On 10/21/15 12:17 PM, Kathleen Wilson wrote:
FNMT has applied to include the “AC RAIZ FNMT-RCM” root certificate and
enable the Websites trust bit.

Fábrica Nacional de Moneda y Timbre (FNMT) is a government agency that
provides services to Spain as a national CA.

The request is documented in the following bug:
https://bugzilla.mozilla.org/show_bug.cgi?id=435736

And in the pending certificates list:
https://wiki.mozilla.org/CA:PendingCAs

Summary of Information Gathered and Verified:
https://bugzilla.mozilla.org/attachment.cgi?id=8677034

Noteworthy points:

* Documents are in Spanish, and some are translated into English.

Document Repository:
https://www.sede.fnmt.gob.es/normativa/declaracion-de-practicas-de-certificacion

CP:
https://www.sede.fnmt.gob.es/documents/11614/67070/dpc_componentes_english.pdf/

CPS: https://www.sede.fnmt.gob.es/documents/11614/137578/dpc_english.pdf/

* CA Hierarchy

** This root has internally-operated subordinate CAs
- “AC Componentes Informáticos” issues certificates for SSL Servers and
code signing.
- "AC Administración Pública" is an updated version of the “APE CA” in
order to meet new requirements from Spanish Government about
certificates of Public Administrations.
- “APE CA” is no longer used.

* This request is to enable the Websites trust bit.




Thanks to all of you who have contributed to this discussion so far. I believe that some of the concerns that were raised have been resolved, and that the remaining open concerns are as follows. Please reply if I missed any other items that still need to be resolved.

1) This root certificate has subordinate certificates that are not technically constrained and not audited/disclosed according to sections 8-10 of Mozilla’s CA Certificate Policy. The noted subCAs are "AC FNMT Usuarios" (doesn't issue server certificates) and “ISA CA” (server certificates are issued exclusively to a very restricted (almost private) environment). Unless there are technical constraints on the intermediate CA certificates representing those subCAs which make it impossible for them to issue TLS or S/MIME certificates, they are in-scope for this inclusion request, because they are a potential source of mis-issuance which puts users of the Mozilla trust store at risk. References: https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/inclusion/
https://wiki.mozilla.org/CA:CertificatePolicyV2.1#Frequently_Asked_Questions

2) The allowed methods of verifying domain name ownership/control must be in compliance with section 3.2.2.4 of version 1.3 (or later) of the Baseline Requirements. Part of what was documented in the translation of the ISA CA CPS said: “In the event that that such a check is not possible, __the FNMT-RCM shall accept the Organization or Competent Body’s ownership over said names or addresses on the basis of the corresponding application.” It is not clear how this is in compliance with the allowed domain validation procedures per the Baseline Requirements.
Reference: https://cabforum.org/documents/#Baseline-Requirements


Thanks,
Kathleen


_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to