Followup-To m.d.security

Basics: SSL certificates are supposed to ensure the identity of the one you talk to. One reason is to make the crypto meaningful (a MITM attack is still possible with SSL, if the middleman uses his own cert and the client accepts it as real). The other reason is to connect online business to real world business - if you buy at a store, and give your credit card data, you want to know it's not going to Russia, but to a real company, and that you can sue them, if they don't deliver. Note that SSL certificates say nothing about the trustworthiness or similar, just verify identity.

Problem: GeoTrust and a few other companies started selling cheap certificates which are issued automatically (no human involved) and only check whether the applicant has control over the domain (or email address) that the certificate is to be issued for. These are called "domain control verification" or DV certs. The "holder's name" field in the certificate does not get verified *at all* and is thus useless with these certs - it either equals domain name or can be simply lying, despite being signed by the CA. Given that, these new cert types pose a significant problem to business on the web, and make phisher's life easy (if phishers even bother with SSL or certs).

EV solution by the "CA/Browser Forum": A bunch of CAs came up with a proposal of a new cert standard. Mainly, it mandates the checks that the CA has to do to verify the certificate holder. They are intended to be sold to high-profile sites like eBay.com, and cost $1000/year upwards. So, one obvious reason for EV is that CAs want to charge more money from the customers that make a lot of money on the web. It does increase the level of vetting substantially, and it's definitely a huge improvement over status quo. So, browser and browser users also gain from it. For Microsoft, it's actually part of an anti-phishing initiate, MSIE was supposed to make the URLbar green for some sites, and EV was one mandatory criteria for that (there are other criteria as well, e.g. anti-phishing blacklists etc.).

The "CA/Browser Forum" consists out of all major browser vendors, including Microsoft, Mozilla Foundation, KDE (Konqueror), and Opera (Apple is missing). Most of the big Cas are on it as well. The current guidelines are at <http://www.cabforum.org/EV_Certificate_Guidelines.pdf>. It's 70-100 pages in lawyer language.


My comments:

Don't be followed by the language and length, though. "Qualified Independent Information Sources" could probably simply be a phonebook, and a "site audit" is a clerk looking at the sign on the street and peeking in the lobby. That's not what *I* would call an "audit".

The "phone number verification" happens by calling the number and seeing who answers (Me at 0900-123456: "Microsoft, how can I help you?") (16(b)(2)(A)+(C)). So, I could apply as Microsoft, supply them my number, answer as Microsoft, and that's the verification. To top it, this number can then be used to verify the signature, with "a response from someone who identifies themselves as such person confirming that he/she did sign the applicable document". Maybe I have overlooked something, but I could give them the address of eBay, or my address with an eBay sign, and *my* phone number, sign the doc, and then when they call me, greet with "Ben Bucksch of eBay speaking" and confirm that I am a "Contract Signer" who is allowed to represent eBay and I did indeed sign the doc. huh?

This whole thing has lots of loopholes. Given the experience and market pressures, we have to assume that the CAs use the absolute minimum and cheapest standards that still pass the guidelines, and they'll automate as much as possible.

Also, there are really heavy statements in there, e.g. the liability (37(a); see also <https://financialcryptography.com/mt/archives/000862.html>: If the CA followes the EV guidelines and the user gets ripped off, the CA is not liable at all - be it due to hole in the guidelines or other reasons. Even worse, though, if the CA *fails* to follow the guidelines, and the user gets ripped of *because of that*, the liability of the CA is limited to $2000 - not even per case, per cert/CA customer. Even a single normal phishing incident is easily higher than that. That's particularly sobering considering that a cert *costs* $1000-2000 - that means I could set up a CA and sell certs to everybody including the mafia and not verify certs *at all*, and even pay all liability (per EV guideline doc) and still make a profit for my few valid customers. Sorry, how does that help users *at all*? IMHO, this should be backed by $10-100 million insurances - per incident. Even an average $100 UPS comes with $100,000 insurances.


My alternative proposal:
(most important part of posting)

We need to connect online business with real world business. I want to have somebody to sue - who won't vanish when poked at. And I want that the info in the cert is actually correct.

I really thing that every CA-issued certificate must be verified using the following steps:

  1. Using the official state register of companies to verify company
     name and representing natural person
  2. Acquiring written signature (original) of that person
  3. Checking the signature against the ID card / passport of that person

This, and pretty much only this, will ensure that the card holder really is who he claims to be, in real life, as seen by the government and courts. Thus, before EV, I assumed that the above is performed for the $100/year certs.

It should be cheap enough, *esp.* so for $1000/year EV certs. In Germany, if you want to mail-rent (Netflix-alike) 18+ movies (including Van Helsing), you have to pass harder verification steps than EV. You actually have to walk to the post office, which has a service to verify your identity card and send the result back to the requester. It costs 10 Eur, once. In fact, my grocery store not only asks for my signature for every purchase, they even double-check the signature against my ID card every time! (Apart from the people who already know me.) If a grocery store clerk can do it for a $10 purchase, a CA can do it for a $1000/year cert which is backing up $ x00 million business for tens of thousands of users.

People have said that not every US citizen has a passport. But they can get one. This is about ensuring something to users, after all.

Note that I think that natural persons and small companies should also be able to get an EV cert, from the start.


UI proposal:

We could e.g. then show the cert holder name next to the domain name in the urlbar, so that the real world name is a trust root, in addition to the domain.

That would be something most users can more easily relate to than the domain name system, which is logical, but literally backwards. However, the real world company name may then be just as much a phishing target as the domain name is now. We'll not only have international character sets (compare IDN), which we can't easily escape from as we did with domains, but there'll be another class of attack of similar seeming company names, e.g. is Shell Books a subsidary of Shell Oil Company or not or is "e Bay Auctioners, Inc." a part of eBay?


UI: Green urlbar, as maybe done by MSIE:

http://it.slashdot.org/article.pl?sid=07/01/26/1325228
/"Stanford University and Microsoft Research have published a study that claims that the new Extended Validation SSL Certificates in IE7 are ineffective <http://www.usablesecurity.org/papers/jackson.pdf> (PDF). The study, based on user testing, found that EV certificates don't improve users' ability to detect attacks, that the interface can be spoofed, and that training users actually decreases their ability to detect attacks. The study will be presented at Usable Security 2007 next month, which is a little late now that the new certificates are already being issued. <http://it.slashdot.org/article.pl?sid=07/01/13/1615213&tid=172>"/

Study done in Sept 2006 and I found the setup (training etc.) highly questionable, but the only conclusion one can draw is that the green bar increased people's trust in websites - ironically real and fraudulent alike! (no matter if green bar or not)

So, if one can believe the study, the green bar is a really bad idea.

--
When responding via mail, please remove the ".news" from the email address.

_______________________________________________
dev-security mailing list
dev-security@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security

Reply via email to