On Thu, Jun 13, 2019 at 2:04 AM kirkhalloregon--- via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> Jeremy is correct - including strongly verified registered trademarks via
> extensions in EV certs is permitted (i.e., not forbidden) by BR Section
> 7.1.2.4.


It's unclear to me if Jeremy was taking a position versus sharing an
interpretation. I think it may be useful to frame it as an interpretation,
and then to provide support and evidence for that interpretation, and
whether or not you agree or disagree with other interpretations, and why.

[In an official capacity] As Google shared during the recent CA/Browser
Forum, our view is that such certificates violate Section 7.1.2.4,
especially as proposed to be validated here, and as such, are misissuance.
The proposed algorithm, as stated, does not meet the requirements of
7.1.2.4. Advocates in favor of finding an acceptable interpretation are
welcome to attempting refinements to the algorithm in order to satisfy the
requirements of the Baseline Requirements, but issuing as described will be
misissuance and will require a CA incident report to be filed. With respect
to logos in particular, our view is that there is a substantially higher
bar here that needs to be met to avoid misleading Relying Parties and to
provide the appropriate evidence of validation in an unambiguous fashion.

[In a personal capacity] As mentioned in the CA/Browser Forum, this topic
has been discussed in IETF [1], and the many obvious flaws in the proposal
have been pointed out by a number of members of that community. While
advocates for BIMI - which is proposed as applicable in the context of
S/MIME - have not meaningfully addressed or even acknowledged these
concerns, there is a broader consensus about the problems.

As noted, the use of trademarks and logos, particularly as described, has a
high likelihood of user confusion due to the necessary and inherent nature
of global trademark usage [2]. Much as we recognize the necessary value to
include the full jurisdiction information for incorporation - for example,
the use of "Franchise World Headquarters LLC [US]" is known and has been
shown to be misleading [3], even though expressly permitted. Among other
things, the reason for this is that the country alone is not sufficient to
disambiguate things, and requires the full jurisdiction display - which is
problematic with respect to usability and accessibility. If we apply this
principle with respect to logos, to avoid misleading relying parties, we
would need to show specific trademark registration numbers and ensure users
understood the appropriate distinction of trademark and wordmark
registries, and their limitations. If users were to rely on only parts of
this information, much as some have been mislead to do so with EV, we can
see situations such as Stripe, where users are mislead by the partial
information.

It's important to note that even the advocates within BIMI for the
inclusion of Logos have repeatedly made it clear that BIMI MUST NOT be used
to reduce user confusion or be interpreted as a security technologies,
because logos do not provide security benefits. To put it differently, the
loudest current advocates for inclusion of logos in certificates make it
clear that they will **mislead relying parties**, which is a position I
strongly I agree with, and which, as noted above, is also Google's official
position on this. BIMI advocates have made it clear that they do not
believe this can improve security or trust, and that its value is purely as
a marketing tool for brands, and that marketing value is useful for
coercive value into getting such brands to invest in actual technologies
that improve trust and safety (such as DKIM and DMARC). We must not lose
sight of that.

While I appreciate the attempt to resolve some of the past concerns around
the global legal framework with respect to trademarks, by only allowing
American companies to benefit, I think we can agree that form of cultural
imperialism is not well-placed in a global Internet. Similarly, as many
have highlighted, such an approach is fundamentally hostile to
accessibility goals. For example, even if the misguided and unsupported
assertion is that it improves security were true, then it fundamentally
only improves security for users without vision impairments, for example. I
can understand and appreciate arguments that some may be better than none,
but I suspect our time would be better spent looking for ways to improve
the security for all users, and on an Internet scale.

I think, within this community, we are all strongly in support of ways to
improve user security on the Web. As we all know and understand, the
foundation for the Web security model is the origin - the scheme, host, and
port. In the context of TLS, the role of certificates is to thus bind a
public key to an origin, so that users and user agents can be reliably
assured that they are talking to the correct origin, which is the basis of
Internet security and trust, ensuring no parties on the network can
intercept or manipulate content. While suggestions to add additional
information to certificates exist, it's important to note that there is no
technical reason to embed these within TLS certificates on a technological
level, and there's ample research and experience showing how doing so harms
users security and trust. The conflation of additional information, as
proposed, harms end users' security, by reducing the agility and increasing
the difficulty of the TLS ecosystem. Furthermore, such additional
information demonstrably does not improve users' security, as it does not
factor into the origin security model. Many alternative technologies exist
to improve user trust, which is important to separate from user security,
but it's equally important to note that the inclusion of such additional
organizational information within certificates has been rigorously and
repeatedly shown not to improve trust qualitatively or quantitatively.

While I can understand that some enterprises may not fully understand how
Web security or their users work, I think we should focus on delivering
solutions that are sound for users and user security. In particular, I
think solutions such as logos in certificates, are actively harmful to the
ecosystem as a whole. More importantly, however, I do not believe they are
acceptable to include in certificates.

[1] https://mailarchive.ietf.org/arch/browse/bimi/
[2]
http://whatculture.com/offbeat/10-massive-companies-unbelievably-similar-logos
[3] https://stripe.ian.sh/
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to