Re: Comodo request for EV-enabling 3 existing roots

2008-04-02 Thread Frank Hecker
Eddy Nigg (StartCom Ltd.) wrote: Even though the Comodo request has been approved, I wonder about two additional points which you haven't addressed at all: The first is about having CA roots with wrong details in NSS, like companies which effectively don't exist anymore (AddTrust AB, UTN),

Re: Comodo request for EV-enabling 3 existing roots

2008-03-30 Thread Eddy Nigg (StartCom Ltd.)
As I promised to come back to you, here what I gathered so far. Both certificates from the links below are issued by GoDaddy. Both GoDaddy and Comodo CPS have similar requirements in the subscriber obligation and/or reasons for revocations: Starfield (GoDaddy) 2.2.1.4 (iv) the Subscriber

RE: Comodo request for EV-enabling 3 existing roots

2008-03-28 Thread Robin Alden
Eddy, [Robin said...] Our main current objection to them is on grounds of maintaining a level commercial playing field among all CAs (in the Mozilla root program). Robin, just for your knowledge that most if not all CAs which have roots in NSS, are commercial CAs. Most, if not all CAs,

Re: Comodo request for EV-enabling 3 existing roots

2008-03-28 Thread Eddy Nigg (StartCom Ltd.)
Robin Alden: [Robin said...] If I understand you correctly you are saying that considering lack of evidence to the contrary you believe that Comodo is solely responsible for lowering the standard of DV certificate issuance in these two respects? You are probably more familiar with our

Re: Comodo request for EV-enabling 3 existing roots

2008-03-27 Thread Frank Hecker
Robin Alden wrote: Perhaps my problem then is understanding the process at all. You seem to suggest that once our application for EV status is approved we somehow become immune to changes in your CA policy. Why do you feel that Mozilla has no control over the CAs other than at the point of

RE: Comodo request for EV-enabling 3 existing roots

2008-03-27 Thread Robin Alden
In terms of getting concessions from individual CAs: In the past we have held up approval of CA requests until we could be satisfied that CAs were in compliance with specifically-called-out requirements of our policy. For example, in a number of cases it wasn't clear at all from a CA's CPS

Re: Comodo request for EV-enabling 3 existing roots

2008-03-27 Thread Eddy Nigg (StartCom Ltd.)
Robin Alden: [Robin said...] Our main current objection to them is on grounds of maintaining a level commercial playing field among all CAs (in the Mozilla root program). Robin, just for your knowledge that most if not all CAs which have roots in NSS, are commercial CAs. Most, if not all

Re: Comodo request for EV-enabling 3 existing roots

2008-03-27 Thread Frank Hecker
Robin Alden wrote: Is there anything remaining which would now hold up approval of our CA requests? I have to go through all this and write up my final statement on the issues at hand. I think all issues have been responded to one way or another. Frank

RE: Comodo request for EV-enabling 3 existing roots

2008-03-26 Thread Robin Alden
But by issuing *domain validated* certificate for up to *ten years*, without revalidation is completely irresponsible and borders on gross negligent. [Robin said...] I disagree. With a DV certificate the only thing that we are warranting is that the key holder controls the domain.

Re: Comodo request for EV-enabling 3 existing roots

2008-03-26 Thread Eddy Nigg (StartCom Ltd.)
Robin, I have a request to make. Lets put aside for a minute the procedural matters and let me ask you a few questions: - We are not seeking to cause any harm to Comodo or unilaterally remove the roots from NSS. However can we seek the cooperation on the issues which were raised and is Comodo

Re: Comodo request for EV-enabling 3 existing roots

2008-03-26 Thread Eddy Nigg (StartCom Ltd.)
Robin, just to answer this one... Robin Alden: [Robin said...] A fair point, and perhaps that is a whole other problem. Our CA *does* have roots in NSS. This is correct. However your CA roots are considered legacy roots which were inherited from the Netscape era. Many critics have

