Frank Hecker:
> I'll let Eddy speak for himself, but I believe he's thinking of a 
> scenario where we (Mozilla) or the user (a power user, to be sure) would 
> decide that we trust CA Foo to issue EV certs, but we or the user think 
> they have unacceptable practices on non-EV certs (like issuing wildcard 
> DV certs, for example, which Eddy objects to). Then Eddy's idea is that 
> we (or the user) would configure Firefox et.al. to accept EV certs from 
> the hierarchy rooted at CA Foo's root, but to reject any other (i.e., 
> non-EV) certs issued in the same hierarchy.
>   
Bingo! Please note that it has nothing to do with wild card certificates 
or the current evaluation of Comodo. We simply could determine that CA 
Foo doesn't conform to the Mozilla Ca policy for non-EV certs, but their 
EV issuance are perfectly in line with the Mozilla CA policy (and the 
CAB EV criteria). In this case we should enable EV, and not allow non-EV 
certs for this root as you explain below correctly.
> I'm not proposing we do this, but consider the following: We have a new 
> "EV SSL trust bit" to accompany the existing SSL trust bit and the 
> existing EV policy OID mechanism. For a given end-entity SSL 
> certificate, we  do path processing and checking of any policy OIDs 
> present, and determine whether the cert is a valid EV cert or not. If 
> it's an EV cert then we check to verify that the EV SSL trust bit is 
> on., and reject it if not. If it's a non-EV cert then we check the 
> regular SSL trust bit instead.
>
> Frank
>
>   

-- 
Regards 
 
Signer:         Eddy Nigg, StartCom Ltd. <http://www.startcom.org>
Jabber:         [EMAIL PROTECTED] <xmpp:[EMAIL PROTECTED]>
Blog:   Join the Revolution! <http://blog.startcom.org>
Phone:          +1.213.341.0390
 

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to