| LC-2129
   Al Gilman <Alfred.S.Gilman@ieee.org>(archived comment) | This document appears to have successfullyincorporated the feedback we gave you on the
 Requirements Note.  Thank you very much.
 
 Al
 /chair, PFWG
 
 PS:
 
 You asked us to help you respond to a comment
 you received from Sam Hartmans, with
 accessibility reasoning.
 
 http://lists.w3.org/Archives/Public/public-usable-authentication/
 2008Aug/0003.html
 
 Kenny Johar looked at this and wants clarification from Sam
 before responding.
 
 Janina Sajka made the following good point:
 
 The sonicon for change in "security sensitivity" needs
 to be timely.  But what defines timely is not the visual
 display but the change in the severity or sensitivity of
 potential system responses to potentially-erroneous user
 input.  So what you should do is define (in abstract terms)
 the event as the change in input exposure to risk or
 hazard.  Then tie prompt announcement of this in visual
 and auditory media directly to that state change, not
 daisy-chain the timing of one off the other. Both the
 auditory and visual displays need to be
 prompt in announcing elevated-risk states.  Not that they
 need to be strictly aligned in start time.  Where possible
 the start-time alignment should be achieved as well.
 
 Let's continue that discussion on public-usable-authentication@w3.org
 and not have PFWG _consensus_ in the loop to
 slow resolution.
 | Thank you. We have removed a number of items in wsc-ui due to lack of implementation and testing, and this is one of the items that has been removed. | tocheck | 
|---|
| LC-2095
   Francois Daoust <fd@w3.org>(archived comment) | Hi,
 I stumbled upon several obscure terms and sentences while reading the
 spec (see list below). The terms are not defined. As far as I can tell,
 they are all basic terms when one is used to dealing with security on
 the Web.
 
 Even though it contains "Security", the title looks friendly, and
 doesn't seem to infer that a technical background on security is
 required. Since there is no audience section, I expect I'm reasonably
 well-versed into Web matters to understand the spec. That is not the
 case: I understand the clauses, which is good, but I sometimes fail to
 understand the rationale behind them.
 
 Depending on the audience you are targeting, you may not want to define
 these terms in the spec. That is the gist of this comment: the audience
 is not defined. If your primary target is security experts, no need to
 read the following list. If your primary target is user interface
 developers, you should clarify them. In any case, you should probably
 mention it and precise the expected knowledge before reading the spec so
 that readers know what to expect beforehand.
 
 Here is the list of security-related topics that are not so common for
 other communities (well, "for me" at least, that is ;)):
 - Section 5: The "TLS" acronym is actually never defined (only mentioned
 in the references part).
 - Section 5.1.5: "use of TLS provides confidentiality protection
 services against passive attackers". What is a "passive attacker"?
 - Section 5.1.5: "this can be strong evidence that protection against an
 active attacker has been achieved as well". What is an "active attacker"?
 - Section 5.1.5: "evidence that a man in the middle attack occurs". For
 once, I know what a "man in the middle attack" refers to, but I'm not
 sure everyone does.
 - Section 5.2: "for both confidentiality and integrity protection". I
 get the difference but that may be worth a little explanation as well.
 - Section 7.1.1: same thing with "phishing" and "spoofing" although
 probably known by more people.
 - Section 8.2: "OCSP" stands for?
 
 As a side note, I am totally fine with the relative complexity created
 by the multiple definitions the spec already contains. Precision is good!
 
 Thanks,
 
 Francois Daoust,
 W3C Staff Contact,
 Mobile Web Best Practices Working Group.
 | Thank you. We've added a reference to OCSP. The TLSv11 reference defines TLS in this context. We will not be putting additional details of those protocols in our spec. We hope the reader will either be familiar with them, or follow up with the references or generic web searches of the concepts. | yes | 
|---|
| LC-2093
   Philipp Gühring <pg@futureware.at>(archived comment) | Hi,
 "To derive a human-readable subject name from an AAC, user agents MUST
 use the Subject field's Organization (O) attribute.
 If the certificate's Subject field does not have an Organization
 attribute, then user agents MUST NOT consider the certificate as an
 augmented assurance certificate, even if it chains up to an AA-qualified
 trust root. User agents MAY consider such a certificate as an ordinary
 validated certificate."
 
