Open Bug 470926 Opened 16 years ago Updated 2 years ago

Implement more stringent EV certificate checks in PSM

Categories

(Core :: Security: PSM, defect, P3)

defect

Tracking

()

People

(Reporter: mozbgz, Unassigned)

References

(Depends on 1 open bug)

Details

(Whiteboard: [psm-padlock][psm-backlog])

Attachments

(1 file)

(as requested by Gavin in bug 455334 comment 30)

Currently, PSM only validates the policy OID when determining whether a server cert should be shown with the EV UI indicators (STATE_IDENTITY_EV_TOPLEVEL). Bug 466488, however, has demonstrated that CAs might also issue certs which include an EV policy OID but do not meet mandatory requirements (such as a countryName attribute in the subject DN).

This basically means that in addition to policy validation, PSM should also enforce other mandatory EV requirements before treating a cert as EV - otherwise that cert should be downgraded to STATE_SECURE_HIGH. In particular, the following requirements are relevant:

- subject naming (EV Guidelines section 6)

- maximum validity period (EV Guidelines section 8)

- other technical requirements (EV Guidelines appendix A and B),
  such as minimum key sizes and required extensions

nsNSSCertificate::GetIsExtendedValidation() - in nsIdentityChecking.cpp - seems like the most appropriate place for adding these checks. Many requirements apply to end-entity certificates, but those for CA certs (root or issuing CAs) also need to be considered.
Thanks for filing this, Kaspar.
Johnathan, 
Please impart to this bug a ranking of its severity with respect to FF 3.5.
This has no patch, does not represent a regression (but rather, increased vigilance) and while it would be very nice to have, it should not block the release of FF3.5.  The best way to make progress here, I believe, is to get a patch together and reviewed for mozilla-central, at which point we can request approval for FF3.5/Gecko1.9.1.  There is still time to do that, but I think this is an opportunistic win ("if a patch is available, let's take it"), not a blocker ("someone must produce a patch before we ship 3.5").  We are sufficiently far along in the 3.5 release cycle that no mid-way priorities exist.  Please let me know if you disagree.
Johnathan, 
Thank you for your answer. 
I have no opinion on this.  I merely wondered if you are growing alarmed 
at the lack of a patch for this bug, and whether you had communicated that.
But it sounds like the answer is: no, you're not alarmed, and this is seen
merely as "nice to have".
Assignee: kaie → nobody
Whiteboard: [psm-padlock]
Depends on: 1145679
Whiteboard: [psm-padlock] → [psm-padlock][psm-backlog]
Severity: normal → S3
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: