
An Extended Validation (EV) Certificate is a certificate conforming to
X.509 that proves the
legal entity
In law, a legal person is any person or legal entity that can do the things a human person is usually able to do in law – such as enter into contracts, lawsuit, sue and be sued, ownership, own property, and so on. The reason for the term "''le ...
of the owner and is signed by a
certificate authority
In cryptography, a certificate authority or certification authority (CA) is an entity that stores, signs, and issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. Thi ...
key that can issue EV certificates. EV certificates can be used in the same manner as any other X.509 certificates, including securing
web
Web most often refers to:
* Spider web, a silken structure created by the animal
* World Wide Web or the Web, an Internet-based hypertext system
Web, WEB, or the Web may also refer to:
Computing
* WEB, a literate programming system created by ...
communications with
HTTPS
Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It uses encryption for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protoc ...
and signing software and documents. Unlike
domain-validated certificates and
organization-validation certificates, EV certificates can be issued only by a subset of
certificate authorities
In cryptography, a certificate authority or certification authority (CA) is an entity that stores, signs, and issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. Thi ...
(CAs) and require verification of the requesting entity's legal identity before certificate issuance.
As of February 2021, all major web browsers (Google Chrome, Mozilla Firefox, Microsoft Edge and Apple Safari) have menus which show the EV status of the certificate and the verified legal identity of EV certificates. Mobile browsers typically display EV certificates the same way they do Domain Validation (DV) and Organization Validation (OV) certificates. Of the ten most popular websites online, none use EV certificates and the trend is away from their usage.
For
software
Software consists of computer programs that instruct the Execution (computing), execution of a computer. Software also includes design documents and specifications.
The history of software is closely tied to the development of digital comput ...
, the verified legal identity is displayed to the user by the
operating system
An operating system (OS) is system software that manages computer hardware and software resources, and provides common daemon (computing), services for computer programs.
Time-sharing operating systems scheduler (computing), schedule tasks for ...
(e.g., Microsoft Windows) before proceeding with the installation.
Extended Validation certificates are stored in a file format specified by and typically use the same
encryption
In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
as
organization-validated certificates and
domain-validated certificate
A domain validated certificate (DV) is an X.509 public key certificate typically used for Transport Layer Security (TLS) where the domain name of the applicant is validated by proving some control over a DNS domain. Domain validated certificates ...
s, so they are compatible with most server and user agent software.
The criteria for issuing EV certificates are defined by the ''Guidelines for Extended Validation'' established by the
CA/Browser Forum.
To issue an extended validation certificate, a CA requires verification of the requesting entity's identity and its operational status with its control over domain name and hosting server.
History
Introduction by CA/Browser Forum
In 2005
Melih Abdulhayoglu, CEO of the
Comodo Group
Xcitium (formerly Comodo Security Solutions Inc.) is a cybersecurity company, including Zero Trust cybersecurity, based in Bloomfield, New Jersey, United States. In 2022, the company rebranded as Xcitium.
History
The company was founded in 1 ...
(''currently known as Xcitium''), convened the first meeting of the organization that became the
CA/Browser Forum, hoping to improve standards for issuing SSL/TLS certificates. On June 12, 2007, the CA/Browser Forum officially ratified the first version of the Extended Validation (EV) SSL Guidelines, which took effect immediately. The formal approval successfully brought to a close more than two years of effort and provided the infrastructure for trusted website identity on the Internet. Then, in April 2008, the forum announced version 1.1 of the guidelines, building on the practical experience of its member CAs and relying-party
application software
Application software is any computer program that is intended for end-user use not operating, administering or programming the computer. An application (app, application program, software application) is any program that can be categorized as ...
suppliers gained in the months since the first version was approved for use.
Creation of special UI indicators in browsers
Most major browsers created special user interface indicators for pages loaded via HTTPS secured by an EV certificate soon after the creation of the standard. This includes
Google Chrome
Google Chrome is a web browser developed by Google. It was first released in 2008 for Microsoft Windows, built with free software components from Apple WebKit and Mozilla Firefox. Versions were later released for Linux, macOS, iOS, iPadOS, an ...
1.0,
Internet Explorer
Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated as IE or MSIE) is a deprecation, retired series of graphical user interface, graphical web browsers developed by Microsoft that were u ...
7.0,
Firefox
Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to display web pages, which implements curr ...
