Eddy Nigg (StartCom Ltd.) wrote:
Following discussions both in private and at the dev-security mailing list of Mozilla with various participants, we decided to put forward the following initial proposal of a framework for the handling of SSL/TLS and S/MIME digital certificates in Mozilla products.

Just to be clear: this is, at heart, a UI proposal, isn't it? You want the UI to differentiate between these four levels, rather than just the one level (as now) or two levels (as IE 7 does with EV)?

The Mozilla Corporation has just hired Jonathan Nightingale from IBM to work specifically on security UI for Firefox 3. I'm sure he will take your proposal on board.

Currently all digital certificates are treated in the same way in todays software. A certificate is considered as valid if:

1.) The certificate is found to be issued by a CA which is in the NSS certificate root store 2.) The certificate is not expired (Within valid boundaries of the from / to dates) 3.) The CN resp. emailAddress field matches the web site address, resp. email address

I'm sorry, but I can't work it out - what does the abbreviation "resp." stand for?

We propose to define four different validation levels or classes according to which existing and future verification procedures of CAs can be treated.

You explain the levels well in terms of the validation performed. However, as this is at heart a UI proposal, how do you suggest (in terms of concepts, rather than in terms of pixels) these levels should be presented to the user?

For example, my mother is considering using her credit card at a shop, and the UI indicates (in some way) that it is level 2 secured. Should she shop there?

I've visited a site that I think is my bank, and it has a level 4 certificate. Should I be concerned, given that level 4 is normally for individuals? How concerned?

The levels could be according to the list below, however it's only a suggestion and should be adjusted and refined after thorough discussion by the community:

Why four levels, rather than six? Or two? Or ten?

The identity is validated by various means, such as verification of the identity via scanned, photocopied or photographed photo ID documents (passport, identity card, driving license) and company registry, which is then further verified by a lookup at a third party source, such as phone directories and phone call or sending of a registered mail to the address found in the documents provided by the subscriber. This kind of verification is not done in person. Ownership of the domain name, resp. email account is performed according to Level 1. The certificate must state the subscriber name/organization name, locality, state (where applicable) and country.

So for individuals, the certificate contains address information which is unverified?

*Implementation:*

The Mozilla CA policy will be extended to include the above described definitions. Levels can be assigned by the CA within the subscriber certificate with a specially defined OID by using for example the Mozilla OID space. In this proposal we suggest to leave the definition of levels to the CA, as in any case the CA defines its verification procedures in its own policies.

How does your proposal ensure that the CAs stick to what they have promised - i.e. that the OID they put in the certificates corresponds to the level of validation done? Do we just have to trust them?

Gerv
_______________________________________________
dev-security mailing list
dev-security@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security

Reply via email to