lock icon, the pop-up help window should inform
the user what level the encryption is in addition to who has signed it.
Reporter | ||
Comment 14•22 years ago
|
||
The first idea does not work for people with red/green color blindness.
The underlying code makes no distinction between 40 and 56 bits. They are both
low security.
Comment 15•22 years ago
|
||
Thank you for working on this bug. We need to build on your work.
The color green usually means "It's safe to go." We should not convey such
information ever because 128 bit SSL encryption does not equal 100% assured
security. As Bruce Schneier has observed, there are always ways to circumvent
cryptography through such tactics as social engineering or password guessing. We
should not give users a false sense of security.
Furthermore, although 40 bit is not as strong as 56 or 128 bit, it is still
better than no encryption. By using the color red for 40 bit encryption, many
users will get the impression that they should stop and not proceed. Many users
will mistakenly think that no encryption (gray) is better than 40 bit encryption
(red).
We should have a gray, unlocked lock icon for no encryption. For 40, 56, and 128
bit encryption, we should have a gray, locked icon on a yellow background that
gets progressively brighter. The darkest background would be for 40 bit. The
brightest background would be for 128 bit encryption. We should not use the
colors green or red. Colors other than green or red would work.
Comment 16•22 years ago
|
||
Why not make the strong crypto icon have a locked locl with a green, or blue
background, and the weaker crypto icon with a yellow, or red background?
Comment 17•22 years ago
|
||
Please not green or red. Any colors but those.
Green = safe to go.
Red = not safe to go.
Those are not the messages we are trying to send. The facts are:
Strong crypto does NOT = perfect safety.
Weak crypto does NOT = guaranteed danger.
No crypto does NOT = guaranteed danger.
The messages we should be sending are:
Strong crypto = best security Mozilla offers, but it isn't absolutely perfect.
Medium crypto = in between strong and weak.
Weak crypto = low security, but not guaranteed danger, either.
No crypto = Your safety is in your hands, but not guaranteed danger, either.
The colors green and red should not be used here. Green says that safety is
perfect when that is false. Red says that danger is guaranteed when that is false.
Any other color would be fine.
Comment 18•22 years ago
|
||
I personally don't like the color-code idea. Too hard for users to figure out
what's what.
I cast my vote for Matthew Kruer's second idea:
> The second idea is to include the level of security as visible text above or
> next to the locked icon.
It's simple, and it works. People aren't going to miss the loss of real estate
on their status bar. (Why *is* there a second text area just to the left of the
online/offline indicator though?)
Comment 19•22 years ago
|
||
Thanks for the vote. Looking at what has been stated before about the idea for
color for the locks. You can’t use red, yellow, green color because it gives
people get a false sense of security, and on top of that, you can not use
certain color together because of colorblind people. I think the only viable
option is to simply include text to say what encryption level you are currently
using. It better then coming up with some arbitrary color/icon scheme, and the
text says exactly what it means. Also depending on how it’s implemented the text
would not be limited to just 40, 56, 128 bit encryption, but higher levels such
as (I think its PGP’s) 1024 bit encryption. I think that this is the simplest
answer to an impossible problem.
Comment 20•22 years ago
|
||
Yes, you can use yellow. Yellow means "caution" and thus it is appropriate at
any level of encryption.
We should put any written text in a tooltip. Otherwise, it will be a distraction.
Just make the locked icon yellow, and make the yellow color progressively
brighter for higher levels of encryption.
Comment 21•22 years ago
|
||
I have to respectfully disagree. Some people are not as visually acute to color
changes as you are, and by simply increasing the intensity of the yellow color,
I doubt people would see a difference. So to show that this text display of the
encryption level would not be glaring to some, I made a quick pic. I did two
things first I inverter the color so now the lock it self is yellow, not the
background, and the second I add the 128-bit text to the right as not to be
confused with the connection indicator. I think this works the best. If people
don’t like seeing the text then simply add an option under security preferences
not to show the level of encryption. Then we have the best of both worlds.
Comment 22•22 years ago
|
||
That's not a bad idea. It would confuse a lot of people, though. Your average
user doesn't know the meaning of "128-bit." They would be confused as to whether
that is "good" or "bad."
