Gervase Markham wrote:
Some comments on your post. Please understand that I'm not being
defensive about EV, or claiming that it's perfect - I just want to
test your arguments a little bit.
OK. My thought is that we don't have many chances to push things like
that and have users consider it. If we make them aware of it, it better
be bulletproof, or we should not bother them with it, just treat it as
little better SSL cert, no special treatment.
Right. But how many phishers have an office with a street sign saying
"eBay" and a lobby?
...
Except you can't, because there won't be any information sources which
confirm that your number belongs to Microsoft. Because it doesn't.
...
I don't think any information source would confirm that your address
belonged to eBay.
Reliable sources like the phonebook or a random commercial database?
You are, and the CAs writing the guidelines are, not assuming that the
procedures are specifically gamed, things so arranged that the malicious
applicant would pass them, including renting a fake office with sign,
putting up fake phone numbers and listening them for a few days or
weeks, or specifically targetting the commercial database(s) that the CA
uses to get your bad info in there. Esp. the latter is probably
trivially easy, because the commercial databases are not security shops,
just providing contact info for initiating business. Esp. so in the US,
from what I've heard.
Whole subject of social engineering. Compare how easy it was (and still
is!) to get a random person's phone records from their own telco, if you
simply call the telco and claim to be police, father, whatever.
Similarly, I can just call my telco (from any number) and change the
bank account, billing name (!) and address, almost any data.
The CAs and guidelines (and you) don't take social engineering and
similar into account. Big error. That's what I'm pointing out.
That's why there needs to be something that can't be faked, or has a
very well-known and established risk (even when considering fraud), e.g.
a hand-written signature that has been checked.
To top it, this number can then be used to verify the signature, with
"a response from someone who identifies themselves as such person
confirming that he/she did sign the applicable document".
I think you misunderstand the purpose of this step. It's to make sure
that a rogue employee doesn't apply for a certificate using the name
of someone else at the company who would be authorised to make the
application.
I don't know how you read that out "confirming that he/she did sign the
applicable document".
If the CA followes the EV guidelines and the user gets ripped off,
the CA is not liable at all - be it due to hole in the guidelines or
other reasons.
One example: Let's say the guideline requires checking the signature.
The CA has a record saying that they checked it. But the signature was
still faked, and quite obviously so. Who's to blame? With this rule: the
browser user. Although clearly the CA is to blame, and needs to take
responsibility for its own failure.
Thus: the CA needs to take liability, if they issue bad certs, no matter
which procedure they followed, no matter the situation. Then they
actually have financial incentive to check thoroughly, instead of
checking as little as possible to sell as much as possible.
So if, for example, someone gets an EV cert and uses it for phishing,
we can analyse how they did it and tighten up the guidelines to close
the loophole.
You think this will happen, and implemented, timely (days to weeks, not
months)? I don't think so.
I really thing that every CA-issued certificate must be verified
using the following steps:
Just to check: you mean _every_ CA-issued certificate?
Yes. Or rather, every CA customer. The CEO can delegate to one or more
managers or admins, and that admin can then get a digital signature, and
with that the admin can create new certs on the fly automatically
without any paperwork, issued immediately.
Say we wrote our own guidelines, and said to all the CAs "unless every
cert you issue meets these, we'll yank your root". Who do you think
would blink first?
Given that nothing breaks anymore, we have no need to blink.
And I don't think we can put up US banks as good example for users
either, so we don't even need to care about them being "approved".
1. Using the official state register of companies to verify company
name and representing natural person
What about issuing certs to people or organisations which aren't
companies?
See below. Natural persons have a passport and can get a cert in their
own name.
Organisations which have no legal body or no money backing won't get
one, because they can't uphold "when poked at". If this is about
organisations like open source projects, or tiny business like mine, the
project leader would need to get one in his own name. FWIW, I am legally
required to publish my name, address and phone number on my website
anyways (German law for professional publishing, for accountability -
no, private blogs and co don't fall under that).
What about countries where there is no such register, or it's unreliable?
Example?
I guess we'd have to see how things work there, how they can be made
reliably based on their customs. In a few countries, Africa maybe, this
may not be possible, but we don't want the Nigerian scammer to get an EV
cert, do we?
2. Acquiring written signature (original) of that person
3. Checking the signature against the ID card / passport of that
person
One draft of a precursor document to the EV guidelines included a
requirement for a site visit, and that you had to meet up with the
applicant and take a photo of them with their government issued ID,
and record the number thereon. I still think this was a great idea,
but unfortunately I was not in a majority.
Right!
Well, who cares about majority when we're facing 25 CAs? You said we
effectively have a veto right, so...
why blink? :-)
:-) still smiling, not blinking.
This, and pretty much only this, will ensure that the card holder
really is who he claims to be, in real life, as seen by the
government and courts. Thus, before EV, I assumed that the above is
performed for the $100/year certs.
Really? There's no way any CA could make money doing this at $100 a cert.
Nonsense. Sorry, that's just CA margin-improving nonsense.
First, they make $100 (per year, per cert) for that action (once, per
customer). And it's $1000 now with EV.
As I said, exactly this is offered as service in Germany for 10 Eur,
one-time fee. If they can make a site visit, they can also look at a
personal ID card and check a signature. My grocery store does it! What
gives?
In the US, there are networks of companies which will do site visits
and this sort of verification for you, but in other countries, there
aren't. Such a visit would cost several hundred dollars to have performed.
Nobody's forcing them to have a flat world-wide fee. In fact, lots of
things will be different in many countries, out of necessity, even with
EV as-is.
Note that I think that natural persons and small companies should
also be able to get an EV cert, from the start.
But then how can your step 1), above, work?
Well, it would of course not be necessary to associate applying company
with a natural person, because we already have a natural person with
signature and papers.
We could e.g. then show the cert holder name next to the domain name
in the urlbar, so that the real world name is a trust root, in
addition to the domain.
Their legal business name? Or their "trading as" name? Or the real
name of the person at the company who made the application?
I don't know. I'd say the legal business name - "trading as" would be a
different field.
I'm not familiar with the differentiation, because it does not exist in
Germany, or rather is not important. I am 'trading as' "Beonex", but I
am legally "Ben Bucksch", and I *have* to say the latter in any official
communication. Beonex is just a nickname. In my case, the cert for
Beonex would need to say "Ben Bucksch", because that's the only legal
entity that exists. You cannot sue Beonex, only me.
Thanks,
Ben
_______________________________________________
dev-security mailing list
dev-security@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security