On Fri, Sep 19, 2014 at 7:54 PM, Chris Palmer <[email protected]> wrote: > My point is that UI indicators should reflect the reality of actual > technical security boundaries. Unless we actually create a boundary, > we shouldn't show that we have.
So why do you show special UI for EV? >>> The hair I'd much rather split, by the way, is making each >>> cryptographic identity a separate origin. Ponder for a moment how >>> enjoyably impossible that will be... >> >> What are the issues? > > * What's a stable cryptographic identity in the web PKI? Is it the > public key in the end-entity certificate, or the public key in any of > the issuing certificates? > * Or maybe the union of all keys? > * Or maybe the presence of any 1 key in the set? > * What about the sometimes weird and hard-to-predict certificate > path-building behavior across platforms? > * What about key rotation that happens legitimately? > * Do we convince CAs to issue name-constrained issuing certificates to > each site operator (with the constrained name being the origin's exact > hostname), that cert's key becomes the origin's key, and site > operators issue end entities from that? > ** There'd still be a need to re-issue that key, from time to time. It seems for same-origin checks where the origin is derived from a resource and not a URL, we could in fact do one or more of those, today. E.g. if https://example.com/ fetches https://example.org/image we'd check if they're same-origin and if their certificate matches. Now as connections grow more persistent this will likely be the case anyway, no? > ** Could the TACK key be the origin key? Is TACK still going anywhere? The mailing list suggests it's dead. -- https://annevankesteren.nl/ _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

