Hello, In response to the issues raised by Mr. Sleevi, we are making a number of changes in to ComSign's CPS. Some of the issues raised here will be addressed by the changes in the CPS, while others will remain the same because we feel that they do not represent problems with our compliance to the Mozilla Policy.
Listed here are all of the replies in order of Mr. Sleevi's remarks (and with the division between 'Meh' and 'Bad'). The draft of the revised CPS can be viewed in this address: "http://www.comsign.co.uk/wp-content/uploads/Comsign CPS-EN-v312-Draft.pdf" It includes most of the suggested changed (red-lined), but it still has the existing CPS structure. We are planning to change the structure and order of sections as well. Also, I would like to thank Mr. Sleevi, since this is an opportunity for us to improve our CPS and do some serious housekeeping, which we may not have done without his objections. > == Meh == > * Page 7 of the CPS clearly documents the Hebrew version of the document > as binding. While this is likely relevant to their role within Israel of > issuing certificates qualified under the national scheme, to the Mozilla > community, I believe the English version is of interest and relevance. For > example, does Page 7 imply that ComSign may unilaterally update the Hebrew > version, without a corresponding update to the English version? Does that > facilitate Mozilla community review? At a minimum, the English version > should be seen as 'as binding' as the Hebrew version, which provides some > assurances about the consistency therein. The Hebrew version of this CPS is binding in regards to matters of Israeli law and regulations, specifically for the purpose of issuing personal certificates in accordance with the Israeli Law of Electronic Signature - Hebrew being the formal and common language of the state of Israel. The scope of personal certificates which are bound to the Israeli law is defined by the Intermediate CA's that issue only this type of certificates - and no other types: a. ComSign Professionals CA b. ComSign Corporations CA The English version of this CPS is binding in regards to matters of SSL certificates, Code signing and International Email certificates - which are not covered by the Israeli law of Electronic Signature. The scope of certificates which are managed and operated according to the English version of this CPS is defined by the Intermediate CA that issues these certificates: c. ComSign Organizational CA These clarification will be added to the upcoming revision of the CPS and can be reviewd in the linked draft. > * Section 2.1 states that "The list of revoked certificates containing > their serial number and date of revocation is accessible for controlled > viewing." This implies that the revocation information is not freely and > publicly available, which contradicts the statements about the CRLs and > OCSP information being freely publicized within the Repository. Could > ComSign clarify what is meant by this section? The language in this section is indeed vague and unclear. We are revising this paragraph to make it clear that certificate revocation is always freely and publically accessible, including the list of serial numbers of certificates that were revoked and the date and time of the revocation. This information is of course part of ComSign's signed CRL files and signed OCSP responses, as required by Mozilla's policy. > * Section 2.3 disclaims any responsibility if CRLs are not fetched every > time, every verification. This defeats many of the purposes of CRLs having > validity periods, and seems to discourage a scalable infrastructure. The reservation that appears in this section states that the most updated CRL is the one published by ComSign. This is pretty straight-forward: certificate may be revoked at any time, and according to some standards that we are committed to (e.g. CWA 14167-1 [RM2.2]) any revocation is reflected immediately in our CRL and OCSP service. If any client software is configured to retrieve revocation information only according to the "Next Update" field of the CRL, then it will be aware of new revocation entries some time after they are first published. > * Section 3.2.5 indicates that certificate renewal is permitted. ComSign > should be aware that for the purposes of the Mozilla policy, the act of > renewal is seen as if it was a new certificate issuance. That is, at time > of "renewal", the renewed certificate must comply with all current and > in-force policies - it CANNOT violate the requirements in effect at the > time of signing (for example, a SHA-1 certificate CANNOT be renewed after > 2016-01-01, as this would be new issuance) Agreed. The section regarding renewal of certificate has no precedence over other sections of the CPS which explicitly declare compliance to Mozilla's or CA/B forum's policies (e.g. validity periods). In the upcoming revision the CPS we may add a clarification stating that the policies and limitations that apply to any renewed certificate are those which are valid at the time of the renewal of the certificate. This can be reviewd in the linked draft. > * Section 3.2.8.2.2 has a typo (trough -> through) Will be corrected in the upcoming CPS version, and can be reviewd in the linked draft. > * Sections 7.1 - 7.4 are unclear as to whether the EKUs enumerated > represent examples (and thus, issued certificates may include other such > EKUs), as the section titles imply, or whether they represent an > exhaustive list of what can appear within that