One of the things that occurred in the early days of phishing was the realisation that the browser (and its manufacturer) was ill-suited to dealing with the threat, even though it was the primary security agent (c.f., from the SSL promise to defeat the MITM). One solution I pushed a lot was plugin security -- adding the authentication or authorisation logic into plugins so that different techniques could experiment and evolve.
In hindsight, this will appear obvious. 99% of the client-side security work involved plugins -- Trustbar, Netcraft, Petname, Ping's design, and many others. But it required a mindshift from "this is a demo" to "this is where it should be." This became poignant in the discussions of what to do about EV -- if Mozilla adopted EV into the browser, that opened a huge can of worms. Hence, putting EV in the plugin was the logical conclusion.
Now it seems to have happened:
Verisign Inc. has [...snip] released a Firefox plugin that will show the same type of green address bar that is displayed by Internet Explorer 7 when it lands on certain highly trusted Web sites that use Extended Validation Secure Sockets Layer (EV SSL) certificates.Before companies like Verisign will issue an EV SSL certificate, they take extra steps to make sure that it is going to a legitimate organization. For example, they will make sure that the business in question is registered with local authorities, has a real address, and actually has control over the Web domain in question.
Earlier, I suggested that understanding EV in terms of security is futile. More, look to structural issues:
Verisign's Tim Callan says that more than 500 Web sites, including sites run by eBay's PayPal division and ING Group, have now completed EV SSL certification. Nearly 90 percent of them are certified by Verisign, said Callan, a director of product marketing with the company's SSL group.
That was the plan. Consider how much value there is in the other CAs scrabbling around the crumbs of 10% of the market, versus the costs of the EV programme. Even more to the point:
That's an important point because Verisign's Firefox plugin doesn't identify sites that are certified by its competitors. Callan said it would have been too much work to maintain a list of legitimate EV SSL providers. "At that point, we're creating a whole new simultaneous real-time checking system," he said. "We were willing to invest in this one-off code development, but we didn't want to inherit this legacy of constantly maintaining this service, especially because this is a stop-gap measure. At the end of the year, this will be built into Firefox proper."
Can you say barriers to entry ? Once a site has been EV'd by Verisign, it is unlikely to shift, and that's what they wanted. If that doesn't work, ask Callan to say OCSP, which is written large into the EV draft (!) specification ...
Leaving aside the industry structural games, let's get back to PKI. There is a silver lining: EV means that it now becomes Verisign's responsibility to authenticate these sites to the user.
The *only* way to do that is in a way that is clearly expressed as "by Verisign" and the plugin makes this clear. If the browser takes on that responsibility, it breaks the statement, and therein lies the future breach of EV and the past failure of the security model.
Since long ago, we have hammered on one of the failures of the SSL server certificate market: "all CAs are alike." They were not, are not, and cannot be, and why the developers hung on to this blatantly and obviously false myth was mystifying to me.
Verisign has now broken it, and broken it good. For that we should all be thankful, and in time, we will see a differentiated CA market, which allows new products and new security postures to meet the divergent needs of users.
Posted by iang at May 23, 2007 10:13 AM | TrackBackQuite, the entire purpose of EV was to establish accountability. Some folk thought that only meant accountability for the certificate subject. If people paid attention to what I said they would have heard me talk about accountability for the certificate subject in every single talk I have ever given on either EV or Secure Letterhead.
And I have demonstrated the Secure Letterhead version of the plug in at numerous public and private venues over the past year. To claim that it was a shock that VeriSign would release code it had written a year earlier is somewhat strange.
Posted by: PHB at May 23, 2007 10:00 AMOK the above is nonsense,
I talked about accountability for the certificate issuer in every talk. The idea was to hold every party accountable, not just the subject.
Posted by: PHB at May 23, 2007 10:20 AMThe existing PKI EV model there is a major impendence mismatch between the User and the Service provider .This study gives a sound insights of User profiling www.tml.tkk.fi/~kk/p601-wu.pdf and this research
http://www.usablesecurity.org/papers/jackson.pdf which concluded saying
"Users fail to continuously check the browser’s security
indicators, since maintaining security is not the user’s
primary goal."
The down side of these tool bars is that domination of the big players in the CA market.
Posted by: MitmWatcher at May 23, 2007 11:55 AMor make it obsolete, redundant and superfluous
recent thread/posts in crypto mailing list
http://www.garlic.com/~lynn/aadsm27.htm#14 307 digit number factored
http://www.garlic.com/~lynn/aadsm27.htm#15 307 digit number factored
http://www.garlic.com/~lynn/aadsm27.htm#16 dnssec?
http://www.garlic.com/~lynn/aadsm27.htm#17 dnssec?
including reference to brand new RFC for fixing spam and phishing (using DNS to serve up public keys)
New antiphishing, antispam specifications unveiled
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9020940
IETF approves new weapon to fight spam, phish
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1256125,00.html
and for slight drift ... sort of DNS related reference more than a decade before DNS
http://www.garlic.com/~lynn/2007k.html#33
and old email (also predating DNS) proposing online, real-time public key serving
http://www.garlic.com/~lynn/2006w.html#email810515
in this post
http://www.garlic.com/~lynn/2006w.html#12