Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Extended Validation SSL, More Secure or Just a Racket? 205

Nalfeshnee writes "The Register is reporting on the new 'Extended Validation SSL' cert currently being touted by Verisign. Vista and IE7 will be using this but not, apparently, Firefox anytime soon. For this the Verisign Product Marketing Director Tim Callan squarely blames the Firefox dev team for 'not keeping up' with their new technology. However, the whole thing just seems to be a way for Verisign to enjoy ridiculous markup on selling 'more secure' certs."
This discussion has been archived. No new comments can be posted.

Extended Validation SSL, More Secure or Just a Racket?

Comments Filter:
  • Color coded? (Score:5, Insightful)

    by eric76 ( 679787 ) on Wednesday October 25, 2006 @05:55PM (#16585242)
    Verisign say 99 per cent of sites will be get the "ok" and the address bar left white. Only outfits which fork out for an extended validation SSL will get the psychological filip of "green for go". Firms will have to stump up about 150 per cent of what they currently do for an SSL certificate.

    I'm colorblind. Would I ever notice the difference?

  • Secure? (Score:2, Insightful)

    by Kazrath ( 822492 ) on Wednesday October 25, 2006 @05:55PM (#16585244)
    Has anyone found an effective way of cracking regular SSL? Is not the whole point of SSL to just slow down the decryption to a point where even if decrypted the data is old enough to be useless?

    I mean hell if SSL is weak encryption and we need stronger encryption should I not SUE verisign right now for providing a false sense of saftey?
  • by truthsearch ( 249536 ) on Wednesday October 25, 2006 @05:55PM (#16585246) Homepage Journal
    Hey Verisign, it's called "open source". If you'd like the feature added submit a patch and they'll consider it. Until then the people working on it will finish when they can. Thanks.
  • by dolphinling ( 720774 ) on Wednesday October 25, 2006 @05:58PM (#16585274) Homepage Journal

    I think I remember reading about this either on firefox dev blogs or mailinglists or IRC. IIRC, the upshot was that verisign should be doing "extended validation" type things on all their clients. The validation they have now is really pretty shoddy, shoddy enough that they'd be risking getting kicked out if they weren't so big and so many websites would break. But that's just my memory, which could be bad, you'd have to look into it yourself.

  • Racket (Score:5, Insightful)

    by AKAImBatman ( 238306 ) * <akaimbatman@gmaYEATSil.com minus poet> on Wednesday October 25, 2006 @05:58PM (#16585282) Homepage Journal
    More Secure or Just a Racket?

    Definitely sounds like a racket to me. If you get the green bar by paying Verisign 150%, how does that differ from today's security certificates? Other than having to pay more money, and only being able to be verified by Verisign, that is. (Doesn't sound racket-y at all. Or was that rickety?) While they make it sound like the Green Bar is an excellent method of knowing that Amazon is really Amazon, I think it's actually a reverse attempt. By getting Amazon to use this spiffy new green bar, Verisign is attempting to legitimize their new technology in the eyes of the consumer. Little will actually change for the consumer, as he already knows when he's surfing Amazon.

    The only place it would supposedly help is with Phishing. But since Phishing sites can't get certificates anyway, what does this help? If the lock isn't good enough, just change the URL Bar green for every VERIFIED certificate received. That will have the EXACT same effect.
  • by datajack ( 17285 ) on Wednesday October 25, 2006 @06:03PM (#16585340)
    The online identity assurance process is intended to be more comprehensive and standardized across the entire industry. Whereas currently online identity assurance processes vary from CA to CA, the new standards/processes under discussion by the CA Browser Forum, will have to be adhered to by all CAs if they wish to offer High Assurance/Extended Validation SSL certificates. This will encourage greater confidence in CAs as well as the processes that are used to vet and issue digital certificates. thawte's commitment to establishing and implementing High Assurance/Extended Validation SSL standards, and to being one of the first to offer compliant product lines, underscores our commitment to enabling a secure digital environment for all.