I see your point about people with disabilities not being able to see
progressive tints of yellow. Is there some document on the web about accessible
color design?
We don't have to use just one color, like yellow. We don't have to use yellow at
all. We could use multiple colors. As long as we don't use the colors of red or
green, any color scheme will at least not mislead users.
The point of this bug is to have icons that readily distinguish between the
relative strengths of encryption, and convey that information in a way that is
instantly recognizable. I still think that choosing one color, and using
progressive shades or tints makes the most sense. Less-sighted users could still
resort to a tooltip that could appear when the mouse is pointed at the icon.
Comment 23•22 years ago
|
||
Another idea is to make the lock slightly bigger with higher levels of encryption.
Comment 24•22 years ago
|
||
Here's another vote against color coding.
Progressive shades are only useful if you have something nearby to compare
them with (e.g. something that shows all the revelant shades).
A tooltip may be the best answer. I think many users have learned to
equate "128 bit" with "good".
Reporter | ||
Comment 25•22 years ago
|
||
Please note earlier comments: there are only two levels, "high" and "low".
Anything using fewer than 90 bits of encryption is reported as being "low". The
theme is not given the information to distinguish between 40 and 56 bits.
Given that designing a new icon is proving to be so problematic, I would like to
reemphasize my suggestion to use lock-insecure.gif for weak sites. Connections
using weak ciphers are indeed insecure against passive eavesdropping.
Comment 26•22 years ago
|
||
In order to get something done, that is somewhat simple and doable, here is what
I purpose, a temporary/permanent solution.
Currently when you are in a “secure” page, if you Mouse Over the Lock Icon, you
will only get who the encryption is secured by, but not the level of encryption.
This should be included in the Mouse Over information. As of right now you have
to look at the Page Info under the Security tab to find the information. This is
very inconvenient, especially when we are trying to have as much information
about what type of encryption. This would be a simple solution
This still does not replace the different icon for each level, but it would
satisfy my requirement for having the level of information upfront, and we
should be able to get this out by the 1.3b version in January.
As for the Icons how about this idea. Three levels of encryption icons, High,
Medium, and Low.
Low is the lock in a bronze/copper color.
Medium is the lock is a silver color
High is a lock in gold color
Everyone should be familiar with the idea of bronze, silver and gold. Its
ambiguous, no red, green yellow, but anyone one knowing anything about awards
will recognize that silver is better then bronze and the gold is better then
silver. This also leaves room for a little bit of expansion, because in award,
platinum is higher then gold, and visually it is represent by white silver.
Comment 27•22 years ago
|
||
Here is an example of Security Levels Based upon Medal colors. Hope this
clarifies things.
Comment 28•22 years ago
|
||
I like Matthew Kruer's ideas on tooltips and medal colors a lot.
Comment 29•22 years ago
|
||
I also like Matthew Kruer's medal idea. It seems like a better concept than the
color-coding, which is not intuitive and can be deceiving (56bit being red/yellow).
I'm voting for this bug.
We missed the milestone. Can someone either update the milestone or blank it?
Comment 30•22 years ago
|
||
minusing for buffy. we have very limited design resources. We support
recommendation 2 in the original report.
Keywords: nsbeta1-
Comment 31•22 years ago
|
||
I went ahead and created new icons both large and small for Mozilla. This is a
chart of all of them. If these are acceptable and if anyone would like tem just
contact me. I have them all in PNG format with transparent back grounds.
Note: On the Large Icons, The reason why I included them is for people to more
easily identify what the icon is. This would work with my above mentioned
“display the level of encryption in the mouse over” the icon would be placed on
the left side of the box and all the information would be displayed on the
right side. Also in the Privacy and Security section of the preferences I would
these to be included also along with a description.
Attachment #103302 -
Attachment is obsolete: true
Attachment #109513 -
Attachment is obsolete: true
Attachment #109818 -
Attachment is obsolete: true
Comment 32•22 years ago
|
||
Excellent icons. Just one point of constructive criticism. To my eyes, the
posted icon for weak encryption looks too reddish. The bronze medal has some red
in it, true, but it is closer to brown than red. The weak encryption icon should
have the brownish hue of the bronze medal.
