Gervase Markham wrote:
Eddy Nigg (StartCom Ltd.) wrote:
That's right! But the audit confirms exactly that (in your example, no verification). The CA will have to mark its certificates compared to its policy which was audited accordingly.

Why will they "have to"?
Because they would like to have their certificates detected accordingly. If there is no OID, then the browser doesn't no what to do and probably mark it as the lowest level by default (Just a suggestion - it could also state, that it doesn't know the assigned level, be careful!).
Who is the policeman?
Gerv, please answer me this questions here, I'll wait for your answer: Ar you a policeman today? Will you be a policeman with EV?
And, inevitably, there is a certain amount of judgment involved in deciding whether a particular set of practices meet a particular Mozilla "level".
I simply don't think, that this will be an issue at all. The levels will be defined clear and understandable. A CA will be able to judge, if he does A, B, C for level X, if not he goes down one level and checks if he does A and B etc....CAs are not idiots....they can handle that...
Who arbitrates when there's a dispute?
Who arbitrates when there's a dispute today?

And I've pointed out several times that this URL is factually inaccurate, and bad reporting.
Not in respect to the expected percentage of EV certificates. Verisign never disputed this, but other parts of this interview!!!!

Actually, I'm afraid I might have to quibble even over your attempt to find common ground. :-(
Well, I think there is quite some common ground here. I don't need to find it, it is here....maybe because it is the right thing to do?

EV is indeed an attempt to strengthen identity verification.
Which is a nice thing, really! A very noble goal, however thorough identity validation exist already. It's just more of the same in a new color...(Green was suggested ;-))
His suggestion is that CAs self-classify their existing offerings into one of 4 categories.

Therefore the reason I object is that it seems to me that, in the face of the new consumer-level identity spoofing threats which were not present for the first ten years of the life of SSL, _none_ of the current practices are sufficient.
Huuu? "new consumer-level identity spoofing threats"??? LOL

Gerv thinks, that EV is a new invention....Please read a few CA policies and practices and you'll find EV all over...Class 3 validation and higher exists and current practices exist! All it needs is, that browsers know to differentiate between the various verification procedures...this is what is insufficient!

Both of these are the names of banks. The organisation which obtained these potentially confusing certificates (to prove a point) didn't even have to lie to get them. I'm sure those willing to stretch the truth a bit more could achieve "better" results.
The certificates in questions are most likely domain validated. They won't go away! That's one of the reasons for our proposal, e.g. the relying party has to know about this. Of course he should also know about other verifications (i.e. higher levels as well). You can't force them to buy "green certificates" and they'll continue using the low level certificates (As a matter of fact, we had to issue many domain validated certificates to financial institutions - so we have special requirements for them, they are still Class 1 labeled). The relying party has to know about it...and by repeating myself, it's our duty to make the relying party aware of the type of verification. This is what our proposal will fix!

Just for your interest, I proposed a UI to take advantage of that fact a while back; I called it "New Site" or "First Visit":
http://www.gerv.net/security/phishing-browser-defences.html#new-site
Which is what Ben Buksch calls "SSHing the browser". So this should be implemented, it's not connected to this proposal (Ben specifically asked not to tackle this right now)
absent the desire of the Mozilla Foundation to play "CA Cop" and spend ages evaluating the different procedures of all the CAs, all we can do is lump all existing "organisationally-validated" certificates into the same "identity not sufficiently verified" category.
Bullshit...you are repeating this, even so you have received answers on this...To "lump all existing" into one category is what browsers have wrongfully done since they exist!!! We are going to change this! That's exactly the wrong...

--
Regards

Signer:      Eddy Nigg, StartCom Ltd.
Phone:       +1.213.341.0390
_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

Reply via email to