 The CPS's of several CA's are clearly stating that certificates for
 non-registered organisations (universities, communities, partnerships,
 ....) or non-organisations (individuals, ...) must not contain an
 Organization attribute.
 
 Taking those 2 things together, this guideline is discriminating against
 a large amount of people and institutions.
 
 My current idea to somewhat solve this problem is to use either
 Oraganization(O), or Surname(SN) + GivenName(GN) in case O is not available.
 
 Best regards,
 Philipp Gühring
 | Thank you. We have added the following text: 
 Note: Should certificates arise in the future that provide strong
 assurance of the holder's identity, but do not include an
 organization attribute, then user agents can make use of the
 additional assurance level and identity information without
 violating this specification.  Such future certificates could, for
 example, include high assurance certificates for individuals.
 | tocheck | 
|---|
| LC-2057
   Sam Hartman <hartmans-ietf@mit.edu>(archived comment) | I have finished reviewing the July 24 draft of the user interfaceguidelines.  This is excellent work.  However I do have a couple of
 comments, the first of which I'll raise in this message.
 
 Section 5.1.4 requires that if a user agent is going to render both an
 audio and visual logotype, that the rendering by time synchronized so
 they both start at the same time.
 
 Outside of accessibility contexts, this is a fine requirement.
 However, I'm familiar with a number of Screen Readers (software
 designed to make resources accessible to blind users) where this
 requirement would be problematic.  In particular, on Windows (for
 products such as Window Eyes, JAWS and Microsoft's Narrator), for Unix
 (products such as Orca) and Mac (products such as Voice Over),
 rendering of the audio interface is handled by a separate software
 component than the visual interface.  The audio interface has access
 to special accessibility APIs to get access to the DOM, security
 context and other information.
 
 So, it would be very difficult in accessibility contexts to
 synchronize the rendering of these two components.  I suspect that if
 people implement this requirement they will do so by moving the audio
 rendering into the main browser rather than the accessibility
 component.  That seems highly problematic, because it separates
 rendering of the logotype from rendering of other security context
 information.  The information is synchronized visually, but for those
 who use the audio user interface, this will mean that logotypes will
 be rendered at some random time while the page loads, out of
 synchronization with any rendering of signals in section 6.  As a
 result, it seems like techniques such as using a different voice for
 security context information would be ineffective at preventing
 spoofing of the logotype.  An attacker could simply play the logotype
 sound at any point in order to spoof an audio user.
 
 To provide a good security experience for audio users, I think it is
 important that the logotype be rendered along with other audio
 security context information, regardless of when that happens or
 whether it is synchronized with visual indicators.
 
 I think the easiest fix is to remove the requirement for
 synchronization.  If that is problematic, then scope the requirement
 to cases where both logotypes are rendered outside of accessibility
 contexts and suggest that accessibility API for browsers provide a
 mechanism for screen readers to suppress the browser's own rendering
 of the audio logotype.  Screen readers are already security sensitive;
 allowing them to configure chrome is no worse than any other trusted
 component.
 
 
 Thanks for your Consideration,
 
 Sam Hartman
 Principal, Painless Security LLC
 | Thank you. We have removed a number of items in wsc-ui due to lack of implementation and testing, and audio logotypes are among the items that have been removed. | tocheck | 
|---|
| LC-2094
   Sam Hartman <hartmans-ietf@mit.edu>on behalf of IanG <iang@systemics.com> (archived comment) | Forwarded at the author's request.
 The author has one comment that I kind of agree with fairly strongly.
 The current document does not handle the issue of key life cycle
 management for self-signed certificates well.  I tried to see if the
 security community (in particular the security directorate) within the
 IETF was interested in giving you guys some guidance here, but found
 no takers to try and put together a consensus.
 
 Things I'd consider if I were giving guidance in that space would include:
 
 * expiring the binding between a site and certificate when that certificate expried
 * allowing one certificate signed by a particular root certificate that does not chain to a trust anchor to replace  another chaining back to the same root
 
 
 ---
 
 Hi Sam,
 
 Sam Hartman wrote:
 
 > Peter, list, the W3C W Web Security Context working group is in the
 > final week of a public last call on their user interface guidelines.
 > These guidelines take a lookboth at the balance between EV-certs and
 > at user interface for security indicators.
 >
 > Comments need to be received by September 15. The draft is at
 > http://www.w3.org/TR/2008/WD-wsc-ui-20080724/ and my take is at
 > http://www.painless-security.com/blog/2008/08/w3sc-lc/ .
 
