I generally agree with the proposal. Mozilla should not treat all classes the same. And it's an abstraction of EV, i.e. EV could be treated as one class in this framework.

To make the problem more clear: The current flat model means that the security of all certs is reduced to that of the lowest one. Assuming the relying parts does not manually check the cert itself and has no client-side cert of his own.

Attack scenario: I get a Class 3 or 4 cert. Somebody else gets a Class 1 cert for me - which is easy, you just need to be able to intercept plaintext mails, exactly the type of attack that SSL is supposed to prevent! Now, he can pose as me (either directly as phisher or social engineer or as MITM) and present his Class 1 with my name on it to other parties who want to communicate with me, and they won't notice the difference, the UI will look exactly the same. Successful attack. SSL failed in exactly the scenario it tried to prevent.

Lesson 1: Don't treat all classes the same, because they simply are not
Lesson 2: Class 1 certs are insecure (but would be OK in an "SSH model")
Lesson 3: Not remembering certs and warning when they change is a security risk (contrast to SSH model)

Eddy's proposal was about 1. 3 needs to be solved, too, but it's harder and I'll save that for a later proposal.
_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

Reply via email to