[EMAIL PROTECTED] wrote:
> I have specific question to a preferred setup of a EV SSL server PKI and 
> how the user experience will be.

Im not the expert on this, but I can perhaps give you a preliminary 
answer until the experts show up.

> Assume that a EV compliant primary root cert of CA X is accepted and 
> preinstalled in Firefox 3.x (FF3). The hierarchi is now
> 
> CA X PCA root
>  |
>  +- CA X SSL Issuing CA
>     |
>     +- SSL server cert for _www.domain.com_ 
> <https://webmail.tdcwebmore.dk/plugins/html_mail/fckeditor/editor/www.domain.com>
> 
> I guess that this is a setup without any problems and that FF3 shows it 
> as a EV cert as long as the issued SSL cert include the CA's reported EV 
> policy OID?

Yes, my understanding is that this will work as long as the following is 
true:

* The SSL cert has the proper EV policy OID value.
* The cert for the CA X SSL issuing CA (subordinate to the root) has 
either the EV policy OID value (same value as that in the SSL server 
cert) or the AnyPolicy policy OID value.
* The CA X PCA root cert has the EV policy OID value associated with it 
as metadata in Firefox 3. (In other words, we've approved the CA X PCA 
root for EV, and made the corresponding changes to the Firefox 3 code.)

> Ever if the PCA also has non-EV subCA's?

Yes. Whether the PCA has other subordinate CAs (EV or not) is 
irrelevant, since they are not part of the cert chain in question.

> For the purpose of being backwards compatible with legacy browsers the 
> CA X PCA will now obtain a subcertification from a widely recognised CA 
> Y (e.g. Entrust.net) and the SSL server cert customers will be 
> encouraged to install the path
> 
> CA Y
>  |
>  +- CA X PCA root
>      |
>      +- CA X SSL Issuing CA
>          |
>          +- SSL server cert for _www.domain.com_
> 
> How does the browser resolve the path and does the user still experience 
> the EV cert as an EV cert.

In this case there are two possible paths from the SSL server cert to a 
trust anchor, one terminating in the CA Y root cert and another 
(shorter) one terminating in the CA X PCA root. My understanding is that 
Firefox 3 has special code that for the EV case ensures that the CA X 
PCA root is chosen as the trust anchor, and the SSL server cert is 
properly recognized as EV (assuming that the CA X PCA root is enabled 
for EV as described above).

Note that there are real-life examples of this scenario already, and as 
far as I know they work fine.

Frank

-- 
Frank Hecker
[EMAIL PROTECTED]
_______________________________________________
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to