 
 Hmm.  I read that.  I regret to say I find it unlikely anyone from
 the user interface community will find it useful.  Here's my
 comments.  Feel free to forward them to someone, I'm not part of the
 W3C, and I have little clue about the context.  I'm sure that shows...
 
 First the good one, then the rest.
 
 
 
 Promoting Petnames would be a substantial improvement in UI
 practices.  This document more or less supports them, but, unlike
 its promise, does not describe why they are so useful, and
 importantly when to use them (suggest to user) rather than any
 alternate.  We are very far away from useful guidance.
 
 In contrast to petnames, there is little commentary on key
 continuity management.  These are very close to petnames, is the
 point that we may as well just implement petnames?
 
 
 
 Overall.  The document is very hard to read.  It is written in
 extremely difficult language, uses many definition of specious
 utility, and this use of internal code hides its essential
 recommendations.
 
 Until I realised that this was written by PKI developers for other
 PKI developers, I was appalled.  It was not written by user
 interface people and not for user interface people.  It has
 mountains of PKI assumptions, truisms and commercial aspirations in
 it, and by the time we get to the brief user interface guidance in
 sections 6,7 the way is lost.
 
 At least I figured out that much.  So, probably, it could best be
 fixed by changing the title to "Guidelines for PKI Developers" and
 starting again, if there are user interface people who want some
 guidelines.
 
 
 
 
 3.  Conformance seems inappropriate.  How can one be conformant with
 Guidelines?  What happens when a UI developer finds a new way of
 doing things?  Is the book on user interface design written?
 
 It would seem far better to say "We don't know how to do this.  But
 here are some top tips..."
 
 3.3  It mixes terms and standards inappropriately.  How can
 "advanced conformance" be construed to be all "SHOULDS" in a
 Guideline for user interfaces?  It makes no sense.
 
 3.4.2 This obsession with "strong" TLS is misplaced.  No phisher
 ever worried about it, why should we?
 
 3.4.3 "broadly accepted practices <-> augmented assurance <-> MUST
 do this..." pushes the agent to make decisions that are well beyond
 its capability.
 
 The notion that a browser or equivalent would create a separate
 class of "augmented" versus "validated" certificates has to be
 treated with great suspicion.  At a minimum, the browser's legal
 counsel needs to be involved in the entry into the active security
 process of the user.  It is not a thing for browser developers to
 treat as "just another setting in the profile".
 
 
 
 
 
 4.2.1  Primary & Secondary seems over-strained.  What is wrong with
 agent-directed and user-initiated actions?  Its use in the text
 indicates a specious distinction that then took on a life of its
 own.  It is entirely a mystery as to why the robot is primary and
 the user is secondary, but there has to be an inner message here.
 
 
 
 
 5.1.2 this is tortured.  As a matter of legal interpretation, the
 "MUST use O field" makes for a claim that "companies can be
 identified better than individuals" which is a nonsense.
 
 "augmented assurance" seems to be a shoe-in for EV.  That's no
 problem, but not everyone agrees that EV should be given special
 treatment.  especially, the conclusion that "giving some company
 some subsidy" is hard to avoid if it involves special treatment.
 6.1.2 concurs with "special treatment".
 
 5.1.3 this is getting more tortuous.  The world is divided into
 "Ordinary Validated certificates" and "augmented certificates" ...
 and the former are "domain validated" only, attests to a binding
 between a domain name registration and a key pair; additional
 certificate attributes are often not validated!!!!
 
 This document appears to have swallowed the EV kool-aid.  It appears
 to have sided on the EV group in order to support the barriers to
 entry in the CA business.
 
 5.1.5  Incorrect: "In both situations, use of TLS provides
 confidentiality protection services against passive attackers. No
 binding of a third-party asserted identity to the cryptographic key
 is achieved."
 
 SSCs can provide protection against active attackers where key
 continuity management is in place.  The asserted identity is bound
 by the 1st party, not a 3rd party as with CA-signed certificates.
 
