Ben Bucksch wrote:
Not really, you may want to treat some levels (including self-signed
and plain HTTP,
Considering plain http out of the scope of SSL so...Self-signed is
actually Level 0, which I omitted from the proposal, because it has no
meaning, except if you explicit agree to accept it (similar to accepting
the SSH key ;-)). In this case the browser behaves correctly in my
opinion, so it should be perhaps included in the proposed definition for
the completeness sake.
Eddy, maybe you can add use-cases, both from side of cert applicant
and end-user, and *maybe* even browser. I.e. for what would I get
which cert, or for what would I trust which cert. However, I
nevertheless think that Eddy has a strong point when saying that his
proposal reflects current use, which means that we can implement it
without too much trouble changing CAs around. It should be defined so
that we can later add levels, though, and not only on the top and bottom.
OK, lets try this....from the relying party perspective:
Level 0: Nothing really, except it's your personal site and nobody else
has access to it.
Level 1: Should be used only for password and privacy protection such as
for forums, blogs, web mail, end to end encryption such as smtp servers,
jabber servers, vpn connections, pop3s, imaps, system logon.
Level 2: Can be used for lower volume online shops where transactions
are performed with credit cards, this because of the nature and
protection credit card companies provide to customers for such purchase.
The merchant is also fully aware of these limitations and risk involved
when performing trade via the Internet. Purchases might be limited scope
and amounts, which however depends mostly on the taste of the customer.
Level 3: Can be used for transfer of any kind of critical data including
personal information, banking, health records etc. For signing of
documents and contracts, this level /can/ be sufficient. Can also be
used as a for real world authentication.
Level 4: Signing of contracts and other commitments. This level
substitutes government issued identification documents, such as passport
or identity cards. (This type of certification is many times provided by
a relevant ministry of the country). It implies, that full address and
identification numbers are included in the certificate.
All of the above requires other sanity checks and evaluation by the
relying party of course, but that's not something we control. But it
can't be said enough times so I say it ;-) The subscriber perspective is
covered mostly by the proposal itself.
Ben, does this match your expectations or did you expect something more
in depth or different?
Eddy *explicitly* said the definition of the levels can be changed
based on what Mozilla wants.
Right! It was merely our interpretation and mostly based on our combined
knowledge about the subject.
The core idea of Eddy's proposal was not that, though, but to
introduce the *concept* of different levels of certs, with current
technical standards, and more generically than EV.
EV doesn't solve this problem *at all*. However in the context of the
proposal, EV will be simply integrated without much ado. If there is a
case for EV in its current form, than it will succeed within this
framework.
I think the webtrusty audit includes adhering to their own standards.
And the standards for each level for each CA are public. What changes
is that right now, they make up the levels and can change them at any
time. With Eddy's proposal, they would be bound to *our* definition of
the level (which may or may not conveniently match *current* CA
definition). If they fail to adhere to their own standards, webtrust
and co would probably fail. If they change their published standards,
we should notice.
Two things here:
The flow of adherence to the various levels would be most likely like this:
- The Mozilla CA policy will be extended to include the definition of
the various levels.
- The CAs assign the various verification procedures to the appropriate
level.
- In case of problems one can look up the level and its meaning.
- The CA has to live up to the promise made, e.g. the level it assigned
to the certificate.
- Should the CA have failed to adhere to the promise, do XYZ (which
still has to be defined in any case. Completely missing or irrelevant
from current policy).
However there is another thing which I'd like to mention and suggest
adjustment of the policy and CA inclusion process: As of today, CAs
don't have to make any commitment concerning adherence to the Mozilla CA
policy and doesn't have to sign anything. I think this is "interesting"
to say the least. I suggest to let CAs sign the Mozilla CA and a
statement like: "By requesting a CA certificate to be embedded in
Mozilla software, the CA agrees to adhere to the this policy in full..."
and confirm to have read, understood etc. of the same paper...Something
for the lawyers obviously, but I think it has to be done in some way.
--
Regards
Signer: Eddy Nigg, StartCom Ltd.
Phone: +1.213.341.0390
_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security