    Err, excuse me.. isn't the verification of the identity of the applicant of the certificate exactly what the CAs are meant to be doing anyway?

    I thought that that is why we had these 'trusted' third-parties, to vouch for the identity of the certificate owner - that is the fundamental basis of PKI and certificates. If they weren't doing that before (which they clearly weren't doing properly), what the hell were they doing?

    So, we're paying them extra to get a 'fixed' version of something that they caused to be broken in the first place because they couldn't do their job properly. WHy should paying an extra 50% on top of their fees all of a sudden make us able to trust them now?
  • Scam... (Score:5, Insightful)

    by tomstdenis ( 446163 ) <tomstdenis@gma[ ]com ['il.' in gap]> on Wednesday October 25, 2006 @06:05PM (#16585368) Homepage
    This is coming from the people who stole DNS, and sell certificates for hundreds of dollars which take milliseconds to make....

    Now we're supposed to get a more "trustworthy" cert and make our address bar green?

    Fuck you Verisign.

    Tom
  • by Anonymous Coward on Wednesday October 25, 2006 @06:05PM (#16585374)
    Nobody uses SSL to verify that a site is who they say it is - when was the last time 99% of users looked at a website's certificate?

    SSL is still good for keeping the data encrypted between client and server. You don't need some super-duper certificate for that.

    Anti-phishing blacklists will be what works well for end-users. Being told explicitly that they're on a dangerous website is far more effective than 'hmm, well the location bar is in green!'. They won't even look.
  • Re:I don't get it (Score:2, Insightful)

    by hardburn ( 141468 ) <hardburn@wumpus-ca[ ]net ['ve.' in gap]> on Wednesday October 25, 2006 @06:06PM (#16585378)

    It may solve some problems, like having a few guys claiming to be from Microsoft showing up at VeriSign's offices and walking off with a signed SSL key for MS.

    This is only one of the many major problems that SSL has, though. I don't see how this can address the problems of international domain names (where glyphs for certain characters can look the same, but aren't). I also doubt that it gives assurances about the security practices of the company (why would a cracker sniff a few credit cards at a time off the wire if they can break into a database and get hundreds of credit cards at once?).

    Overall, this seems like a way to make the customer pay again for the CA's own bad practices.

  • I'm going to guess (Score:4, Insightful)

    by tkrotchko ( 124118 ) * on Wednesday October 25, 2006 @06:09PM (#16585436) Homepage
    I'm guessing the certificate security itself isn't changed. What they're saying is they're just going to do more research on a company before they hand out certificates. Right now you fill in a form, fax it in, and *presto* you get certs. Now, I guess someone will actually call and check before issuing.

    They could do this now with regular SSL, but they couldn't charge more money... too much competition out there.

    The thing is, the encryption of SSL is not at issue; it's just a new product to market.
  • Re:I don't get it (Score:5, Insightful)

    by skiflyer ( 716312 ) on Wednesday October 25, 2006 @06:15PM (#16585506)
    Overall, this seems like a way to make the customer pay again for the CA's own bad practices.

    That pretty much sums up this garbage. This is what SSL is supposed to already be, but as anyone who has filed for an SSL certificate already knows the whole thing pretty much works as a handshake... you're who, yes, ok, credit card with that name please, great, here you go.

    And what about this "standardized across the industry"... I bought an SSL certificate from a 3rd party because they're in the Firefox/Opera/IE default trust lists, and because they cost $40 a year instead of $400, is this really a new industry standard or is this just Verisign's way of artificially creating a new market now that there's too much competition?
  • Re:more info (Score:3, Insightful)

    by DragonWriter ( 970822 ) on Wednesday October 25, 2006 @06:19PM (#16585548)
    So, Verisign realizest that their practices are insecure and broken, but instead of fixing their practices and being a good CA, they are instead creating a new kind of "we actually did our job" certificate that requires new code for browsers to recognize?