RE: Comodo request for EV-enabling 3 existing roots

2008-03-26 Thread Robin Alden
Robin, just to answer this one... Robin Alden: [Robin said...] A fair point, and perhaps that is a whole other problem. Our CA *does* have roots in NSS. This is correct. However your CA roots are considered legacy roots which were inherited from the Netscape era. Many critics

RE: Comodo request for EV-enabling 3 existing roots

2008-03-26 Thread Robin Alden
Eddy Nigg (StartCom Ltd.) wrote: Robin, just to answer this one... Robin Alden: [Robin said...] A fair point, and perhaps that is a whole other problem. Our CA *does* have roots in NSS. This is correct. However your CA roots are considered legacy roots which were inherited

Re: Comodo request for EV-enabling 3 existing roots

2008-03-26 Thread Frank Hecker
Robin Alden wrote: Issuing long-lived DV certs and wildcard DV certs may be particular practices worth our having some formal positions on, even if they're not addressed by our official policy. [Robin said...] There I have to disagree to some degree. You have a policy which tells us

Re: Comodo request for EV-enabling 3 existing roots

2008-03-26 Thread Eddy Nigg (StartCom Ltd.)
Robin Alden: - We are not seeking to cause any harm to Comodo or unilaterally remove the roots from NSS. However can we seek the cooperation on the issues which were raised and is Comodo willing to address this issues in good faith? [Robin said...] We are willing to address issues which

Re: Comodo request for EV-enabling 3 existing roots

2008-03-26 Thread Eddy Nigg (StartCom Ltd.)
Robin Alden: From Frank's most recent reply I accept the reason for the consideration of all aspects of our operation, but perhaps that separation should be made more clear between those matters we are discussing here which are relevant to the EV enabling of our roots within (what we hope to

RE: Comodo request for EV-enabling 3 existing roots

2008-03-26 Thread Robin Alden
Eddy, The problem I'm seeing right now is, which isn't a problem of yours per se, that if Mozilla approves the upgrade to EV status, your CA roots will receive further anchors in the software, making it even more difficult to receive the cooperation I'm seeking on the issues, not speaking

RE: Comodo request for EV-enabling 3 existing roots

2008-03-26 Thread Robin Alden
Frank, No. I'm simply stating that there are CA-related issues which may not warrant us having a formal policy on, but which we may have an opinion on that we want to express. To take another example: our policy doesn't address the issue of whether CAs issue end entity certs directly from

Re: Comodo request for EV-enabling 3 existing roots

2008-03-25 Thread Eddy Nigg (StartCom Ltd.)
Hi Robin, First of all thank you for your honest answers, I appreciate that and the time you invested! This is going to be a summarized response of all your posts and answers. Robin Alden: The only certificates we issue for 10 years are DV certificates. We do not currently repeat any of

RE: Comodo request for EV-enabling 3 existing roots

2008-03-25 Thread Eddy Nigg (StartCom Ltd.)
Hi Frank, After reviewing the request of Comodo and receiving sufficient answers from Robin Alden (of Comodo) concerning the inclusion and update request of the various Comodo CA roots currently under discussion and after hearing (and replying to) the arguments you posted as well, I would like

Re: Comodo request for EV-enabling 3 existing roots

2008-03-25 Thread Eddy Nigg (StartCom Ltd.)
Frank Hecker: Don't have time for a long response, but I do have one comment below. Eddy Nigg (StartCom Ltd.) wrote: One can purchase a popular or less popular domain name, request a certificate for N years, let the domain name expire after one year, wait to have it picked up by

Re: Comodo request for EV-enabling 3 existing roots

2008-03-25 Thread Frank Hecker
Eddy Nigg (StartCom Ltd.) wrote: We aren't talking here about a possible gain in material only (money, credit cards), but also eavesdropping and acquiring information. Breached privacy is a *LOSS* for the relying party and LOST trust in the software upon which the relying party relies,

Re: Comodo request for EV-enabling 3 existing roots

2008-03-25 Thread Eddy Nigg (StartCom Ltd.)
Hi Robin, Sorry that I'm relying to you only now. Robin Alden: The behavior of Comodo in this respect is really surprising! Supposed you would issue certificates with longer validity only to entities which were thorough verified and validated, I could offer some understanding. But by issuing

