Eddy Nigg (StartCom Ltd.) wrote:
This is a good question! Let me explain, because there is not *one* answer to this...First of all, by assigning a certain level to a certificate, the CA makes a promise, that the certificate in question matches the relevant verification level of the Mozilla CA policy (I have mentioned it previously).

Right. But if I promise you a pony, it doesn't mean you'll get one.

Since the definition of the various levels will be strait forward and very clear about what they mean and which verification have to be performed in order to assign a certain OID to the certificate, there will be not much room to play for the CA.

Is this database good enough for a cross-check? What about that one over there? This country has entirely different business registration rules. That country treats companies as people, the other country doesn't.

There's a fine line to walk between strait-jacketing the CAs into a single set of verification practices (which is unworkable, given country variations) and having it so loose that there's leeway for cheating. Writing such a standard is not easy.

For example the Mozilla CA policy is very clear about its minimum verification procedure and its a requirement. I view the proposal a natural extension of this Mozilla CA policy.

It's very clear about some simple, baseline things like domain control verification - and there aren't very many ways to do that. When you get on to verifying organisation names and companies, things get much more complicated.

But this discussion would be less abstract if you were to come up with a more detailed proposal, that gave (for example) the definition of what would be required for a Level 3 certificate.

Additionally by having the CA confirm and sign the Mozilla CA policy, the CA is bound to it! No but and no when! Should a problem arise, all parties involved can refer to the same definition, i.e. the Mozilla CA policy.

So no-one in the real world ever has a dispute over a contract, because they can just refer to the contract language to clear things up? :-)

No, because the CA validation practices will get audited against the public documents on the cabforum.org website. So Ernst and Young, KPMG and friends are the policemen.
>
So I have some objections about your statement above, in that respect they are also the policemen of any other policy they audited, which means, that there is a similarity at least. However I don't view them as policemen's at all, it's not their job.

It is. Auditors make sure you are doing something you have committed to do. That is their job. And that's exactly what we want.

If the motives of the CA are solely to be completely honest about it, yes. But given that they can make more money if they can pass less validated certs off as more validated certs, there's a big incentive to say "well, this set of practices corresponds to level 3" when in fact we might think it corresponds to level 2.
>
In such a case, a CA would have to live up to their claim! I suspect, that a CA wouldn't take on a higher level, because of the promise involved. First of all, should a problem arise, the CA would be responsible up to the level it assigned the certificate.

In what way would they be responsible? Does your proposal include liability? If so, how much, and under what circumstances?

The certificates in questions are most likely domain validated.

Nope. Organisationally validated. Check the certificate contents, and match them up with the relevant CA's products.
OK, now this is actually a very good case for our proposal! First of all I'd like to point out, that the certificate signed by XRamp might be a domain validated only certificate - I couldn't figure it out (Another good reason why we need the levels).

I'm told it's OV; if you can show differently, that would be interesting.

However the second certificate was issued by Comodo Class 3 and in common practice at CAs would have to be a fully verified certificate (similar to EV, i.e. Class/Level 3). Obviously this is not the case here, which is why we *need* to have our proposal implemented!

How would your proposal prevent this happening?

No-one lied to get that certificate. The company named in it really exists. To reduce the incidence of confusing O fields, you need a standard for exactly what can be put in it. Like, er, the one EV has.

In case of the Comodo certificate, they couldn't have marked it as Level 3 (as the issuer certificate might indicate) and if they'd have done that nevertheless, it would have been a breach of contract (That between Mozilla and the CA).

Why, exactly? What did they not do that they should have?

Domain validated certificates have the domain name in the O field, not a name like this.
Not really. Some CAs issue certificates including personal name and/or organization name in the organization field, respectively the common name field for client certificates. However usually they are also marked with "Persona not validated" or similar and are signed from a Class 1 issuer.

Do you have an example of a DV SSL cert which has something other than a domain in the O field?

but I say that it's unavoidable without documented and third-party-audited standards so we can meaningfully discriminate. Having the Mozilla project find resources to do our own audit is just out of the question.
Right! But Mozilla can provide the foundation and framework for having certificates marked correctly. The Mozilla CA policy can be the definition (Call is standard if you want). The CAs get audited as before and the subscribers and relying parties (i.e. the public) are the people making the judgment (with the help of a good UI). When thousands of people are able to know about a certificate a lot more than today - with a clear definition in place - no CA will dare to cheat.

I just don't see that world ever happening. Most of the planet has far better things to do than learn about certificates and CAs.

BTW, perhaps you might ask the CAB forum, why they didn't think about such a plan like our proposal. Why should 99% of the SSL certificates remain unclassified and broken in the browsers? Shouldn't have this specific forum come up with a solution for all certificates?

Because they agreed with me that there was no possibility of imposing standardisation on the existing product set.

Gerv
_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

Reply via email to