    I mean, wouldn't it make more sense for Verisign to do the same thing (if they wanted to get some money for insecure certs but still have a more secure cert) to create a new Certification Authority name also run by Verisign that actually does their job, and not require any browser code changes? Or are they just afraid that if they did that, browser vendors might delist Verisign's main CA from their default list of trusted CA's, since that would be admitting that, well, basic Verisign certificates can't be trusted.

    Seems to me this is an unnecessary technical change to a business practices problem at Verisign.
  • Comment removed (Score:2, Insightful)

    by account_deleted ( 4530225 ) on Wednesday October 25, 2006 @06:20PM (#16585570)
    Comment removed based on user account deletion
  • by khasim ( 1285 ) <brandioch.conner@gmail.com> on Wednesday October 25, 2006 @06:25PM (#16585604)
    #1. In order to issue the new certificates, the Certificate Authorities (CA's) will be "required" to follow "industry standard" practices in "verifying" whomever applies for a new certificate.

    #2. This additional "verification" is what will cost the additional money.

    #3. Any business that does not pay the additional fees to be "verified" by "industry standard" practices will be ... the same as they are today.

    #4. Phishing depends upon a person making a single error in judgment, one time. This will not stop phishing.

    This will not stop anything. This is stupid. You're paying EXTRA to have someone do the verification they were supposed to be doing already. Imagine trying to run a business like that.

    Boss - "I paid you last week, but you barely did any work. I'm going to fire you."

    Employee - "If you give me a 50% raise, I'll perform the work to industry standards."

    Boss - "Okay, that sounds like a good deal to me."
  • racket? (Score:5, Insightful)

    by nosferatu-man ( 13652 ) * <spamdot@homonculus.net> on Wednesday October 25, 2006 @06:26PM (#16585622) Homepage
    Verison is involved.
    Everything Verisign does is a racket.
    Therefore, it's a racket.
    Q.E.D.
  • by ScentCone ( 795499 ) on Wednesday October 25, 2006 @06:31PM (#16585660)
    shoving their shoddy DOS ... down your throat ... abusing their monopoly

    Right! Because DOS was definitely the only O/S upon which big business was doing business, say, back in the 1980's.

    And then there were those enormous numbers of consumers using DOS instead of Apple II machines or Ataris or Amigas... Shoved down their throats? Come on. If you're going to rant about MS market share, at least skip over the part when it was anything but a sure thing, before all of the other platform makers wheezed and missed the opportunity to take over the business desktop market (when they already owned the back office corporate computing market!) when it was anything but settled in one popular direction.
  • Certs are a joke (Score:3, Insightful)

    by rs79 ( 71822 ) <hostmaster@open-rsc.org> on Wednesday October 25, 2006 @06:33PM (#16585676) Homepage
    In a world where even PayPal can't get it right (and nobody cares) what does it matter?

    "Oh, it's an https site. It's encrypted. Cool". Next.

    Some time when you're really bored look at the low level ssl stuff (with openssl or something) and notice all the errors. The browsers ignore so many of these I think it's all a big joke.

  • Re:Secure? (Score:1, Insightful)

    by Anonymous Coward on Wednesday October 25, 2006 @06:33PM (#16585680)
    This isn't about the encryption itself, it's about identity. Certificates are not used for encryption, they are used for identifying a communications partner. The way this is done uses cryptography, but the actual connection is encrypted by a different process and with different keys than the ones from the certificate.

