The minimal claim made by TLS-aware software is, and will always be:

"The entity I'm talking with has shown that it has the private key to
the public key that it has presented me."

Everything else is an identity binding -- an attempt to strongly link
an identity other than the public key with the public key.  This is
where the problem comes from -- there are multiple things that (most)
roots actually claim.  As a pathological case, consider an EV-enabled
root that also issues certificates with document verification that
does not -- quite -- meet the requirements of the CAB Forum for EV
(thus it does not include the EV OID in those certificates that it
issues), and also issues domain-validated certificates.

What is the claim made by an EV-enabled root that embeds its EV OID in
a certificate that it issues?
What is the claim made by an EV-enabled root that does not embed its
EV OID in a certificate that it issues?
What is the claim made by a non-EV-enabled root that includes
OU="Domain Control" or OU="Domain Validated" in a certificate it
issues?

Each of these requires reference to the appropriate certificate
policies and certification practice statements.  It's more correct to
state that "[CA] states that this certificate was issued according to
its policies to [Subject]."  For EV certificates, since they actually
have verification, it would be correct to state that "[CA] verifies
that this certificate belongs to [Subject]."

It's also important to note that there is no EV certificate for email,
only real-time TLS.  This is why Thunderbird's language is more
appropriate in its situation.

Is it ever appropriate for anyone or anything to restate a claim made
by anyone or anything else in a way that changes the semantics of what
is actually said?  The journalistic term for this is "misquoting", and
it's generally considered Very Bad.

However:  I don't think this is something that can really be resolved
without the aid of technical writers.

-Kyle H

2008/10/5 Ian G <[EMAIL PROTECTED]>:
> One of the things that is a little bit variable in the way the
> software presents to the user is the presentation of the
> information.  Specifically, when dealing with certs, we expect the
> cert to make a claim of some form, and we expect the relying party
> to be somewhat OK with that claim.
>
> What do people think should be the claim made by software?  From a
> table I have, there are several possibilities:
>
> Thunderbird:  "Certificate issued by: CN"
> Firefox:      "Verified by: O"
> Safari:       "Issued by: CN"
> Konqueror:    no claim apparently made, but CN chain is displayed
>
> (I don't have all of them above, please fill out the rest, if you
> have access to these tools.  I've probably got some of them wrong,
> but that's not the issue today.)
>
> There are two big qustions surfacing out of the above:
>
> 1.  Should the CN or the O be the name displayed for the CA?
>
> 2.  Looking at Firefox, there is a claim that the cert was
> *verified* by the named CA.  Most of the others just say that the
> certificate was *issued* by the CA.
>
> There is a pretty big difference between these positions.  The
> Firefox position creates an effective legal claim that the CA has
> indeed verified the information presented;  the others defer that
> issue to "somewhere else" and make only a strict rendering of the
> crypto results.
>
>
>
> Personally, I quite like the claim that Firefox makes.  It would be
> nice for the user to have *some* view as to what all this stuff is
> about, and right now they get precious little help from participants
> in any form of clarity.  Firefox helps in this way by providing
> something pretty simple.  The others pass the buck.
>
> OTOH, we might not all agree with the claim that Firefox makes;  we
> may think there is some merit in issuing certs which include
> unverified information.  Or that the user is told nothing about the
> claim by the software.  In which case, Firefox is out on a limb,
> legally, and a bug should be filed to bring it back to a safe claims
> position.
>
> The point though is that we should really have a unified position on
> this, and we should write down the actual situation (as this should
> in effect become a criteria for audit as well as a commitment by the
> parties).
>
> What do people think?
>
> iang
>
> _______________________________________________
> dev-tech-crypto mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-tech-crypto
>
>
_______________________________________________
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to