- From: Mike Beltzner <beltzner@mozilla.com>
- Date: Tue, 14 Aug 2007 22:43:07 +0000
- To: michael.mccormick@wellsfargo.com, "public-wsc-wg" <public-wsc-wg@w3.org>
- Cc: Peri.Drucker@wellsfargo.com, Pete.Palmer@wellsfargo.com, peltond@wellsfargo.com
For EV, like any other cert infrastructure, the cert parsing vendor supplies the roots. So it's Windows (not IE7), OSX, and the Mozilla certificate store (NSS). Similarly, it's up to those groups to monitor and maintain their root DBs. What EV does, however, is gives concrete criteria for removing/adding a root, which means those groups can point to standardized reasons, which both simplifiles the vetting process and also removes the fear of lawsuits when removing a CA. The VeriSign plugin was a proof of concept built and maintained by VeriSign, not meant to provide anything beyond support for VeriSign EV, and not at all associated with development of Firefox 3. Johnathan Nightingale is co-ordinating the EV support for Firefox 3 (see http://wiki.mozilla.org/Firefox3 for more detailed information) with our development team providing the UI and the NSS development team providing the PKI changes required. Sorry to be late to respond, here. cheers, mike -----Original Message----- From: <michael.mccormick@wellsfargo.com> Date: Tue, 14 Aug 2007 14:26:01 To:<public-wsc-wg@w3.org> Cc:<Peri.Drucker@wellsfargo.com>, <Pete.Palmer@wellsfargo.com>, <peltond@wellsfargo.com> Subject: RE: ISSUE-97: Should logotypes be tied to EV certificates?[Techniques] Some illuminating comments below from my colleague in the CAB forum Peri Drucker. (Responders please reply-to-all if you want Peri to see your email. She's not a WSC subscriber.) -----Original Message----- From: Drucker, Peri Sent: Monday, August 13, 2007 6:30 PM To: Stephen Farrell; McCormick, Mike; public-wsc-wg@w3.org; Palmer, Pete; Pelton, Douglas S. Subject: RE: ISSUE-97: Should logotypes be tied to EV certificates?[Techniques] Hi All, I will try to give some additional clarification on this. But caveats in that I am not a technologist. The way that EV is supposed to work (comment about the Mozilla plug-in follows) is that the Root is "marked" as EV in each browser. That is, Microsoft is testing and approving each root (and the processes that the CA uses to issue) that it is including in the IE root store as an EV root. The CA will also designate an EV OID that the browser will put into whatever it puts it into to try to treat the SSL cert as EV (and then check to see if the root is an accepted Root to complete the "processing"). The thought is that each browser will pretty much control how they accept each Root that is claiming to be an EV root. And then use whatever visual cue they determine to indicate that the Cert is issued in accord with the EV guidelines. That is, that it is an WCSSL cert, and not a standard SSL cert. The Verisign plug-in is pretty well scorned and decried by all the other CA's in the CAB forum. It is pretty much a total subversion of how it is supposed to work. Mozilla apparently doesn't care all that much on what happens in a Mozilla plug-in. In this case, it has the root and OID (I am guessing) hard coded into the plug in so that when a site has an EVSSL cert, the URL bar turns green to mimic the IE7 behavior. Our understanding is that the Mozilla interface will not actually look like this, whenever they finally release it. We all feel that this pretty much destroys the security concept, but Verisign won't back down on this. I hope that this is helpful. If you have any specific questions, I will be happy to find someone who actually knows the answers to get back to you. So, to directly respond to the thread below, the browsers are supposed to be the root police. Thanks, Peri -----Original Message----- From: Stephen Farrell [mailto:stephen.farrell@cs.tcd.ie] Sent: Monday, August 13, 2007 7:48 AM To: McCormick, Mike; public-wsc-wg@w3.org; Palmer, Pete; Pelton, Douglas S.; Drucker, Peri Subject: Re: ISSUE-97: Should logotypes be tied to EV certificates?[Techniques] Hi Thomas, Thomas Roessler wrote: > There needs to be some definition of what "the kind of certificate > that triggers EV-like behavior" actually is, and that's what I think > is in scope. Preferably, that definition isn't more than two or > three sentences, with a reference or two. > > I don't really care what label we stick to these things, and I was > not suggesting that we start writing up certification practices. I'm a bit confused here. Isn't it a requirement for EV-like behaviour that the root-cert/trust-anchor is the thing that is marked? Otherwise, any old CA could insert the OID without having signed up to anything. Or, is there a presumption that there'll be a root-police that'd catch and react to such (probably bogus) assertions? If I'm right, that means that essentially the EV-like flag is set when the TA is installed (which may be via some putative TA protocol, or more likely for now, via browser s/w update). In that case, there's no need for an X.509 OID. If I'm wrong (always likely:-), then maybe someone could explain how EV-certs differ from the old server-gated crypto tricks browsers used do. Without having delved into CAB forum docs. they seem more or less the same to me from this perspective. S.
Received on Tuesday, 14 August 2007 22:44:48 UTC