Here's a close-up of the Olympic medals awarded at Salt Lake City:
http://web.knoxnews.com/web/kns/sports/olympics/art/medals1000.jpg
Comment 33•22 years ago
|
||
Please try to duplicate the colors from the above medals URL exactly.
They are quite distinct to a person with red-green color blindness,
whereas the locks in the above attachment are not.
Comment 34•22 years ago
|
||
Andrew Hagen: “Excellent icons. Just one point of constructive criticism. To my
eyes, the posted icon for weak encryption looks too reddish. The bronze medal
has some red in it, true, but it is closer to brown than red. The weak
encryption icon should have the brownish hue of the bronze medal.”
There is a simple answer to this the Original color was Copper not Bronze, and
copper is more towards the Orange/Red then Bronze, but I have added the Bronze
color and there is barley a noticeable difference so I had to exaggerate it by
making it half as bright.
Nelson Bolyard: “Please try to duplicate the colors from the above medals URL
exactly. They are quite distinct to a person with red-green color blindness,
whereas the locks in the above attachment are not.”
What colors Exactly are you not distinguishing between?
--------
I took a snap of the pallet from each of the medals, but when I imported the
color into my master gray scale image, because the hue of the master is so
simple compared to the hue of the medal color, the images came out looking like
$#!^. (Not to get technical but the master has so simple a hue that when it
tries to match colors it end up using only ~16 of them out of 256, so I had to
color it by hand.) I exaggerate some of the colors to be more perceptible for
color blind people now it should look like the lighter the images become the
higher the security.
Pull out the turkey and stick a fork in it. I think it’s done!
Attachment #111965 -
Attachment is obsolete: true
Comment 35•22 years ago
|
||
Those are fantastic. I like the ones on the far right-hand side the best. Are
those the ones you're recommending?
It would be great to have this for 1.3.
Flags: blocking1.3b?
Keywords: mozilla1.3
Comment 36•22 years ago
|
||
Yes those are the ones I am recommending. I may make a slight change to the
Combo Gold to make it darker so it will be more distinctive for those with color
blindness, but I do not think that it will affect the overall color. Other then
that I think this is done. Now if someone will just implement it. We also need
to come up with how the locks will be displayed or should I say at what level
they will be displayed at. Right now I believe the lowest encryption there is,
is 40bit and the highest I have seen is 4096bit
Knowing that here is what I have come up with.
Bronze < 63bit
Silver 64 to 127bit
Gold 128 to 255bit
Platinum > 256bit
This is totally arbitrary but seems to work well this way.
Note: I want to include Platinum because it only a matter of time before that
becomes a common standard for web encryption. And looking far into the future
the next generation the numbers will be revamped to
Bronze <127bit
Silver 128 to 255
Gold 256 to 512bit
Platinum > 1024bit
And onwards...
Reporter | ||
Comment 37•22 years ago
|
||
The only information the skin gets is whether or not there are fewer than 90
bits. There are only four states to the "level" attribute: "high", "low",
"broken", and not present.
Comment 38•22 years ago
|
||
Should a new bug be opened to provide the skin with more information?
Comment 39•22 years ago
|
||
Regarding comment 36, There are typically two different kinds of encryption,
symmetric and asymmetric (a.k.a. public key), used in SSL and S/MIME.
The two kinds of encryption have radically different key sizes.
Key sizes for symmetric ciphers include 40, 56, 80, 112, 128, and 256 bits.
Key sizes for asymmetric crypto include 512, 1024, 2046, and 4096 bits.
Each category has its own ranges of weak, moderate and strong.
NSS makes both the symmetric and asymmetric key sizes available through
an API.
If the symmetric key size is below 90 bits, or the asymmetric is below 1024,
then the lock should signify weak crypto.
Comment 40•22 years ago
|
||
Nelson Bolyard: I think you just validated my point for more then the 3 colors
so using what you said:
“Key sizes for symmetric ciphers include 40, 56, 80, 112, 128, and 256 bits.
Key sizes for asymmetric crypto include 512, 1024, 2046, and 4096 bits.”
