as my understanding,
one of LCAs of KISA was audited by WebTrust regulations.

CrossCert, they have partnership with Verisign 
and also they are LCA of KISA.

I think, at least one of LCAs is enough to be included into Mozilla Root 
Repository.


2014년 3월 5일 수요일 오전 4시 38분 24초 UTC+9, Kathleen Wilson 님의 말:
> All,
> 
> 
> 
> I will appreciate your input on how to proceed with the KISA root 
> 
> inclusion request.
> 
> 
> 
> My personal preference is to proceed with the process to approve/include 
> 
> the KISA root under the condition that Mozilla would constrain the CA 
> 
> hierarchy to *.kr. However, KISA does not want to constrain their CA 
> 
> hierarchy to *.kr. I have also suggested that KISA have each subCA apply 
> 
> for inclusion as separate trust anchors, but KISA does not want to take 
> 
> that approach either.
> 
> 
> 
> The following is my understanding of this CA.
> 
> 
> 
> Inclusion Request Bug:
> 
> https://bugzilla.mozilla.org/show_bug.cgi?id=335197
> 
> CA Information Document:
> 
> https://bugzilla.mozilla.org/attachment.cgi?id=727859
> 
> KISA document repository:
> 
> http://www.rootca.or.kr/kor/accredited/accredited02.jsp
> 
> CPS (English):
> 
> http://www.rootca.or.kr/kor/down/cps16(en).pdf
> 
> 
> 
> Korea Information Security Agency (KISA) is the Electronic Signature 
> 
> Authorization Management Center for South Korea. The Korean 
> 
> Certification Authority Central (KCAC) of KISA issues certificates to 
> 
> intermediate CAs (licensed CAs = LCAs), which then issue end-entity 
> 
> certificates to Korean citizens, businesses, and other organizations. 
> 
> The LCAs are private organizations (not government organizations).
> 
> 
> 
> The LCAs are listed in Korean at
> 
> http://www.rootca.or.kr/kor/accredited/accredited02.jsp
> 
> They are:
> 
> Korea Information Certificate Authority Inc (KICA), http://www.signgate.com
> 
> KICA CPS (Korean): http://www.signgate.com/customer/cus_cps.sg
> 
> Korea Securities Computer Corporation (KOSCOM), http://www.signkorea.com
> 
> KOSCOM CPS (English): https://bugzilla.mozilla.org/attachment.cgi?id=479655
> 
> Korea Electronic Certification Authority Inc (CrossCert), 
> 
> http://gca.crosscert.com
> 
> CrossCert CPS (English): 
> 
> https://bugzilla.mozilla.org/attachment.cgi?id=479658
> 
> KTNET ("TradeSign" or "KITA"), http://www.tradesign.net/
> 
> TradeSign CPS (English): 
> 
> https://bugzilla.mozilla.org/attachment.cgi?id=479659
> 
> Korea Financial Telecommunications (KFTC), http://www.yessign.or.kr 
> 
> (non-profit)
> 
> KFTC CPS (English): https://bugzilla.mozilla.org/attachment.cgi?id=479657
> 
> 
> 
> Deloitte completed a WebTrust audit of KISA’s operation of the root, but 
> 
> the subordinate CAs (LCAs) are not WebTrust audited. The LCAs are 
> 
> regulated by the Korean Electronic Signature Act, and the law requires 
> 
> that KISA does the actual examination of the LCAs and report their 
> 
> findings to the government. The evaluation (audit) criteria are attached 
> 
> to the Bugzilla bug.
> 
> Electronic Signature Act:
> 
> https://bugzilla.mozilla.org/attachment.cgi?id=594638
> 
> Enforcement Decree:
> 
> https://bugzilla.mozilla.org/attachment.cgi?id=594639
> 
> Enforcement Regulations:
> 
> https://bugzilla.mozilla.org/attachment.cgi?id=594640
> 
> 
> 
> The LCAs are annually audited and are not allowed to change anything 
> 
> (system, h/w, s/w) without reporting to the government, and any 
> 
> mis-issuance of certificates would lead to penalty by the Act.
> 
> 
> 
> The Korean government controls the policies and technical standards 
> 
> under the Electronic Signature Act. Although the actual auditing is done 
> 
> by KISA, all the results are reported to the ministry (currently the 
> 
> Ministry of Science, ICT and future Planning). KISA is an expert group 
> 
> to help the ministry for the actual examination and other expertise for 
> 
> the national PKI. KISA is an affiliated organization of the ministry, 
> 
> and is run by the government. All the orders to control the LCAs are 
> 
> from the ministry.
> 
> 
> 
> Note that KISA is also the National Internet resources Center of Korea, 
> 
> http://krnic.kisa.or.kr/jsp/english/krnic/intro.jsp
> 
> 
> 
> We need to take into account sections 8 through 14 of Mozilla's CA 
> 
> Certificate Inclusion Policy:
> 
> http://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/inclusion/
> 
> 
> 
> Section 10 says that if the subordinate CA certificate is not 
> 
> technically constrained (as described in section 9) then the subordinate 
> 
> CA must be audited according to sections 11 through 14. So, according to 
> 
> section 11 the subordinate CA operations must be audited according to 
> 
> the WebTrust CA or ETSI TS 102 042 criteria, and must also be audited 
> 
> according to the Baseline Requirements (the websites trust bit is 
> 
> requested).
> 
> 
> 
> My questions…
> 
> 
> 
> How would we know that the criteria that KISA uses to audit their LCAs 
> 
> is inclusive of the versions of the WebTrust or ETSI criteria that 
> 
> Mozilla's policy requires?
> 
> 
> 
> How would we know that the criteria that KISA uses to audit their LCAs 
> 
> is inclusive of the Baseline Requirements audit criteria that Mozilla 
> 
> requires?
> 
> 
> 
> Based on the above information, is there sufficient evidence to assert 
> 
> that the people within KISA who are performing the audits of the LCAs 
> 
> are qualified to do so, and are acting as an independent party as 
> 
> described in sections 13 and 14 of Mozilla’s CA Certificate Inclusion 
> 
> Policy?
> 
> 
> 
> If KISA's root was to be included, should Mozilla products constrain the 
> 
> KISA hierarchy to *.kr? Why? Why not?
> 
> 
> 
> I will greatly appreciate your thoughtful input into how to proceed with 
> 
> this CA’s root inclusion request.
> 
> 
> 
> Kathleen

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to