Re: ISSUE-97: Should logotypes be tied to EV certificates?[Techniques]

For EV, like any other cert infrastructure, the cert parsing vendor supplies the roots. So it's Windows (not IE7), OSX, and the Mozilla certificate store (NSS). Similarly, it's up to those groups to monitor and maintain their root DBs. What EV does, however, is gives concrete criteria for removing/adding a root, which means those groups can point to standardized reasons, which both simplifiles the vetting process and also removes the fear of lawsuits when removing a CA. 

The VeriSign plugin was a proof of concept built and maintained by VeriSign, not meant to provide anything beyond support for VeriSign EV, and not at all associated with development of Firefox 3. Johnathan Nightingale is co-ordinating the EV support for Firefox 3 (see http://wiki.mozilla.org/Firefox3 for more detailed information) with our development team providing the UI and the NSS development team providing the PKI changes required. 

Sorry to be late to respond, here. 

cheers,
mike 
-----Original Message-----
From: <michael.mccormick@wellsfargo.com>

Date: Tue, 14 Aug 2007 14:26:01 
To:<public-wsc-wg@w3.org>
Cc:<Peri.Drucker@wellsfargo.com>, <Pete.Palmer@wellsfargo.com>,       <peltond@wellsfargo.com>
Subject: RE: ISSUE-97: Should logotypes be tied to EV 	certificates?[Techniques]



Some illuminating comments below from my colleague in the CAB forum Peri
Drucker.
(Responders please reply-to-all if you want Peri to see your email.
She's not a WSC subscriber.)

-----Original Message-----
From: Drucker, Peri 
Sent: Monday, August 13, 2007 6:30 PM
To: Stephen Farrell; McCormick, Mike; public-wsc-wg@w3.org; Palmer,
Pete; Pelton, Douglas S.
Subject: RE: ISSUE-97: Should logotypes be tied to EV
certificates?[Techniques]

Hi All,
 I will try to give some additional clarification on this.  But caveats
in that I am not a technologist.

The way that EV is supposed to work (comment about the Mozilla plug-in
follows) is that the Root is "marked" as EV in each browser.  That is,
Microsoft is testing and approving each root (and the processes that the
CA uses to issue) that it is including in the IE root store as an EV
root.  The CA will also designate an EV OID that the browser will put
into whatever it puts it into to try to treat the SSL cert as EV (and
then check to see if the root is an accepted Root to complete the
"processing").  The thought is that each browser will pretty much
control how they accept each Root that is claiming to be an EV root.
And then use whatever visual cue they determine to indicate that the
Cert is issued in accord with the EV guidelines. That is, that it is an
WCSSL cert, and not a standard SSL cert.

The Verisign plug-in is pretty well scorned and decried by all the other
CA's in the CAB forum.  It is pretty much a total subversion of how it
is supposed to work.  Mozilla apparently doesn't care all that much on
what happens in a Mozilla plug-in.  In this case, it has the root and
OID (I am guessing) hard coded into the plug in so that when a site has
an EVSSL cert, the URL bar turns green to mimic the IE7 behavior.  Our
understanding is that the Mozilla interface will not actually look like
this, whenever they finally release it.  We all feel that this pretty
much destroys the security concept, but Verisign won't back down on
this.  

I hope that this is helpful.  If you have any specific questions, I will
be happy to find someone who actually knows the answers to get back to
you.

So, to directly respond to the thread below, the browsers are supposed
to be the root police.

Thanks,
Peri

-----Original Message-----
From: Stephen Farrell [mailto:stephen.farrell@cs.tcd.ie]
Sent: Monday, August 13, 2007 7:48 AM
To: McCormick, Mike; public-wsc-wg@w3.org; Palmer, Pete; Pelton, Douglas
S.; Drucker, Peri
Subject: Re: ISSUE-97: Should logotypes be tied to EV
certificates?[Techniques]


Hi Thomas,

Thomas Roessler wrote:
> There needs to be some definition of what "the kind of certificate
> that triggers EV-like behavior" actually is, and that's what I think
> is in scope.  Preferably, that definition isn't more than two or
> three sentences, with a reference or two.
> 
> I don't really care what label we stick to these things, and I was
> not suggesting that we start writing up certification practices.

I'm a bit confused here. Isn't it a requirement for EV-like
behaviour that the root-cert/trust-anchor is the thing that
is marked? Otherwise, any old CA could insert the OID without
having signed up to anything.

Or, is there a presumption that there'll be a root-police
that'd catch and react to such (probably bogus) assertions?

If I'm right, that means that essentially the EV-like flag
is set when the TA is installed (which may be via some putative
TA protocol, or more likely for now, via browser s/w update).
In that case, there's no need for an X.509 OID.

If I'm wrong (always likely:-), then maybe someone could
explain how EV-certs differ from the old server-gated
crypto tricks browsers used do. Without having delved into
CAB forum docs. they seem more or less the same to me from
this perspective.

S.

Received on Tuesday, 14 August 2007 22:44:48 UTC