You come up with something like this
Symmetric ciphers
Bronze <=63bit
Silver 64 to 127bit
Gold 128 to 255bit
Platinum >=256bit
Asymmetric crypto
Bronze <=1023bit
Silver 1024 to 2045bit
Gold 2046 to 4095bit
Platinum >=4096bit
I don’t think that there is a need for different icons for different types of
encryptions, as long as they provide similar protection.
John G. Myers: “The only information the skin gets is whether or not there are
fewer than 90bits. There are only four states to the "level" attribute: "high",
"low", "broken", and not present.“
I’m glad I stepped in and made the icons when I did. If the original Idea was to
have an unlocked icon for encryption less then 90bits, just imagine the utter
confusion that using an open lock to represent some of the lower encryptions
would have caused. People would start to wonder if all encryption were broken.
And then you would get a whole new bunch of bugs complaining about the broken
encryption.
Andrew Hagen: “Should a new bug be opened to provide the skin with more
information?” I don’t think we need to. Essentially that is what this “bug” is
already.
So looking forward. What needs to happen now is take the existing levels and add
to them. Using the information on what john said, “There are only four states to
the ‘level’ attribute: ‘high’, ‘low’, ‘broken’, and ‘not present.’“ There would
be two additional “medium” and “very high” I doubt this would be that difficult
to do.
Comment 41•22 years ago
|
||
No, the security is only as strong as the weakest link. If any link is weak,
then the user should see a lock that means weak. Otherwise, he should see
a lock that means strong. We definitely do NOT want to make crypto seem
any more complicated or any less black-and-white than it is now.
Comment 42•22 years ago
|
||
I should not have written:
> Each category has its own ranges of weak, moderate and strong.
I should have written:
Each category has its own dividing line between weak and adequate length.
There seems to be consensus in the cryptographic community that 90 bits is the
dividing line for symmetric ciphers. A year ago there was (IMO) consensus that
512 was weak and 1024 was adequate for RSA keys, but now confidence in 1024
has begun to erode. But AFAIK there has never been any consensus about any
dividing line beween medium and high. There's only good enough and not good
enough.
Updated•22 years ago
|
Flags: blocking1.3b? → blocking1.3b-
Comment 43•22 years ago
|
||
Who will actually add the new lock icons to the skin? It's been almost two
years since this bug was opened. We should get the issue over and done with
already.
Comment 44•22 years ago
|
||
I decide whether a site is secure by looking for https:// in the Location bar.
I recently sent out some sensitive info online, only to realize I was using 56-
bit encryption all along. What can we do for poor souls like me?
Comment 45•22 years ago
|
||
If we're going to just have strong encryption and weak encryption icons, I think
the gold and silver icons would work the best.
Comment 46•22 years ago
|
||
It seem to me that the original mandate has changes slightly from
distinguishing between strong and weak (which are in constant flux and
subjective) to more of an information based. The Icons now mean what range of
encryption you are using from 1-bit to 256-bit symmetric and 1-bit to 4096-bit
symmetric. For the average Joe Blow, this is a simply informative so they know
that “hey you are not using a great encryption for sending this type of
information” not to say “don’t send it” because the level is to low. You have
to agree that any encryption is better then none. The amount of encryption you
need is more based upon how secure you think the data should be during
transfer. Some might think its fine that sending a number over using 64-bit
encryption. The latest statement by distributive network RC5
(http://www.distributed.net/rc5/) says that the brute force cracking method
takes a distributive network 1,757 days or 4.9 years to crack one message. True
I don’t feel good about using 64-bit encryption as using a higher one, but I’m
not going to lose sleep about it. Seriously would you use higher 90-bit
encryption to a personal e-mail? Probably not, but I would like to know that I
am using 128-bit encryption when sending my credit card information or 64-bit
when sending sensitive e-mail, or even 56-bit for fun mail.
Your argument, at least to me now, is more of a foot note on the encryption
page. “The (insert organization here) believes that anything under 90-bit
encryption is a weak encryption and should not be used for sensitive data!” I
may be totally wrong but I hope I am making a valid argument.
