Eddy Nigg (StartCom Ltd.) wrote:
Level 0: Nothing really, except it's your personal site and nobody else has access to it.
<snip the other four levels>

So you have made suggestions about the different uses for the five levels. That's great - but it means that all of those distinctions must be present in the UI. Because if they aren't, then one of the following two things will happen:

- Someone will buy a level X cert, but the UI will say it's the same as level X - 1, and so they will be upset that they've wasted money

or

- Someone will buy a level X cert, but the UI will say it's the same as level X + 1, and there's a security problem

Neither is good. Yet five levels is complex to indicate.

- The Mozilla CA policy will be extended to include the definition of the various levels. - The CAs assign the various verification procedures to the appropriate level.

- Mozilla writes loads of code to detect each different type of CA certificate and make sure that NSS knows what level it corresponds to
(or are we doing that bit by asking the CAs to include new OIDs?)

- The CA has to live up to the promise made, e.g. the level it assigned to the certificate. - Should the CA have failed to adhere to the promise, do XYZ (which still has to be defined in any case. Completely missing or irrelevant from current policy).

Actually, it's rather important. If there's no reasonable sanction we can take against the CA, then the policy has no teeth. This is a problem today. We can't really yank Verisign's root if they "misbehave", because half the SSL web would break. EV addresses this problem too; you can just remove the EV status from a root, changing it back to "normal" SSL. Nothing breaks; you just don't get the extra UI.

However there is another thing which I'd like to mention and suggest adjustment of the policy and CA inclusion process: As of today, CAs don't have to make any commitment concerning adherence to the Mozilla CA policy and doesn't have to sign anything. I think this is "interesting" to say the least. I suggest to let CAs sign the Mozilla CA and a statement like: "By requesting a CA certificate to be embedded in Mozilla software, the CA agrees to adhere to the this policy in full..." and confirm to have read, understood etc. of the same paper...Something for the lawyers obviously, but I think it has to be done in some way.

Definitely something for the lawyers, in that it would fundamentally change the relationship between CA and browser. Currently, we have no contract, and so no obligation to continue including the cert. A contract would probably have commitments both ways, implied if not explicit.

Gerv
_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

Reply via email to