L. David Baron wrote:
On Wednesday 2006-11-01 22:54 +0000, Gervase Markham wrote:
The guidelines have been developed via a very long and drawn-out process, including several face-to-face meetings with competing specifications from different groups of CAs over the past two years. Eventually and quite recently, a Microsoft employee synthesised a unified specification, which has now been made available for public comment. The latest draft of this document can be found here:
http://www.cabforum.org/EV_Certificate_Guidelines_-_Draft_10-2...pdf

After skimming some parts of the draft, my biggest concern here is
the tension between B.2.a.1 and B.2.c.3, and its implications on
when certificates would be revoked.

In particular, I think misrepresentation of identity within a Web
site that uses an EV cert must be grounds for revocation.

I agree; does any part of the draft say otherwise?

For example, suppose a company is formed called "Washington Banking,
Inc.", and they apply for and obtain an EV cert under that name.
They then write a Web site that uses the name and logo of Washington
Mutual as part of a "phishing" attack.  What percentage of consumers
would know that the legal entities behind the bank they know as
Washington Mutual are (based on the contents of
http://www.wamu.com/personal/default.asp ) "Washington Mutual Bank",
"Washington Mutual, Inc.", and other legal entities, but not
"Washington Banking, Inc"?

Not many, I agree. However, in order to correctly spoof WAMU (at least in the IE 7 UI) they would need to incorporate their fake company in the US. And, if they did that, the information gathered during the EV process could be used to track the applicant down and prosecute them.

It seems like this spec overemphasizes the concept of "legal entity"
when the real problem here is misrepresentation of identity.  So
shouldn't misrepresentation of identity, within any Web site served
using an EV cert, be grounds for revocation of that cert?  In other
words, it seems to me that B.2.b.1 should be a primary purpose of EV
certificates, and B.2.a.1 should be secondary.


Also, what's the time scale of the average phishing attack?  Are the
revocation guarantees in the spec (G.26.a) actually useful, or will
the attack be mostly over by the time anything is usefully revoked?

This was a matter much debated. G.26.a gives minimums; I would hope that CAs would do substantially better in practice.

The Mozilla project as a whole needs to decide whether EV will make a material difference to the reliability of information in certificates and, if so, whether that warrants a different UI presentation for EV certificates. It would also be good to have a more general discussion about how we present security information to users.

Presumably the idea here is that we would have a process for
determining that root CAs on our list are also valid EV root CAs,
and mark them as such?

The idea would be that, as an initial position, we would list all those CAs which have passed an EV audit as valid. We would then track that, diverging only when we had information that a particular CA was not meeting its EV obligations between audits.

Would we need a policy for determining which
CAs should be so marked?  I'd think we should have a clear policy
for this, and for when we would *un*-mark a CA.  And I think we
should have that clearly defined before we start doing anything with
EV certificates, and make it clear in advance that if CAs do any of
the things that we said would make them be kicked out of our root CA
list, we'd actually do it.

I would anticipate that the primary sanction would be removal of EV status, rather than being completely kicked out of the root list. This latter, nuclear, option has been theoretically available to us for existing CAs under the current system, but we have never contemplated using it - because removing e.g. Verisign would break half the SSL sites on the web.

One of the advantages of EV is that it provides us with a meaningful yet less nuclear sanction whereby the CA is the one that gets in hot water - because their customers who forked out for EV certificates start shouting at them because they are no longer displayed as EV in Firefox, and their Firefox-using customers are ringing them up to ask why, and whether they should carry on trusting their site.

Gerv
_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

Reply via email to