Download presentation
Presentation is loading. Please wait.
1
The role of Identity in TLS certificates
Buypass CA Who should be represented in the “O” field?
2
Summary from Ryan S – nov 2015
Buypass CA Recognize we don't have consensus yet for what the O field should present as Recognize that the VWG proposals provide many wonderful security benefits that we shouldn't let them get hungup on resolving 1) Take a pass at the BRs, in their entirety, to find places where the language may be inconsistent with respect to the (unresolved) status quo, and update that language to reflect the present reality Longer term, if this is a topic members are passionate about, which I think we have evidence that some CAs are, work to build consensus as to those goals
3
Who should be represented in the ”O” field?
Buypass CA None – ”Identity is not important” A (well) defined set of entities satisfying some requirements All entities that are allowed according to the current BR/EVG Kirk Hall, author of the content and logical operator of the kirk.example.com origin Example.com, provider of hosting services for Kirk Hall CDN Corp, a CDN that provides SSL/TLS front-end services for example.com, which does not offer them directly Marketing Inc, the firm responsible for designing and maintaining the website on behalf of Kirk Hall Payments LLC, the payment processing firm responsible for handling orders and financial details on kirk.example.com DNS Org, the company who operates the DNS services on behalf of Kirk Hall Mail Corp, the organization who handles the MX records that kirk.example.com responds to
4
Summary from Phenix Ownership Control Authorization
Buypass CA Ownership The Applicant is the owner of the Domain, the Domain Registrant Control The Applicant controls the Domain Authorization The Applicant is authorised to use the Domain
5
Summary from Phenix – and VWG
Buypass CA Ownership The Applicant is the owner of the Domain, the Domain Registrant Validating the Applicant as Domain Contact , Fax, SMS, or Postal Mail to Domain Contact Phone Contact with Domain Contact Control The Applicant controls the Domain Constructed to Domain Contact Agreed-Upon Change to Website DNS Change IP Address Test certificate TLS Using a Random Number Authorization The Applicant is authorised to use the Domain Domain Authorization Document
6
Who should be in the O-field?
Buypass CA Kirk Hall, author of the content and logical operator of the kirk.example.com origin Controls the Content of the Domain (Content Owner) - OK Example.com, provider of hosting services for Kirk Hall The Domain Registrant - OK CDN Corp, a CDN that provides SSL/TLS front-end services for example.com, which does not offer them directly Controls what? Why should they be represented in the O-field? Marketing Inc, the firm responsible for designing and maintaining the website on behalf of Kirk Hall Controls the Content on behalf of the Content Owner. Why should they be represented in the O-field? Payments LLC, the payment processing firm responsible for handling orders and financial details on kirk.example.com N/A by current requirements - OK DNS Org, the company who operates the DNS services on behalf of Kirk Hall Controls the DNS – Why should they be in the O-field? Mail Corp, the organization who handles the MX records that kirk.example.com responds to Controls the service – Why should they be in the O-field? Other Other entities authorized (by Domain Contact) to use the Domain – Examples?
7
Next steps Decide on who should be in the O-field (and who should not)
Buypass CA Decide on who should be in the O-field (and who should not) Define different categories of entities Domain Owner, Content Owner Etc….. Define acceptable methods for verification for each category E.g by ownership, by control using method A, B or C
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.