RE: Comodo request for EV-enabling 3 existing roots

2008-03-24 Thread Robin Alden
in this forum, if possible. Regards Robin Alden Comodo CA Limited. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Eddy Nigg (StartCom Ltd.) Sent: 24 March 2008 02:38 To: Frank Hecker Cc: dev-tech-crypto@lists.mozilla.org Subject: Re: Comodo request for EV-enabling 3

RE: Comodo request for EV-enabling 3 existing roots

2008-03-24 Thread Robin Alden
Eddy, You asked: Additionally I would like to know to whom belongs the company LITESSL CA, INC. and its relationship to Comodo CA Ltd. as referenced in the audit report from KPMG (https://cert.webtrust.org/SealFile?seal=636file=pdf). What are its relations to AddTrust AB, Sweden?

Re: Comodo request for EV-enabling 3 existing roots

2008-03-24 Thread Florian Weimer
* Eddy Nigg: The CAs should prevent issuance of certificates which are suspected to be used for phishing attempts and other fraud. This includes cases like real domain names (mic0s0ft.com, paypa1.com) and sub domain names (paypal.nelson.com). Is there any CA which is part of the browser

RE: Comodo request for EV-enabling 3 existing roots

2008-03-24 Thread Robin Alden
Eddy, You said: 2.) The Comodo Certification Practice Statement, Version 3.0 and other CPS amendments state that wild card certificates are domain name validated only (depending on product or trade mark). How does Comodo prevent or control misuse of wild card

Re: Comodo request for EV-enabling 3 existing roots

2008-03-24 Thread Eddy Nigg (StartCom Ltd.)
Florian Weimer: * Eddy Nigg: The CAs should prevent issuance of certificates which are suspected to be used for phishing attempts and other fraud. This includes cases like real domain names (mic0s0ft.com, paypa1.com) and sub domain names (paypal.nelson.com). Is there any CA

Re: Comodo request for EV-enabling 3 existing roots

2008-03-24 Thread Frank Hecker
Eddy Nigg (StartCom Ltd.) wrote: I suggest the following at this stage: Adding an entry at the bug that - requests officially a statement and answering of the issues which have been raised [3]; As far as I can tell, here are the most recent questions you've raised (first four in a message

RE: Comodo request for EV-enabling 3 existing roots

2008-03-24 Thread Robin Alden
Eddy, You said: 3.) The Comodo Certification Practice Statement, Version 3.0 and other CPS amendments state certificate validity of up to ten years and beyond. I couldn't find any provision in case the domain name expires. It isn't clear what happens if an identity or organization

RE: Comodo request for EV-enabling 3 existing roots

2008-03-24 Thread Robin Alden
Eddy, You said: - Unlucky formulation of 4.2.1 Secure Server Certificates Validation Process (Code Signing versus Server Certs). I agree. 4.2.1 could do with a different sub-title, given its frequent re-use. - Subsection 1 doesn't apply I guess. Subsection 1 did not apply for code

RE: Comodo request for EV-enabling 3 existing roots

2008-03-24 Thread Eddy Nigg (StartCom Ltd.)
Thanks to Robin from Comodo to address all issues I've raised (I think you've touched everything so far). Thanks to Frank for your reply as well. Please give me some time to evaluate all your answers, thoughts and suggestions and prepare a decent reply. Most likely I'll be ready to post

Re: Comodo request for EV-enabling 3 existing roots

2008-03-23 Thread Eddy Nigg (StartCom Ltd.)
Frank Hecker: This is a followup to my previous message about Comodo's application to add a new EV root CA certificate. Comodo also has requested enabling three existing roots, AddTrust External CA Root, UTN - DATACorp SGC, and UTN-USERFirst-Hardware, for EV use, and also marking all three