 
 5.1.6 "When the user assigns a petname, the petname presentation
 implementation MUST warn the user if the chosen petname is similar
 to one currently in use."
 
 Can't use MUST to enforce a similarity...  SHOULD be SHOULD.  (there
 is a difference between a bug and a user interface guideline!)
 
 ...
 
 Proper Reference to petnames is needed.  I would suggest:
 http://www.skyhunter.com/marcs/petnames/IntroPetNames.html
 
 5.2.  Worrying about export ciphers and TLS "known flaws" is a joke.
 Their presence or otherwise has never stopped phishers exporting
 users' money across borders.  They are nowhere near the user
 viewpoint nor understanding.  We should be focussed on validated
 security threats, not the bogeymen from the last century.
 
 
 
 
 6.1.1
 
 "This [Definition: identity signal ] SHOULD be part of primary user
 interface during usage modes which entail the presence of signalling
 to the user beyond only presenting page content. Otherwise, it MUST
 at least be available through secondary user interface."
 
 This really tears the rug from underneath all the security
 foregoing.  As this provides an option to bury it in some "special
 user-directed interface" it essentially says "do whatever you want."
 The rest is equally problematic.  Here is what I reduced it to:
 
 =============
 The identity signal SHOULD appear in a consistent visual position.
 Web Content MUST not obscure security chrome
 
 User interactions to access this identity signal MUST be consistent
 across all Web interactions facilitated by the user agent.
 
 If the Web user agent has no trustworthy information about the
 identity of the Web site that a user interacts with, this MUST be
 clearly indicated.
 
 If the unauthenticated or untrusted sources are displayed, and a
 positive identity is available, this must also be displayed and
 related clearly.
 ==============
 
 Now, obviously some subtlety might be missed in the above, but
 that's a subtlety that will clearly be missed by any user interface
 developer, as well.
 
 
 6.1.2
 
 Weird.  "AA"s do not include the certificate issuer's name, so their
 pedigree before the user is unknown.  How is the user to evaluate
 whether the claim means anything?
 
 Meanwhile, the validated certificate result MUST include the
 Issuer's Organization field.  So this is stronger than the AA, for
 the user, because the entire claim is laid out.  This is how it
 should be, but I wonder if the author made a mistake?
 
 Whether you lay logo types out or not needs to be better stated.  At
 the moment, it is couched as a "reward" for using an AA.  Entering
 into commercial battles for market space is not a wise thing for a
 standard to aspire to.
 
 Rather, there is should be something like:
 
 ===========
 "A clear signal such as a consistent colour should be used for each
 level of validation (e.g., augmented, validated, petnamed, KCM, SSC,
 plaintext HTML, warning, etc.)."
 ===========
 
 
 "Note that this behavior does not apply when self-signed
 certificates or certificate chains that chain up to an untrusted
 root certificate are used."
 
 So, what is the user interface guideline for this?  Or is this not a
 user interface guideline, but a different document?  It should look
 like this:
 ==============
 "During interactions with an unknown SSC, the agent shows:
 * the basic information
 * a signal of caution
 * a choice to accept and petname, if implemented
 ==============
 
 
 6.2  Seems reasonable!!!!
 
 6.3  So, the TLS indicator is able to light up if only signed, or
 only encrypted, or some combination of above?
 
 TLS does several things.  These things are only related in the minds
 of the protocol engineer, not the minds of the user.
 
 There should be a separate indicator for IDENTITY and another
 ENCRYPTION.
 
 6.4.1
 
 "Error signalling that occurs as part of primary chrome SHOULD be
 phrased in terms of threat to user's interests, not technical
 occurrence."
 
 No.  the developer has no clue what the interests of the user are,
 and doesn't even know what site she is on.  If the developer tries
 to guess what her interests and threats are, he ends up confusing or
 offending the user, and probably reducing the overall security.
 
 This is why the original model was about "simple."
 
 Instead, focus on claims that the user can understand.  E.g.,
 
 "The CA XYZ states that this site is ACME Inc."
 
 OR:
 
 "There is an error;  although the site identifies itself as ACME,
 the domain is from www.someoneelse.com.  This could be an attack."
 
 
 
 
 7.2 specious reference:
 https://financialcryptography.com/mt/archives/000179.html
 
 
 
 8.3   Hooray!
 | Thanks. 
 We decided not to take on additional recommendations on the key lifecycle of self signed certs.
 