    A certificate is a way of proving who you are by proving that someone whom the other person trusts has verified that you are who you say you are. There are two ways of attacking this concept: You can break the cryptography which is used in that process or you can get a certificate which says you are someone else by pretending to the trusted third that you are someone else. Extended Validation is a (misguided) attempt at preventing attacks of the latter kind. The only job of a CA is to verify identities. If a CA can't guarantee identities, the CA's certificate should no longer be trusted. Instead, EV adds "super trusted" certificates and leaves insufficiently checked identities in the trust hierarchy.
  • by Animats ( 122034 ) on Wednesday October 25, 2006 @06:35PM (#16585714) Homepage

    Has anyone actually been able to find the specification for "high assurance" certificates? Apparently this is being closely held. The spec comes from something called the "CA Browser Forum", which is invitation-only and doesn't seem to have a web site. A standard was supposed to be issued in August, but apparently agreement wasn't reached until a meeting in September. There are many press releases, but no hard data.

    So that's why it's not in Mozilla.

    It's actually a good idea. Early in the history of SSL, getting a certificate required presenting appropriate business identification info to the certificate issuer. The problem is that some issuers (GoDaddy comes to mind) started issuing "domain only" SSL certificates; the only verification is that the domain can get email. Then, instead of revoking GoDaddy's root certificate for this, the other cert issuers copied GoDaddy's approach. Now anybody can get a meaningless certificate with a meaningless Relying Party Agreement.

    The way it's supposed to work is that the certificate issuer bears financial responsibility for misidentification of the certificate owner. Some certificates from Verisign have a Relying Party Agreement [verisign.com] that does provide a financial guarantee to the party relying on the certificate - $100 for a class 1 cert, $5000 for a class 2 cert, and $100,000 for a class 3 cert. Most of the other issuers have relying party agreements which promise nothing and deliver less.

    So what's happening is that, soon, you'll be able to tell the difference between the crap certificates and the good ones. Before you buy. The idea is that if you put your credit card into a site that showed a green toolbar in IE, and it wasn't really the company it should have been, you can collect from the certificate issuer. This puts certificate issuers on the hook for phishing losses.

    Unfortunately, the rules and the Relying Party Agreements for the new certificates haven't yet appeared, so we can't tell if the rules are tough enough to make this work. Since they're being drafted by the certificate issuers, there will probably be some loophole that lets them off the hook.

  • by TheRaven64 ( 641858 ) on Wednesday October 25, 2006 @08:07PM (#16586572) Journal
    On the otherhand, CACert, which is free, requires to see two forms of government issued ID, one of which must have a photograph.

    Sadly, CACert's root certificate is still not included with Mozilla, although a number of distributions include it.

  • by rhythmx ( 744978 ) on Wednesday October 25, 2006 @08:11PM (#16586622) Homepage Journal
    ...as a Certificate Authority to ensure that any sites they issue certificates to are trustworthy. All PKI systems are based on this kind of trust model. If there is any lack of trust/confidence in online ssl-encrypted commerce, it is their fault. Merely because they have been ignoring their role as a trust arbitrator and giving out certs to anyone, they decide now to actually do their part, charge more, and have Microsoft put a flashy "green for go" interface on it.

    Then, of course, you must slam Firefox for "losing the browser war" by not keeping up by making their URLs turn green. You know, (speculation alert) you can probably bet Microsoft patented the green url indicator anyway, locking Firefox out.
  • by (Score.5, Interestin ( 865513 ) on Wednesday October 25, 2006 @09:22PM (#16587312)
    It's purely a money-making scam by Verisign (and other CAs). The only thing high-assurance about "high-assurance" certs is the assurance that you'll be charged more money for them. See the Defcon talk Phishing Tips and Techniques - Tackle, Rigging, and How and When to Phish [auckland.ac.nz] for a discussion of why "high-assurance" certs are worthless except to the companies issuing them.
  • by epine ( 68316 ) on Thursday October 26, 2006 @02:31AM (#16589858)

    If the extra up-front validation is the main thing, Verisign should be charging a high one-time-fee for undertaking those steps, then charging a low low monthly rate to rest on their laurels and do nothing further. Somehow I doubt that's the price structure they adopted here.

This restaurant was advertising breakfast any time. So I ordered french toast in the renaissance. - Steven Wright, comedian

Working...