3,
Safari
A safari (; originally ) is an overland journey to observe wildlife, wild animals, especially in East Africa. The so-called big five game, "Big Five" game animals of Africa – lion, African leopard, leopard, rhinoceros, African elephant, elep ...
3.2,
Opera
Opera is a form of History of theatre#European theatre, Western theatre in which music is a fundamental component and dramatic roles are taken by Singing, singers. Such a "work" (the literal translation of the Italian word "opera") is typically ...
9.5. Furthermore, some mobile browsers, including Safari for iOS, Windows Phone, Firefox for Android, Chrome for Android, and iOS, added such UI indicators. Usually, browsers with EV support display the validated identity—usually a combination of organization name and jurisdiction—contained in the EV certificate's 'subject' field.
In most implementations, the enhanced display includes:
* The name of the company or entity that owns the certificate;
* A lock symbol, also in the address bar, that varies in color depending on the security status of the website.
By clicking on the lock symbol, the user can obtain more information about the certificate, including the name of the certificate authority that issued the EV certificate.
Removal of special UI indicators
In May 2018, Google announced plans to redesign user interfaces of Google Chrome to remove emphasis for EV certificates. Chrome 77, released in 2019, removed the EV certificate indication from omnibox, but EV certificate status can be viewed by clicking on lock icon and then checking for legal entity name listed as "issued to" under "certificate". Firefox 70 removed the distinction in the omnibox or URL bar (EV and DV certificates are displayed similarly with just a lock icon), but the details about certificate EV status are accessible in the more detailed view that opens after clicking on the lock icon.
Apple
Safari
A safari (; originally ) is an overland journey to observe wildlife, wild animals, especially in East Africa. The so-called big five game, "Big Five" game animals of Africa – lion, African leopard, leopard, rhinoceros, African elephant, elep ...
on
iOS 12
iOS 12 is the iOS version history, twelfth major release of the iOS mobile operating system developed by Apple Inc., Apple. Aesthetically similar to its predecessor, iOS 11, it focuses more on performance than on new features, quality improvemen ...
and
MacOS Mojave
macOS Mojave ( ; version 10.14) is the fifteenth major release of macOS, Apple Inc.'s desktop operating system for Macintosh computers. Mojave was announced at Apple's Worldwide Developers Conference on June 4, 2018, and was released to the ...
(released in September 2018) removed the visual distinction of EV status.
Issuing criteria
Only CAs who pass an independent qualified audit review may offer EV, and all CAs globally must follow the same detailed issuance requirements which aim to:
* Establish the legal identity as well as the operational and physical presence of website owner;
* Establish that the applicant is the domain name owner or has exclusive control over the domain name;
* Confirm the identity and authority of the individuals acting for the website owner, and that documents pertaining to legal obligations are signed by an authorized officer;
* Limit the duration of certificate validity to ensure the certificate information is up to date. CA/B Forum is also limiting the maximum re-use of domain validation data and organization data to maximum of 397 days (must not exceed 398 days) from March 2020 onward.
With the exception of Extended Validation Certificates for
.onion domains, it is otherwise not possible to get a
wildcard Extended Validation Certificate – instead, all fully qualified domain names must be included in the certificate and inspected by the certificate authority.
Extended Validation certificate identification
EV certificates are standard X.509 digital certificates. The primary way to identify an EV certificate is by referencing the Certificate Policies (CP) extension field. Each EV certificate's CP
object identifier
In computing, object identifiers or OIDs are an identifier mechanism standardized by the International Telecommunication Union (ITU) and ISO/IEC for naming any object, concept, or "thing" with a globally unambiguous persistent name.
Syntax and lex ...
(OID) field identifies an EV certificate. The CA/Browser Forum's EV OID is 2.23.140.1.1. Other EV OIDs may be documented in the issuer's Certification Practice Statement. As with root certificate authorities in general, browsers may not recognize all issuers.
EV HTTPS certificates contain a subject with X.509 OIDs for
jurisdictionOfIncorporationCountryName
(OID: 1.3.6.1.4.1.311.60.2.1.3),
jurisdictionOfIncorporationStateOrProvinceName
(OID: 1.3.6.1.4.1.311.60.2.1.2) (optional),
jurisdictionLocalityName
(OID: 1.3.6.1.4.1.311.60.2.1.1) (optional),
businessCategory
(OID: 2.5.4.15) and
serialNumber
(OID: 2.5.4.5), with the
serialNumber
pointing to the ID at the relevant secretary of state (US) or government business registrar (outside US).