 We've added a reference to KCM.
 
 We have removed the compliance language around petnames, and left discussion of it in the security considerations section.
 We've added this reference for petnames:
 http://www.hpl.hp.com/techreports/2005/HPL-2005-148.html
 
 We've made the association between augmented assurance certificates and the implementation of them with extended validation certificates a bit clearer by ensuring that AA references EV when it first appears in the specification.
 
 We removed the specious reference.
 
 The identity signal sections call out the identity part of TLS as a separate and clear concept. We leave it to the UI designer to determine the exact relationship between the two.
 
 Much of the discussion of logotypes has been removed due to lack of implementation and testing (a core requirement in the specification process for moving any of the recommendations ahead).
 
 We are drafting text that attempts to clarify the relationship between guidelines and specifications and the relationship to PKI:
 
 @@update once tweaked
 This document specifies user interactions with a goal toward making security usable, based on known best practice in this area. This document intends to provide user interface guidelines but assumes that the audience has a certain level of understanding of core PKI (Public Key Infrastructure) technologies. Since this document is part of the W3C specification process, it is written in the form of a standard, with the requirements and options for conforming to it as a standard clearly laid out. User interface guidelines that are not intended for use as standards do not have such a structure. Readers more familiar with that latter form of user interface guideline are encouraged to read this specification as a way to avoid known mistakes in usable security.
 | yes | 
|---|
| LC-2092
   Sigbjørn Vik <sigbjorn@opera.com>(archived comment) | A couple of comments regarding the wording of a paragraph.
 "User agents SHOULD store the state of certificates that were previously
 encountered. (specifically, whether or not a site previously presented a
 validated certificate). Historical TLS information stored for the purposes
 of evaluating security relevant changes of behavior MAY be expunged from
 the user agent on the same schedule as other browsing history information..
 Historical TLS information MUST NOT be expunged prior to other browsing
 history information. For purposes of this requirement, browsing history
 information includes visit logs, bookmarks, and information stored in a
 user agent cache."
 
 This sentence requires UAs to store the certificate information until
 other browsing history information (specifically bookmarks) is deleted. As
 we know that users never delete their bookmarks, the conclusion must be
 that the certificate information can never be deleted.
 
 The intention should be that the certificate information gets stored along
 with other historical data as long as the user/UA keeps this around.
 Bookmarks in themselves are not historical data, though bookmarks may
 contain historical data such as time created, last visited, favicons (the
 favicon might contain a timestamp) and other. Different types of
 historical data might be treated by a UA in different ways (expunged at
 different schedules for instance), so treating certificate data the same
 way as all the other types might not be possible.
 
 I propose a rewrite and clarification of the paragraph, particularily with
 the intention. As the paragraph stands now, a UA cannot let the user
 manually expunge certificate information only, as this would be in
 violation of the MUST NOT clause. Proposal follows:
 
 "User agents SHOULD store the state of certificates that were previously
 encountered. Such state would typically include at least whether or not
 the certificate the site presented was valid, and may also include what
 the issues were with it (if any), protocol information, a fingerprint of
 the certificate and any other information for the purposes of evaluating
 security relevant changes of behavior. This information MUST be treated by
 the user agent under the same privacy and caching policies as other
 browsing history information, such as visit logs, timestamps in bookmarks,
 cookies, and information stored in the user agent cache."
 | Thank you. We have removed a number of items in wsc-ui due to lack of implementation and testing, and this is one of the items that has been removed. | tocheck | 
|---|
| LC-2087
   Thomas Roessler <tlr@w3.org>on behalf of timeless@gmail.com (archived comment) | >       Subject logotypes derived from certificates SHOULD NOT be rendered, unless the certificate used is an augmented assurance certificate.
 why is this a should not instead of a must not?
 | Thank you. While we have discussed this, and decided on MUST NOT. | yes | 
|---|
| LC-2088
   Vijay K. Gurbani <vkg@alcatel-lucent.com>(archived comment) | Lisa Dusseault wrote:>> Although this is an external spec, it would be great to get a
 >> couple of IETF reviewers.  I'll send this to secdir as well.
 [...]
 >> The Web Security Context WG announces the publication transition of
 >> Web Security Context: User Interface Guidelines.
 >> Review ends on on September 15 2008.
 