As to your reference about the weakest link, yes this is also true, but it is
far beyond the scope of this particular bug. I am more worried about someone
hacking someone’s database that has my number then stealing it during
transmission. There is no way for this group to prevent that type of threat
therefore your weakest link has no relevance because the encryption is not the
weak link, but rather the programs that use the encryption, including but not
limited to Mozilla itself.
But to clarify it for future reference, I will use the actual bit range that
each color should represent.
Fixes: replaced Combo Gold with Dark Gold to help the icons be more distinctive
for the color blind.
Updated•22 years ago
|
Attachment #112260 -
Attachment is obsolete: true
Comment 47•22 years ago
|
||
I find the multi-level chart very confusing, and I work in crypto. There is no
way that my mother, or some NGO worker in the field is going to be able to
determine if a particular color is 'safe' or not. Just stick with the "High"
"low" "broken" "not Present" ideas. Trying to learn and remember more states is
way to cumbersum.
bob
Comment 48•22 years ago
|
||
Please explain these color charts you've attached.
How many colors are you recommending? 4 or 8?
Why are there two columns under "recommendation for final"?
What is the difference between the two columns?
Why are there two distinct colors described as "Dark Gold" under the
heading of "recommendation for final"?
Your ranges of numbers have symmetric and asymmetric ranges switched.
I suggest you read http://theory.lcs.mit.edu/~rivest/bsa-final-report.ps,
a paper by 7 of the worlds most distinguished cryptographers, before you
dismiss the 90 bit number.
Comment 49•22 years ago
|
||
Q: Please explain these color charts you've attached. How many colors are you
recommending? 4 or 8?
A: There are only four icons, six if you include broken and unlocked, the color
icons go in order towards greater encryption levels.
Bronze = Low (less then 90-bit)
Silver = Middle (say 90-bit or greater)
Gold = High (128-bit or greater)
Platinum = Spare or if implemented Very High (This is only my would be attempt
to extend the levels higher as not to be short sighted, This is NOT a
necessity, just something I would like to see included)
The reason for the 2 sizes in purely for informational purposes: See attachment
for example of how they would be used.
Q: Why are there two columns under "recommendation for final"?
A: Read below.
Q: What is the difference between the two columns?
A: As for the reason for the GREY SCALE, it you give an example of what color
blind people would see. They are NOT additional, they are the same as there
color counterpart to the left. As you can see all the colors ramp nicely.
Q: Why are there two distinct colors described as "Dark Gold" under the heading
of "recommendation for final"?
A: I have no clue what you are taking about. The “color” across is a grey scale
of the image next to it. If you are color blind then this is an error on my
part, but they are suppose to be the same.
I hope that clears things up for everyone.
Reporter | ||
Comment 50•22 years ago
|
||
With the gold/silver approach, we would probably want new "insecure" and
"broken" images. If someone could attatch a .gif file for each state, I could
generate a patch to add them to the skin.
Detecting weak asymmetric keys is bug 134735. That bug is stalled awaiting
direction from the security module owner.
Comment 51•22 years ago
|
||
color is not solely reliable for indicating a change in status such as this. I
am resetting the target milestone, since this bug was minused, i can't work on
it right now. Unless someone is willing or able to do this icon for 1.3 in
their spare time. cc'ing gail white, might be able to help
Target Milestone: mozilla1.0.1 → mozilla1.4alpha
Comment 52•22 years ago
|
||
For the broken Icons, do we need to have a diffrent one for each of the levels
of security?
Reporter | ||
Comment 53•22 years ago
|
||
We only need one broken lock icon. Broken is broken--there aren't different
levels of broken.
Comment 54•22 years ago
|
||
OK I am about ready to post all the icons up here, but I need to know what
format they need to be in. I currently have then in png for the higher bit
color, and I also went to the trouble of using transparencies for the
background, but I need to know if this will work or if they need to be converted
over to gif’s without transparencies. Please advise, and I will make the final
adjustment and post them. let try to get this finished before switching to
Phoenix on the road map.
Comment 55•22 years ago
|
||
AFAIK, the patent on the compression method used in GIF has not expired yet.
