On Monday, December 11, 2017 at 5:47:50 PM UTC-5, Matthew Hardeman wrote: > While I understand that it may formally be beyond the scope formally to > consider this in discussion with EV UI handling, I think some consideration > to ecosystem harm is appropriate here. > > If we eliminate EV UI, we have reduced the scope of WebPKI to domain > validated certificates (in any pragmatic sense, anyway).
That already is all the Web PKI is. Full stop. The origin is the scheme, host, port. It's not the validation method. The validation method does not constitute a security boundary on the Web or in the Web PKI, so all there is is domain validation. Everything else is a quasi-boundary that is full of more holes than the most exquisite of cheeses. Every attempt to somehow redefine that as a different boundary has been unable to do so. Even the introduction of EV called for the separation of scheme, because without that, EV provided no direct security value. So why are we promoting EV as a boundary or with UI surface? Under the mistaken assumption that the user is always inspecting the URL at every key stroke and interaction and sub-resource load. That's actively user hostile, and damaging to any credible discussion of security. > Conveniently. if the domain validation is all important, there is, for any > given domain, a single entity authoritatively enshrined to answer at any > given moment to whom and when a certificate may issue: the currently > attached domain registrar. > > Taken ad absurdum, that's where an exclusively domain validation landscape > leads. ad aburdum isn't necessary - that's exactly how it should work! And it's absolutely true that third-party CAs act as an indirection between this registrar and the issuance of a certificate - an independent attestation of this relationship. _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