 All: I reviewed wsc-ui for the IETF APPS area; review is
 attached.  For any follow-ups, please CC me to the email
 since I do not subscribe to the public-usable-authentication@w3.org
 list.  Thank you.
 
 Review: Web Security Context: User Interface Guidelines,
 W3C Working Draft 24 July 2008
 Review date: Sept. 3, 2008
 Due date: Sept. 15, 2008
 Reviewer: Vijay K. Gurbani <vkg@bell-labs.com>
 
 Global: At various places, the draft refers to RFC 3280.  That
 RFC is obsolete, having been replaced by RFC 5280.
 
 Nit: In Section 5.1.2 second paragraph, second line, small typo:
 s/document but/document, but/
 
 The rest of the comments refer to specific sections.  In crafting
 my feedback below, I quote the specific text in the section first
 by indenting two spaces, and follow that with the particular comment
 I have on that text.
 
 Section 5.1.2:
 
 Web user agents MUST establish that a trust anchor is
 [Definition: AA-qualified ] through some out of band mechanism
 consistent with the relevant underlying augmented assurance
 specification.
 
 Marking a trust anchor as AA-qualified is a security-critical
 step and most often will involve the use of some application-
 specific out-of-band mechanism.
 
 A couple of paragraphs before the above quoted paragraphs, it is stated
 that a Web user agent may adequately trust a certificate if it is
 specially marked using an OID, for instance.  But yet the two paragraphs
 quoted above appear to be making a case against that statement by
 implying that a Web user agent MUST only trust a trust anchor using some
 OOB means.  So, which is it: an OOB means or a well-known OID?
 
 Section 5.1.2:
 
 If the certificate's Subject field does not have an
 Organization attribute, then user agents MUST NOT consider the
 certificate as an augmented assurance certificate, even if it
 chains up to an AA-qualified trust root. User agents MAY
 consider such a certificate as an ordinary validated certificate.
 
 What happens if a certificate's Subject field is empty, but the
 SubjectAltName extension is marked critical and the subject's
 identity is specified in the SAN field?  All things being equal
 (i.e., an OID marks the certificate), would such a certificate be
 considered trusted?
 
 Section 5.1.5:
 
 ... Such behavior includes, e.g., warning users about changes of
 certificates, and not showing warning messages if a site shows
 a certificate consistent with previous visits.
 
 Just curious: do we need to specify how many times the site has to
 present the same self-signed cert before being considered trusted?
 I think ssh asks for confirmation from the user on the first instance;
 after that, connections to the same ssh server are deemed trusted.
 
 Section 5.1.6: I have not used petnames, nor do I know much about their
 usage in the context of this document, so treat the rest of this comment
 as feedback tinged with curiosity from someone uninitiated with the
 workings of W3C and unaware of how pervasive the petname concept is
 in that domain (certainly, I do not think I have ran across a current
 browser that uses petnames in its chrome.)  Please treat this as a
 pure comment and not anything that needs resolution.
 
 It seems to me that the petname is a concept layered on top of the
 information present in X.509 certificates.  As such, it is a level of
 abstraction above the X.509 certificate.   Especially, the petname
 implementor would have to account for wildcards, delegation, etc.
 If care is not taken to write a good implementation, then security could
 be -- I think -- compromised by someone modifying the contents of the
 petname database, or by other means.
 
 If any action item results from this comment at all, it would
 be along one or more references on more information into the
 petname concept, especially any papers that outline the threat
 model of using such a concept.  I Googled and ran across
 http://www.w3.org/2005/Security/usability-ws/papers/02-hp-petname,
 but that does not contain a threat analysis of this concept.  It
 does, however, explain very well the concept of a petname.
 
 Section 5.4.1
 
 When certificate information is presented in these interactions,
 human-readable information derived from the certificates
 (e.g., Common Name or Organization attributes) in question MUST NOT
 be presented as trustworthy.
 
 Suggest to clarify what "these interactions" means.  Do you mean that
 information derived only from self-signed certificates must not be
 presented as trustworthy?  Or do you mean that information derived from
 certificate issued by a CA whose certificate path has been verified is
 also untrustworthy?  I think you mean the former, but a clarification
 will help (as an example, the paragraph right after the one I quote
 above makes it abundantly clear that "these interactions" consist of
 deriving identity information from untrusted certificates.)
 
