Justin Dolske wrote: > > That doesn't seem all too different from a vanilla-SSL site having an > XSS hole. Mhhh...if the site contains unencrypted content, then the browser notices it. If the parts are served by a different site (and certificate) there is no notice. However the issue here is about EV or non-EV (if there will be any distinction), which would make a difference. The same might be true if we'd make a distinctions between other different levels of verification methods. > I'm not sure how that could be explained to a user in a > meaningful way, either. I'd also be wary about building the impression > that content served under an EV cert is somehow more trustworthy, Hehe...we try to avoid the "trustworthy" word in connection with EV (and certs) ;-) > > Also, a more practical concern would be that if existing an existing SSL > site is already linking to SSL content under a different certificate, > then upgrading to an EV cert would break that. That might just be > education issue for purchasers of EV certs, though. From the site operator perspective I don't see any reason why a site shouldn't be served by the same certificate (or same level). If certificates are going to be mixed, then I think it should be downgraded to regular SSL, very similar to having the "broken lock" in the address bar. Like this site owners take care of correct installations.
Similar, if you have a valid certificate and mix content from a site with a self signed certificate, the browser complains. Guess something like that should happen here as well (i.e. downgrade). -- Regards Signer: Eddy Nigg, StartCom Ltd. Jabber: [EMAIL PROTECTED] Phone: +1.213.341.0390 _______________________________________________ dev-security mailing list dev-security@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security