Eddy Nigg (StartCom Ltd.) wrote:
Gervase Markham wrote:
- Someone will buy a level X cert, but the UI will say it's the same as level X - 1, and so they will be upset that they've wasted money
>
I don't think it's your job (Mozilla) to take care of eventual business models of the CAs. Let them take care of this.

So if Mozilla is not showing a particular level, and the CAs are not selling certificates at a particular level... what's the point of having the level?

Yet five levels is complex to indicate.
Level 0 is already handled by the UI. We have to find a solution for the other three or four levels.

Four levels is also complex to indicate. Three (something like "nothing", "shop", "bank") is possible, but has also been objected to as too complex. I personally think three is the sweet spot.

Definitely something for the lawyers, in that it would fundamentally change the relationship between CA and browser. Currently, we have no contract, and so no obligation to continue including the cert. A contract would probably have commitments both ways, implied if not explicit.
>
No! The Mozilla CA policy says clearly, that there is no commitment and a CA root can be removed. It's part of that contract anyway! No problem here...

It says that; that doesn't necessarily mean a CA wouldn't win a lawsuit if we removed their root and they sued. There may be an implied contract.

We both agree that it's one for the lawyers; my point is only that you cannot assume that we can definitely have a one-sided contract with a CA.

They are *not* audited to make sure there's a minimum level of validation.
>
Wrong! The audit confirms every type of levels, classes and verifications a CA performs (implied by the CA policy and practices). Your first statement contradicts the second one.

No contradiction. Focus on the word "minimum". If you say you will do no verification at all, and you actually do no verification at all, you pass the audit.

You are saying the same about EV, my friend! Exactly the same...You promoted EV while taking the UI out of the discussion. EV doesn't provide or suggests the UI, neither does my proposal - with the difference, that my proposal tries to solve *all* SSL, not just a small part of it - if at all!

The difference is that your proposal is not an attempt to improve the (in my view, poor) quality of information embedded in current certs - it's just an attempt to assign a set of numbers to the status quo.

Do you have a source for these estimates?
>
Verisign.

A public source? A URL?

Gerv
_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

Reply via email to