 Section 6.1.1
 
 o If the identity signal does not include any other human readable
 information about the identity of the certificate subject
 (derived, e.g., from an augmented assurance certificate or a
 petname), then it MUST include an applicable DNS name retrieved
 from the subject's Common Name attribute or from a
 subjectAltName extension.
 
 The PKIX WGs view is that DNS names should not appear in the CN
 but rather in the SAN extension.  That said, it is the case that
 existing certificates in use today for web traffic do carry a
 DNS name in the CN attribute.  To future proof this specification,
 you may want to indicate that if a DNS name is not found in the
 SAN (or if the SAN is empty) and there is a DNS name in the CN,
 then the DNS name from the CN must be used.
 
 Another aspect to consider is what happens if there are multiple
 identities in the SAN?  Some may be email identities and other
 DNS identities.  Any guidance on what the implementation should
 do when faced with multiple identities in SAN would be helpful.
 As a start, implementations should look for a DNS identity in
 the SAN that matches the URI used to reach that resource, keeping
 in mind wildcard matching (since this is apparently allowed in HTTP.)
 
 Section 7.1.1
 A trusted path can be established between a web user agent
 and the user through the use of a secret shared between the
 user and the agent.
 
 Here, do you mean that a trusted path can be established between a web
 *server* and user?  When I read "web user agent", I automatically
 think of the browser; but the discussion in Section 7.1.1 appears
 to pertain to a web server, especially with references to phishing.
 Or am I missing something?
 
 That's it.
 
 Thanks,
 
 - vijay
 | In our latest editor's draft we have: 
 - 5.1.2 nit fixed - thank you.
 
 - changed references from 3280 to 5280
 
 - on your 5.1.2. OOB/OID question - we've updated the text to clarify.  The OID may be in addition to specifying which are AA via an out of band mechanism.
 
 - on your 5.1.2 Subject field question - the subject must contain at least an org to be considered an AA certificate. If the subject was empty, the certificate would still be trusted, but not AA.
 
 - on 5.1.5 -
 We have decided not to specify how many times  site has to present the same self-signed cert before being considered trusted.
 
 - 5.1.6 comment - we have removed the conformance language around petnames, though have kept it in the security considerations section, and added a better reference.
 
 - updated the 5.4.1 text to read: When certificate information is presented in the interactions described in this section, then human-readable information from certificates MUST NOT be presented as trustworthy unless it is attested to. E.g., a self-signed certificate's Common Name or Organization attribute must not be displayed, even if that certificate is pinned to a destination.  Web user agents MAY display this information in a dialog and other secondary chrome reachable from the warning or error messages specified here.
 
 - Updated the 6.1.1 text to read: If the identity signal does not include any other human readable  information about the identity of the certificate subject (derived,  e.g., from an augmented assurance certificate), then it  MUST include an applicable DNS name that matches either the  subject's Common Name attribute or its subjectAltName extension.  User agents MAY shorten such a DNS name by displaying only a suffix.
 
 - Removed the trusted path section.
 | yes | 
|---|
| LC-2056
   Sam Hartman <hartmans-ietf@mit.edu>(archived comment) | The July 24 user interface guidelines draft references RFC 3280 as thecertificate and CRL profile.  This document has been obseleted by RFC
 5280.  Having considered the changes between RFC 3280 and RFC 5280, I
 believe that the newer document would be a better reference for this
 specification.
 | Thank you. The change has been made in our latest editor's draft. | tocheck | 
|---|
| LC-2058
   timeless <timeless@gmail.com>(archived comment) | http://www.w3.org/TR/2008/WD-wsc-ui-20080724/
 > user agents, such as plugins, extensions, and others; they are summarily called
 > plug-ins, extensions, call outs to external systems which render particular document
 
 plugins/plug-ins (English favors the latter, coders are lazy and use
 the former, please pick one :))
 
 > behavior might be determined by scripting, stylesheets, and other mechanisms.
 
 and => or
 
 > anchor is authoritative. Relying parties use trust anchors to determine if digitally
 
 is "Relying parties" a _defined_ term? it seems awkward otherwise....
 