Re: Comodo request for EV-enabling 3 existing roots

2008-03-18 Thread Rob Stradling
Hi Eddy. I'm not the right person to answer your questions about our CPS. I have asked my colleague Robin Alden to join this newsgroup and answer each of your points. On Sunday 16 March 2008, Eddy Nigg (StartCom Ltd.) wrote: This is a revised version of my initial questions concerning the

Re: Comodo request for EV-enabling 3 existing roots

2008-03-18 Thread Frank Hecker
Eddy Nigg (StartCom Ltd.) wrote: 4.) Frank, this one is for you: Since most (if not all) CA root certificates of Comodo were inherited from the Netscape era and never were properly evaluated by an inclusion process and in light of the questions above, isn't a thorough review of this CA

Re: Comodo request for EV-enabling 3 existing roots

2008-03-18 Thread Frank Hecker
Eddy Nigg (StartCom Ltd.) wrote: Oh, and it that respect I have another interesting question. Supposed a CA issues EV certificates (audited and conforming to the relevant criteria in every respect) but their other CA business (meaning non-EV) would fail to conform to the Mozilla CA policy,

Re: Comodo request for EV-enabling 3 existing roots

2008-03-18 Thread Eddy Nigg (StartCom Ltd.)
Rob Stradling: Hi Eddy. I'm not the right person to answer your questions about our CPS. I have asked my colleague Robin Alden to join this newsgroup and answer each of your points. Thank you Rob, I'm looking forward to the replies of Robin Alden. -- Regards Signer: Eddy

Re: Comodo request for EV-enabling 3 existing roots

2008-03-18 Thread Eddy Nigg (StartCom Ltd.)
Frank Hecker: Eddy Nigg (StartCom Ltd.) wrote: Oh, and it that respect I have another interesting question. Supposed a CA issues EV certificates (audited and conforming to the relevant criteria in every respect) but their other CA business (meaning non-EV) would fail to conform to the

Re: Comodo request for EV-enabling 3 existing roots

2008-03-18 Thread Nelson B Bolyard
Frank Hecker wrote, On 2008-03-18 05:17: Right now we don't have any technical mechanism to accept only EV certificates issued within a CA hierarchy, but not EV certs from within that same hierarchy. I think there must be a word missing from that sentence. As it reads, it says ... to

Re: Comodo request for EV-enabling 3 existing roots

2008-03-18 Thread Frank Hecker
Nelson B Bolyard wrote: Frank Hecker wrote, On 2008-03-18 05:17: Right now we don't have any technical mechanism to accept only EV certificates issued within a CA hierarchy, but not EV certs from within that same hierarchy. snip I suspect you meant ... to accept EV certs, but not NON-EV

Re: Comodo request for EV-enabling 3 existing roots

2008-03-18 Thread Eddy Nigg (StartCom Ltd.)
Frank Hecker: I'll let Eddy speak for himself, but I believe he's thinking of a scenario where we (Mozilla) or the user (a power user, to be sure) would decide that we trust CA Foo to issue EV certs, but we or the user think they have unacceptable practices on non-EV certs (like issuing

Re: Comodo request for EV-enabling 3 existing roots

2008-03-18 Thread Andrews, Rick
Frank Hecker: Eddy Nigg (StartCom Ltd.) wrote: Issuing certificates which claim to be validated without such vetting ever having performed is tantamount to KNOWINGLY and WILLINGLY contribute to a possible fraud. I claim that issuing wild card certificates without proper

Re: Comodo request for EV-enabling 3 existing roots

2008-03-18 Thread Eddy Nigg (StartCom Ltd.)
Andrews, Rick: I'd also like to add my two cents from some time spent studying confusable domain names that could be used for fraud. The solution, IMO, if one can be crafted, must be done upstream at domain name registration time. This is from our perspective wishful thinking! Many

Re: Comodo request for EV-enabling 3 existing roots

2008-03-18 Thread Eddy Nigg (StartCom Ltd.)
More questions for Comodo: Specifically to the CPS at http://www.comodo.com/repository/09_22_2006_Certification_Practice_Statement_v.3.0.pdf 2.4.3 a) section for code signing certificates refers to section 4.2.1 (Validation Practices) Going to section 4.2.1: - Unlucky formulation of 4.2.1

