Ben Bucksch wrote:
Gervase Markham wrote:
Right. But if you have four levels in the infrastructure, that sort of
implies four levels in the UI. And if it turns out that four levels in
the UI is impossibly confusing, then having four levels in the
infrastructure is unnecessary.
Not really, you may want to treat some levels (including self-signed and
plain HTTP, which kind of makes it 6 levels with this proposal) the
same. Or you may want to show the difference on request. Or, as Mike
Beltzner said, may simply want to add indications, e.g. show
'encrypted', a higher level adds real name, an even higher level adds
street address etc. - this is very clear and understandable for users.
It's understandable in the sense that yes, a user can understand what a
real name is. But it's not understandable in terms of translating it
into what the user is supposed to do or not do.
For your average person on the web, "security" means one or more of:
- Can I shop here without my credit card number being sniffed/stolen?
- Is this my bank or not? Can anyone else see what I'm doing or get my
password?
Now, we may not be able to provide cast-iron guarantees - just as, even
though Gap is a reputable clothing store, it can't guarantee that a
rogue employee hasn't cloned my credit card if I walk into one and buy
something. I think that's understood.
But our UI needs to be focussed on helping them answer those questions.
And our backend needs to support that UI.
Yeah, this would need to sort of reflect back on the policy, so it's
hard or useless to talk about such info in a void, without use-case,
much less UI. Eddy, maybe you can add use-cases, both from side of cert
applicant and end-user, and *maybe* even browser. I.e. for what would I
get which cert, or for what would I trust which cert. However, I
nevertheless think that Eddy has a strong point when saying that his
proposal reflects current use, which means that we can implement it
without too much trouble changing CAs around.
Except that it would be an enormous amount of effort. There are 44 CAs
currently in Firefox, and 20 more in the queue. Each may have between
one and ten different products. All these products would need to be
allocated levels, and the CAs would need to change their issuing systems
to add the new OIDs. And, as I believe I'm going to get to further down
the thread, there is no auditing to make sure the CA was honest in terms
of doing the correct amount of verification anyway.
Eddy's proposal is anything but "not too much trouble".
The core idea of Eddy's proposal was not that, though, but to introduce
the *concept* of different levels of certs, with current technical
standards, and more generically than EV.
But EV is backed up by audit. Eddy's proposal is not.
(Note: as you probably know but others may not, the standard WebTrust
and similar audits only verify that the CA does what they say they are
going to do. They do not audit the _level_ of verification performed. If
I say I'm going to do no verification, and do none, I pass the audit.
This is one of the big drivers behind EV.)
I think the webtrusty audit includes adhering to their own standards.
And the standards for each level for each CA are public.
Except that analysing and classifying all those products from all those
CAs, and keeping up with changes, is a Herculean job. The Mozilla
Foundation neither has the manpower, the time nor the inclination to pay
CA Cop. This is one reason EV is good. One standard, high level, audited
by third party auditing firms. We just have to ask: "Do you have a valid
EV audit?"
Gerv
_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security