 > Trust anchor installation is typically handled by Web user agent vendors ,systems
 
 the , is on the wrong side of the space
 
 > trust anchor update is therefore often handled as part of Web user agent or operating system software update.
 
 update => updates
 
 > for a single session, sometimes for all future sessions involving that certificate.
 
 Firefox 3 ties a certificate to a host+port.
 
 > some process that adheres to the requirements of an augmented asurance specification
 
 assurance
 
 > user agents MUST NOT consider the certificate as an augmented assurance certificate,
 
 is there some reason not to write AAC or Augmented Assurance Certificate?
 
 > [Definition: An HTTP transaction is strongly TLS-protected if it is TLS-protected, an https URL was used, strong TLS algorithms were negotiated for both confidentiality and integrity protection, and one of the following conditions are true:]
 
 the transaction is not the result of a transaction which is not
 strongly TLS-protected.
 
 > warning or above (6.4.3 Warning/Caution Messages , 6.4.4 Danger Messages) MUST be used.
 
 above? you're in 5.4.2...
 I think you mean "higher" or "greater". Above in a document to me
 means printed document order (closer to top) and not some more
 abstract thing.
 
 > 5.4.3 Redirection chains
 
 > a user agent such as a smart phone, air plane seatback or TV set which has a usage
 
 individual LCD screens on airplanes
 
 >       Subject logotypes derived from certificates SHOULD NOT be rendered, unless the certificate used is an augmented assurance certificate.
 
 why is this a should not instead of a must not?
 
 (i ran out of energy and am sending this now, hopefully it's useful)
 | Thank you. The proposed editorial changes have been accepted and made in the current editor's draft, with a few exceptions: 
 - "relying party" is a common term of art, so we do not need to define it here
 
 - concerning "for a single session", added the following in the end of that sentence: "...	sometimes for all future sessions involving that certificate, possibly scoped to specific host and port combinations."
 
 - concerning "the transaction is not the result of a transaction which is not strongly TLS-protected": The text contains the definition of that very term; it's not clear what additional changes your comment aims at.
 
 - concerning the airplane example: changed to "individual entertainment screen in an airplane seatback"
 
 - Concerning the SHOULD vs MUST question about logotypes, we'll respond to that one separately, and it is being tracked as a separate issue.
 | tocheck | 
|---|
| LC-2059
   timeless <timeless@gmail.com>(archived comment) | http://www.w3.org/TR/2008/WD-wsc-ui-20080724/
 initial spell checking after visual inspection flagged a word is done
 by loading the text into data:text/html,<textarea rows=60 cols=85> in
 Firefox 3.0.1 (en-US) and just looking for red squiggles.
 
 >     6.1 Identity and Trust Anchor Signalling
 >     6.4 Error handling and signalling
 
 google says the web favors signaling 3:1 (Firefox says signalling
 isn't a word{).
 Wikipedia says:
 signalling (UK spelling) or signaling (US spelling) has the
 following meanings:
 
 > [WSC-USECASES] documents the use cases and assumptions that underly this specification.
 
 underlie or underlay
 
 > Mike Beltzner, Joe Steele,Jan Vidar Krey, Maritza Johnson, Rachna Dhamija and Dan Schutzer.
 
 space missing before "Jan"
 
 > It has also benefitted from general public and working group commentary on earlier drafts.
 
 benefited
 
 > This specification also addresses products that might incporate changes to a web
 
 incorporate
 
 > acceptance was caused through a user interaction that happens whlie the user is
 
 while
 
 > those roots embody augmented assurance and can therefore be treated more favourably
 > both display the "padlock" security indicator, and a possible "favorite icon"
 
 As an American, I'd expect favorably....
 
 > The identity of the top level resource vouches for the content of all dependant
 
 dependent
 
 =
 > This specification addresses Web user agents as one class of product.
 
 typically I expect "class of thing_s_" do you mean "a product class"?`
 
 >    3. What broadly accepted practices are considered sufficient for a trust anchor to be deemed augmented assurance qualified.
 > Web user agents MUST establish that a trust anchor is [Definition: AA-qualified ]
 
 use "augmented assurance qualified" or "aa-qualified" but not both :)
 | Thank you. The changes you suggest have been made in the current editors draft. | tocheck | 
|---|