Re: Comodo request for EV-enabling 3 existing roots

2008-03-17 Thread Nelson B Bolyard
Eddy Nigg (StartCom Ltd.) wrote, On 2008-03-15 14:59: Nelson Bolyard: [snip] All CAs depend on the subject parties to control the use of the certs issued to them, and the CAs can revoke the certs if they find that the certs have not been adequately controlled. So, this particular part

Re: Comodo request for EV-enabling 3 existing roots

2008-03-17 Thread Eddy Nigg (StartCom Ltd.)
Nelson B Bolyard: This particular part DOES bother you, because wild card certificates aren't controllable in the same way as regular ones. A seemingly innocent domain name can become a tool for phishing. For example *.domain.com matches paypal.domain.com and paypal-objects.domain.com,

Re: Comodo request for EV-enabling 3 existing roots

2008-03-17 Thread Eddy Nigg (StartCom Ltd.)
Nelson B Bolyard: I envision a photograph of Frank and Eddy, wearing mustaches and red capes with horns and sporting tridents. :) LOL Sadly, I don't see many signs that that Mozilla is interested or participating in this work. So wake them up... Referring to the issuance of certs

Re: Comodo request for EV-enabling 3 existing roots

2008-03-16 Thread Frank Hecker
Eddy Nigg (StartCom Ltd.) wrote: 1.) Is it possible to get a list of the currently active issuing intermediate CA certificates of each CA root *currently* for consideration? It would be interesting to know which of these issue EV, both or non-EV. I *think* what you're looking for is in

Re: Comodo request for EV-enabling 3 existing roots

2008-03-16 Thread Frank Hecker
Nelson Bolyard wrote: Wow! I'd say that a CA that says You cannot rely on our certs for eCommerce should not be trusted for SSL by default in Mozilla products! Of course, that's a policy issue. Frank, what do you think? It is a policy issue, and we've had this discussion before. My point

Re: Comodo request for EV-enabling 3 existing roots

2008-03-16 Thread Frank Hecker
Eddy Nigg (StartCom Ltd.) wrote: This particular part DOES bother you, because wild card certificates aren't controllable in the same way as regular ones. A seemingly innocent domain name can become a tool for phishing. For example *.domain.com matches paypal.domain.com and

Re: Comodo request for EV-enabling 3 existing roots

2008-03-16 Thread Frank Hecker
Eddy Nigg (StartCom Ltd.) wrote: Ohoommm...it doesn't say not to rely for e-commerce, but not to rely AT ALL :-) It says, BECAUSE the certificates aren't meant to be for e-commerce parties can not rely on it - any party - for any purpose - do not qualify as a relying party. After looking

Re: Comodo request for EV-enabling 3 existing roots

2008-03-16 Thread Frank Hecker
Eddy Nigg (StartCom Ltd.) wrote: Rob Stradling: snip For the record, I can assure you that Comodo never issue DV and EV certs from the same Intermediate CA. In that case we need to update our papers then. For example I've received the following comment from Frank previously concerning

Re: Comodo request for EV-enabling 3 existing roots

2008-03-16 Thread Eddy Nigg (StartCom Ltd.)
Frank Hecker: Nelson Bolyard wrote: Wow! I'd say that a CA that says You cannot rely on our certs for eCommerce should not be trusted for SSL by default in Mozilla products! Of course, that's a policy issue. Frank, what do you think? It is a policy issue, and we've had this

Re: Comodo request for EV-enabling 3 existing roots

2008-03-16 Thread Eddy Nigg (StartCom Ltd.)
Frank Hecker: Eddy Nigg (StartCom Ltd.) wrote: This particular part DOES bother you, because wild card certificates aren't controllable in the same way as regular ones. A seemingly innocent domain name can become a tool for phishing. For example *.domain.com matches paypal.domain.com

