On Mon, October 27, 2014 12:14 am, John Nagle wrote:
>  (Resend, after error "The message could not be delivered to the
>  following recipient:")
>  Here's a nice example of Mozilla not fully understanding Organization
>  information in certificates: "www.facebook.com".
>
>  Firefox says, for "https://www.facebook.com";,
>
>  "This web site does not supply ownership information".
>
>  But, in fact, not only does it supply ownership information
>  (the Subject contains O, L, ST, and C), DigiCert, which generated
>  the certificate, promises in their CPS that the info is valid.  DigiCert
>  attached Policy OID 2.16.840.1.114412.1.1, promising
>  valid organization data.
>
>  Remember, there are three levels of certs now: DV, OV, and EV.
>  The CA/Browser Forum has established (finally) standard policy
>  OIDs for them, but these are still optional. They are
>
>  OID 2.23.140.1.2.1 - DV (domain validated only)
>  OID 2.23.140.1.2.2 - OV (organization validated)
>  OID 2.23.140.1.1   - EV (extended validation)
>
>  These standard Policy OIDs are relatively new, though, and not
>  widely used yet.
>
>  Originally, each CA had its very own EV Policy OID.
>  (There's a list in Wikipedia, painfully put together.)
>
>  Without much notice, the same thing was done for
>  OV certs. DigiCert's Certification Practice Statement
>  (https://www.digicert.com/docs/cps/DigiCert_CP_v406-May-14-2014.pdf)
>  lists the values DigiCert uses.
>
>  OID 2.16.840.1.114412.1.2  - DV (Domain‐Validated SSL)
>  OID 2.16.840.1.114412.1.1 -  OV (Organizationally‐Validated SSL)
>  OID 2.16.840.1.11441 -       EV (Extended Validation SSL Certificates)
>
>  These are in wide use; I'm finding lots of them in the certificate
>  dumps.  (Does anyone have the full list?  Is there any reason not
>  to make it public?  The info is in the Certification Practice
>  Statements of each CA.)
>
>  Firefox understands the EV values for each CA, but not, apparently,
>  the OV values.  That, I think, is a bug.  One which affects
>  high-profile sites.
>
>                       John Nagle
>                       SiteTruth
>  _______________________________________________
>  dev-security-policy mailing list
>  dev-security-policy@lists.mozilla.org
>  https://lists.mozilla.org/listinfo/dev-security-policy
>

John,

I'm sorry, but you're overstating the value of OV, which is not something
that any browser recognizes, nor is it, as you suggest, something
standardized by the CA/Browser Forum.

The CA/Browser Forum does state how the O field should contain, *IF*
present, along with several other *optional* fields, but these are neither
strong requirements nor are they mandatory in the same sense that EV is.

Mozilla's position on OV is well documented - the "bug" you described is
INVALID WONTFIX. You know this, because you've participated in past
discussions -
https://groups.google.com/d/msg/mozilla.dev.security.policy/al0GUnprZuI/3e28Iv08WdAJ
, but it's also been discussed at
https://groups.google.com/d/msg/mozilla.dev.security.policy/al0GUnprZuI/3e28Iv08WdAJ
,
https://groups.google.com/d/msg/mozilla.dev.security.policy/-mCAK5zfhFQ/hEOQK-ubGRcJ
. This was also affirmed again by Mozilla (and other browsers) during the
most recent China CA/Browser Forum F2F (unfortunately, the minutes have
not been posted yet, AFAICT).

I would say Mozilla understands very well what the organization
information is, how it's vetted, and why that information is not
meaningfully worthwhile to communicate to users as an effective security
measure. In a world where "EV" provides no positive technical security
benefits (due to the same origin policy), it would be a pretty nasty
mistake to think "OV" (which does not formally exist as a consistent
standard as it does either EV or DV) provides some actionable value.

I suspect that you will continue to have issue with certain policy
decisions, as it seems you are opposed to DV. That's unfortunate, because
DV is the single-largest driver for SSL/TLS, and rightfully so. That is, a
certificate exists as a binding between a key and a domain. Whether that
domain is operated by a CDN such as CloudFlare, a hosting service such as
AWS, Azure, or Appspot, a user with a shared server, a user with a VPS, or
a user with a dedicated server is irrelevant, and neither misleading nor
wrong for the browser to express a secure icon regardless.

Multi-san certs are perfectly compliant with the BRs, as are wildcard
certs, and both are extremely important to encouraging the adoption of
TLS.

If you're trusting certificates to assert information about either the
identity of the entity behind the key or that the CA has done due
diligence, well, you're using certificates for something they're neither
intended for nor well suited for, so you'll have a bad time.

Cheers,
Ryan

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to