Comment 56•22 years ago
|
||
I know about the Gif Patent, but I believe it expires sometime in 2003-2004, and
I don’t think that it really matters, it the encoding process, and not
necessarily the use that costs money. But then I have heard it both ways. Anyway
looking at the JAR’s and looking at the lock icons I see that there is one
called lock-mixed.gif what is the significance of this. I have not seen it used
before. Can someone please explain how it is used. –TIA-
Comment 57•22 years ago
|
||
Please remember that the strenght of symmetric cipher (40, 56 or 128bits) does
not tell you much about the SSL:s encryption strenght. Mozilla does not show
asymmetric (RSA) keysize AT ALL. Having 128bit symmetric cipher with 512bit RSA
means that SSL security is as insecure as it was with just 40bit symmetric cipher.
Therefore Mozilla should also indicate or atleast allow users to manually check
the RSA keysize. You cannot judge the encryption strenght by looking on at the
symmetric cipher, you need to look at the asymmetric cipher also!
Comment 58•22 years ago
|
||
This is all the locks for the proposed upgrade to the icon. In it, it has the
following files in PNG format. I hope someone will take responsibility and just
implement the update. Refer to example attachment for details. If you need any
changes or other icons created let me know, and I will do my best to fill the
request quickly.
Broken_Lock.png
Combo_Gold_Lock_Locked.png = High security > 128bit+
New_Dark_Bronze_Lock_Locked.png = Low security < 90bit
New_Silver_Lock_Locked.png = Low security < 90bit to 128bit
Platinum_Lock_Locked.png = Spare
Unlocked.png
Larger versions of the locks above, to be used in the description of the type
of security
Broken_Lock_Icon.png
Combo_Gold_Lock_Icon.png
New_Dark_Bronze_Lock_Icon.png
New_Silver_Lock_Icon.png
Platinum_Lock_Icon.png
Unlocked_Icon.png
Comment 59•21 years ago
|
||
Just wondering what happen with this “bug” whether or not this is going into the
realm of never going to be done?
Comment 60•21 years ago
|
||
About 7% of the Male population and about 0.4% of the Female population has some
form of color vision deficiency. Any fix that relies on color alone may cause
problems for these people. Because of this color alone should never be used to
give important information like encryption strength.
Netscape 3 and earlier used keys rather than locks to show encryption status, a
key with one tooth was low level encryption, a key with two teeth was high level
encryption. I Have no idea why this was abbandoned at Netscape 4 for the lock,
but going back to the Netscape 3 style key icons would provided a fix.
If we are going to stick with Locks it's important to insure that the *shape* of
any icon changes to show encryption strength, not just the color.
Assignee | ||
Updated•16 years ago
|
Product: Core → SeaMonkey
Updated•16 years ago
|
Assignee: marlon.bishop → nobody
QA Contact: pmac → themes
Target Milestone: mozilla1.4alpha → ---
Comment 61•15 years ago
|
||
This bug report is registered in the SeaMonkey product, but has been without a comment since the inception of the SeaMonkey project. This means that it was logged against the old Mozilla suite and we cannot determine that it's still valid for the current SeaMonkey suite. Because of this, we are setting it to an UNCONFIRMED state.
If you can confirm that this report still applies to current SeaMonkey 2.x nightly builds, please set it back to the NEW state along with a comment on how you reproduced it on what Build ID, or if it's an enhancement request, why it's still worth implementing and in what way.
If you can confirm that the report doesn't apply to current SeaMonkey 2.x nightly builds, please set it to the appropriate RESOLVED state (WORKSFORME, INVALID, WONTFIX, or similar).
If no action happens within the next few months, we move this bug report to an EXPIRED state.
Query tag for this change: mass-UNCONFIRM-20090614
Status: NEW → UNCONFIRMED
Comment 62•15 years ago
|
||
This bug report is registered in the SeaMonkey product, but has been without a comment since the inception of the SeaMonkey project. This means that it was logged against the old Mozilla suite and we cannot determine that it's still valid for the current SeaMonkey suite. Because of this, we are setting it to an UNCONFIRMED state.
If you can confirm that this report still applies to current SeaMonkey 2.x nightly builds, please set it back to the NEW state along with a comment on how you reproduced it on what Build ID, or if it's an enhancement request, why it's still worth implementing and in what way.