Re: Comodo request for EV-enabling 3 existing roots

2008-03-16 Thread Eddy Nigg (StartCom Ltd.)
Frank Hecker: Eddy Nigg (StartCom Ltd.) wrote: 3.) Here a few questions in relation to the LiteSSL CPS: snip * 4.1 states that the enrollment process MAY include check for domain ownership. This means that the checks can be omitted? I think this is another case

Re: Comodo request for EV-enabling 3 existing roots

2008-03-16 Thread Eddy Nigg (StartCom Ltd.)
This is a revised version of my initial questions concerning the Comodo inclusion and upgrade requests. I've updated the sections which received a response from Frank and are solved from my point of view and added some more content where deemed necessary. 1.) The audit report for non-EV

Re: Comodo request for EV-enabling 3 existing roots

2008-03-16 Thread Eddy Nigg (StartCom Ltd.)
Eddy Nigg (StartCom Ltd.): 4.) Frank, this one is for you: Since most (if not all) CA root certificates of Comodo were inherited from the Netscape era and never were properly evaluated by an inclusion process and in light of the questions above, isn't a thorough review of this CA in place

Re: Comodo request for EV-enabling 3 existing roots

2008-03-15 Thread Eddy Nigg (StartCom Ltd.)
I have the following questions concerning the Comodo inclusion and upgrade requests. I'd be glad if the representative of Comodo could answer them directly. 1.) Is it possible to get a list of the currently active issuing intermediate CA certificates of each CA root *currently* for

Re: Comodo request for EV-enabling 3 existing roots

2008-03-15 Thread Eddy Nigg (StartCom Ltd.)
Nelson Bolyard: Well, presumably, the wildcard certs they issue are valid for multiple names within the domain that they validated only. The then rely on the subject party to use the certs only in the servers that they control in that domain. But that last statement is true of all CAs. All

Re: Comodo request for EV-enabling 3 existing roots

2008-03-15 Thread Eddy Nigg (StartCom Ltd.)
Nelson Bolyard: Eddy Nigg (StartCom Ltd.) wrote, On 2008-03-15 13:27 PDT: 3.) Here a few questions in relation to the LiteSSL CPS: * 1.12 states: Because LiteSSL and LiteSSL Wildcard certificates are not intended to be used in an e-commerce transaction or environment,

Re: Comodo request for EV-enabling 3 existing roots

2008-03-14 Thread Rob Stradling
Frank, thanks for your detailed explanation. I concur with everything you've said, but I'd just like to add a couple of additional comments (inline) in reply to Eddy... On Wednesday 12 March 2008, Frank Hecker wrote: Eddy Nigg (StartCom Ltd.) wrote: I working up my backlogat first I

Re: Comodo request for EV-enabling 3 existing roots

2008-03-14 Thread Eddy Nigg (StartCom Ltd.)
Frank Hecker: Eddy Nigg (StartCom Ltd.) wrote: I working up my backlogat first I thought this to be a good idea to split the request up, but on the other hand I wonder if it's really that good. Because we might see all requests in their context maybe...not sure. For some

Re: Comodo request for EV-enabling 3 existing roots

2008-03-14 Thread Eddy Nigg (StartCom Ltd.)
Rob Stradling: Frank, thanks for your detailed explanation. I concur with everything you've said, but I'd just like to add a couple of additional comments (inline) in reply to Eddy... Hi Rob, For the record, I can assure you that Comodo never issue DV and EV certs from the same

Re: Comodo request for EV-enabling 3 existing roots

2008-03-11 Thread Eddy Nigg (StartCom Ltd.)
Frank Hecker: Note again that this request specifically refers to the AddTrust External CA Root, UTN - DATACorp SGC, and UTN-USERFirst-Hardware roots referenced in comment #20 to bug 401587: I working up my backlogat first I thought this to be a good idea to split the request up, but

Comodo request for EV-enabling 3 existing roots

2008-03-10 Thread Frank Hecker
This is a followup to my previous message about Comodo's application to add a new EV root CA certificate. Comodo also has requested enabling three existing roots, AddTrust External CA Root, UTN - DATACorp SGC, and UTN-USERFirst-Hardware, for EV use, and also marking all three roots for SSL,