Johnathan Nightingale wrote:
1. To a first approximation my sense is that, unsurprisingly, EV and Eddy's proposal are trying to accomplish the same thing: strengthening the internet's TLS/SSL certificate infrastructure to provide stronger identity verification.

Actually, I'm afraid I might have to quibble even over your attempt to find common ground. :-(

EV is indeed an attempt to strengthen identity verification. (How well it will work in practice is, of course, under debate.) Eddy's proposal, however, is an attempt to map a generic underlying framework onto the status quo. His suggestion is that CAs self-classify their existing offerings into one of 4 categories.

Therefore the reason I object is that it seems to me that, in the face of the new consumer-level identity spoofing threats which were not present for the first ten years of the life of SSL, _none_ of the current practices are sufficient. Therefore, classifying them doesn't really help.

Examples:

* https://www.noticall.net/ has a certificate issued under current organisational validation practices, and has an "O" field (the one that Opera and IE display) of "Chase".

* https://www.noticall.org/ has a certificate issued under current organisational validation practices, and has an "O" field of "Fleet".

Both of these are the names of banks. The organisation which obtained these potentially confusing certificates (to prove a point) didn't even have to lie to get them. I'm sure those willing to stretch the truth a bit more could achieve "better" results.

The second part is critical, because one thing I haven't seen reflected much in this thread (for obvious reasons) is that a cert is not the only source of info we have here. We have a user's browsing history ("Note: this looks like your bank's site, but it's the first time you've ever been to this url"),

Just for your interest, I proposed a UI to take advantage of that fact a while back; I called it "New Site" or "First Visit":
http://www.gerv.net/security/phishing-browser-defences.html#new-site

Although some of them are out of date (or I would no longer agree with particular UI proposals in them), you may also be interested in other documents in the Phishing category here:
http://www.gerv.net/security/

we have the anti-phishing blacklists, we have third parties like resellerratings and bbbonline that bite off the piece CAs don't want ("Yes, this site is trustworthy, their reputation as a business is positive"). CAs are nonetheless critical in all of this because more than any other group, they have the ability to do the kind of validation that both EV and this proposal seek to provide, and that's important information.

And, of course, they are the bedrock of all that the browser can know. After all, you can't contact bbbonline over an unverified channel in case you end up talking to someone else. So you need CAs to verify you are connected to the BBB. :-)

Also, certificate information is the only real-time information we can get without the privacy violation of sending all your visited URLs (or domains) off to a third party.

As beltzner mentioned in his post, we can more easily talk to a user about the difference between "Encrypted" and "Encrypted + Identity Verified" than we can about the difference between "Identity Verified" and "Identity better verified."

I agree. And (see my examples above) I'm not sure that some current practices allow us to assert with any confidence that the identity has been verified. And, absent a validation standard to which CAs can sign up (EV or something else), and absent the desire of the Mozilla Foundation to play "CA Cop" and spend ages evaluating the different procedures of all the CAs, all we can do is lump all existing "organisationally-validated" certificates into the same "identity not sufficiently verified" category.

Yes, this is a really bad situation for the industry and the Net to be in.

4. I think Gerv was right on when he said that (I hope I'm not misquoting him here) Mozilla would have no problem with there being two strong standards for identity validation, EV and XYZ, and with presenting them both using whatever "Identity is verified" UI we evolve. I don't think we as an organization are tied to EV and EV alone.

You aren't misquoting me. :-) But I did go on to say that each such standard we support is an effort, and so we'd need good answers to questions such like "How is this different from what we already support, and why should we care?"

Our goal is to create a safer environment for our users and when we can't protect them actively (e.g. aggresive anti-phishing warnings) we want to at least enable them to make good decisions. The acid test for me, for any proposed standard like this, is whether it will help users do that more successfully.

While I applaud the goal, my concern is that even today, users do not take any notice of the lock, and happily type CC details into unencrypted forms served from IP addresses. (OK, so the UI could be more visible.) There's obviously a continuum between "dump all the raw info on the user and wash our hands" and "make the decision entirely ourselves, blocking all access to sites we don't like", but I think we need to be closer to the latter end than the former.

Some user education will be unavoidable; however, minimising user education is a serious plus point for any proposal. See:
http://www.gerv.net/security/stay-safe/
and associated discussion, and also:
http://www.squarefree.com/securitytips/users.html

Gerv
_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

Reply via email to