If you can confirm that the report doesn't apply to current SeaMonkey 2.x nightly builds, please set it to the appropriate RESOLVED state (WORKSFORME, INVALID, WONTFIX, or similar).
If no action happens within the next few months, we move this bug report to an EXPIRED state.
Query tag for this change: mass-UNCONFIRM-20090614
Comment 63•15 years ago
|
||
This bug report is registered in the SeaMonkey product, but has been without a comment since the inception of the SeaMonkey project. This means that it was logged against the old Mozilla suite and we cannot determine that it's still valid for the current SeaMonkey suite. Because of this, we are setting it to an UNCONFIRMED state.
If you can confirm that this report still applies to current SeaMonkey 2.x nightly builds, please set it back to the NEW state along with a comment on how you reproduced it on what Build ID, or if it's an enhancement request, why it's still worth implementing and in what way.
If you can confirm that the report doesn't apply to current SeaMonkey 2.x nightly builds, please set it to the appropriate RESOLVED state (WORKSFORME, INVALID, WONTFIX, or similar).
If no action happens within the next few months, we move this bug report to an EXPIRED state.
Query tag for this change: mass-UNCONFIRM-20090614
Comment 64•15 years ago
|
||
This bug report is registered in the SeaMonkey product, but has been without a comment since the inception of the SeaMonkey project. This means that it was logged against the old Mozilla suite and we cannot determine that it's still valid for the current SeaMonkey suite. Because of this, we are setting it to an UNCONFIRMED state.
If you can confirm that this report still applies to current SeaMonkey 2.x nightly builds, please set it back to the NEW state along with a comment on how you reproduced it on what Build ID, or if it's an enhancement request, why it's still worth implementing and in what way.
If you can confirm that the report doesn't apply to current SeaMonkey 2.x nightly builds, please set it to the appropriate RESOLVED state (WORKSFORME, INVALID, WONTFIX, or similar).
If no action happens within the next few months, we move this bug report to an EXPIRED state.
Query tag for this change: mass-UNCONFIRM-20090614
Comment 65•15 years ago
|
||
This bug report is registered in the SeaMonkey product, but has been without a comment since the inception of the SeaMonkey project. This means that it was logged against the old Mozilla suite and we cannot determine that it's still valid for the current SeaMonkey suite. Because of this, we are setting it to an UNCONFIRMED state.
If you can confirm that this report still applies to current SeaMonkey 2.x nightly builds, please set it back to the NEW state along with a comment on how you reproduced it on what Build ID, or if it's an enhancement request, why it's still worth implementing and in what way.
If you can confirm that the report doesn't apply to current SeaMonkey 2.x nightly builds, please set it to the appropriate RESOLVED state (WORKSFORME, INVALID, WONTFIX, or similar).
If no action happens within the next few months, we move this bug report to an EXPIRED state.
Query tag for this change: mass-UNCONFIRM-20090614
Comment 66•15 years ago
|
||
This bug report is registered in the SeaMonkey product, but has been without a comment since the inception of the SeaMonkey project. This means that it was logged against the old Mozilla suite and we cannot determine that it's still valid for the current SeaMonkey suite. Because of this, we are setting it to an UNCONFIRMED state.
If you can confirm that this report still applies to current SeaMonkey 2.x nightly builds, please set it back to the NEW state along with a comment on how you reproduced it on what Build ID, or if it's an enhancement request, why it's still worth implementing and in what way.
If you can confirm that the report doesn't apply to current SeaMonkey 2.x nightly builds, please set it to the appropriate RESOLVED state (WORKSFORME, INVALID, WONTFIX, or similar).
If no action happens within the next few months, we move this bug report to an EXPIRED state.
Query tag for this change: mass-UNCONFIRM-20090614
Comment 67•15 years ago
|
||
Status: UNCONFIRMED → NEW
Ever confirmed: true
Reporter | ||
Comment 68•4 years ago
|
||
No longer relevant as weak crypto is no longer a thing.
Status: NEW → RESOLVED
Closed: 4 years ago
Resolution: --- → INVALID
You need to log in
before you can comment on or make changes to this bug.
Description
•