Online Certificate Status Protocol
The criteria for issuing Extended Validation certificates do not require issuing certificate authorities to immediately support Online Certificate Status Protocol for revocation checking. However, the requirement for a timely response to revocation checks by the browser has prompted most certificate authorities that had not previously done so to implement OCSP support. Section 26-A of the issuing criteria requires CAs to support OCSP checking for all certificates issued after Dec. 31, 2010.
Criticism
Colliding entity names
The legal entity names are not unique, therefore an attacker who wants to impersonate an entity might incorporate a different business with the same name (but, e.g., in a different state or country) and obtain a valid certificate for it, but then use the certificate to impersonate the original site. In one demonstration, a researcher incorporated a business called "Stripe, Inc." in
Kentucky
Kentucky (, ), officially the Commonwealth of Kentucky, is a landlocked U.S. state, state in the Southeastern United States, Southeastern region of the United States. It borders Illinois, Indiana, and Ohio to the north, West Virginia to the ...
and showed that browsers display it similarly to how they display certificate of payment processor "
Stripe, Inc." incorporated in
Delaware
Delaware ( ) is a U.S. state, state in the Mid-Atlantic (United States), Mid-Atlantic and South Atlantic states, South Atlantic regions of the United States. It borders Maryland to its south and west, Pennsylvania to its north, New Jersey ...
. Researcher claimed the demonstration setup took about an hour of his time, US$100 in legal costs and US$77 for the certificate. Also, he noted that "with enough mouse clicks,
sermay be able to
iewthe city and state
here entity is incorporated but neither of these are helpful to a typical user, and they will likely just blindly trust the
V certificateindicator".
Availability to small businesses
Since EV certificates are being promoted and reported as a mark of a trustworthy website, some small business owners have voiced concerns
that EV certificates give undue advantage to large businesses. The published drafts of the EV Guidelines excluded unincorporated business entities, and early media reports
focused on that issue. Version 1.0 of the EV Guidelines was revised to embrace unincorporated associations as long as they were registered with a recognized agency, greatly expanding the number of organizations that qualified for an Extended Validation Certificate.
Effectiveness against phishing attacks with IE7 security UI
In 2006, researchers at
Stanford University
Leland Stanford Junior University, commonly referred to as Stanford University, is a Private university, private research university in Stanford, California, United States. It was founded in 1885 by railroad magnate Leland Stanford (the eighth ...
and
Microsoft Research
Microsoft Research (MSR) is the research subsidiary of Microsoft. It was created in 1991 by Richard Rashid, Bill Gates and Nathan Myhrvold with the intent to advance state-of-the-art computing and solve difficult world problems through technologi ...
conducted a usability study of the EV display in
Internet Explorer 7
Windows Internet Explorer 7 (IE7) (codenamed Rincon) is a version of Internet Explorer, a web browser for Windows. It was released by Microsoft on October 18, 2006. It was the first major update to the browser since 2001. It does not support ve ...
. Their paper concluded that "participants who received no training in browser security features did not notice the extended validation indicator and did not outperform the control group", whereas "participants who were asked to read the Internet Explorer help file were more likely to classify both real and fake sites as legitimate".
Domain-validated certificates were created by CAs in the first place
While proponents of EV certificates claim they help against phishing attacks, security expert
Peter Gutmann states the new class of certificates restore a CA's profits which were eroded due to the
race to the bottom
Race to the bottom is a Socioeconomics, socio-economic concept describing a scenario in which individuals or companies compete in a manner that incrementally reduces the utility of a product or service in response to perverse incentives. This pheno ...
that occurred among issuers in the industry. According to Peter Gutmann, EV certificates are not effective against phishing because EV certificates are "not fixing any problem that the phishers are exploiting". He suggests that the big commercial CAs have introduced EV certificates to return the old high prices.
See also
*
Qualified website authentication certificate
*
HTTP Strict Transport Security
HTTP Strict Transport Security (HSTS) is a policy mechanism that helps to protect websites against man-in-the-middle attacks such as protocol downgrade attacks and cookie hijacking. It allows web servers to declare that web browsers (or other c ...
References
External links
CA/Browser Forum Web siteFirefox green padlock for EV certificates
{{SSL/TLS
Key management
E-commerce
Public key infrastructure
Transport Layer Security
2007 introductions