field. If it is merely > exemplary, this does represent a concern as non-SSL certificates may > inadvertently be enabled for SSL if the wrong EKUs are presented. The certificate structure listed is a statement of the certificates issued by ComSign. It does not represent mere examples. This includes any EKU listed as part of the certificate structure. A clarification can be reviewd in the linked draft. > * Section 7.1.4 documents multiple CRL locations may appear, but ComSign > should be aware that virtually all major clients ignore these multiple > URLs and will only check a single URL. Thus, it seems inefficient and > wasteful to encode as such. The second CRL location may be ignored by some clients, but we intend to leave it as it is. > == Bad == > * The CPS does not appear to conform to either RFC 2527 or RFC 3647, as > required by the Baseline Requirements. The CPS seemingly follows 3647, > based on the rough outline, but Sections 9 and 10 definitely diverge. The > document states they were formulated according to ETSI TS 456, but that > does not seem an acceptable form. > * Examples of such divergence: Sections 1.3.3, 1.4.*, 3.2 We are planning to re-order the CPS and to apply the RFC structure in one of the next CPS revisions. > * Section 3.2.6.1.2 does not seem to permit revocation based on > demonstrating proof of possession of a private key (which would seem > important if the customer loses the revocation code), nor does it permit > revocation based on writing (which MUST be supported, per 4.9.1.1 of the > Baseline Requirements v.1.3.1) We do not support revocation based on demonstrating proof of possession of a private key. As stated in this section, we offer other means of validating the identity of a person requesting certificate revocation. Regarding a request in writing, we shell add an explicit addition to this section which lists writing as an acceptable method of requesting revocation with regards to SSL certificates. This also applies to section 4.8.1 in ComSIgn's CPS. These additions can be reviewd in the linked draft. > * Section 10.15.1 reserves ComSign the right to unilaterally employ > additional methods at ComSign's discretion. This seems to run counter to > the Mozilla Policy which obligates the CA to notify Mozilla of any > meaningful changes to the CP/CPS. This is a "General Statement of Conformity" section, which states that all of ComSign's methods of performing tasks related to certificate issuance will comply with the policies of the Certification Authority / Browser Forum ("CAB Forum"). It also stated that "In case multiple or alternative methods or options are possible by the baseline requirements or guidelines ... ComSign reserves the right to choose any of the methods or options applicable". The methods themselves are listed and enumerated throw-out the CPS. There is no mention in this section of the option to add additional methods, or to make any major or meaningful change to the CP/CPS. Of course ComSign is obligated and WILL notify Mozilla of any meaningful change in its CP/CPS, but this is not relevant to this section. > * ComSign fails to document and operate test URLs compliant with Section The linked to the test URL's will be added to the CPS in the upcoming revision. They can be reviewd in the linked draft. > 2.2 of the Baseline Requirements, v1.3.1. > * ComSign has failed to document how CAA records are handled. While > ComSign was audited to v1.1.6 of the Baseline Requirements, and CAA was > not required until Ballot 125, which was incorporated into 1.2.0, ComSign > states in Section 10 that they adhere to the latest published version of > the Baseline Requirements (as the BRs require), which is demonstrably > false. ComSign's approach for handling CAA records will be stated in the upcoming revision of the CPS. In addition, we will amend the statement regarding the latest published version of the Baseline Requirements, to be the exact version which we comply with. Both these additions can be reviewd in the linked draft. > * Section 3.2.8.1.3 employs a validation method that, while permitted by > the Baseline Requirements at present, is recognized as a security risk and > is quite contentiously discussed within the CA/Browser Forum's Validation > Working Group. The use of methods like this have been used to cause > misissuance in the past, and for that reason the Mozilla community should > be suspicious about endorsing it, even if the BRs permit it. HTTP based Domain Control Validation is a method which is explicitly permitted by the Baseline Requirements, the Mozilla policy does not forbidden this method, and a number of well-known public CA's use this method. In accordance with these facts ComSign still reserved the right to use this method. > * Section 3.3.4 fails to document procedures for rejecting certificate > requests for the reasons documented in Section 4.1.1 of v1.3.1 of the > Baseline Requirements. ComSign's systems were audited according to "WebTrust for Certification Authorities - SSL Baseline Requirements" and the requirement in section 4.1.1 of the Baseline Requirements is covered by section 4.7 of the WebTrust criteria. However, due to an oversight the adherence to this section was not included in the CPS. This will be corrected in the upcoming CPS revision, and can be reviewd in the linked draft. > * Section 4.8.1 fails to enumerate the methods listed in Section 4.9.1.1 > of v1.3.1 of the Baseline Requirements. In the upcoming CPS revision we will specify additional revocation reasons in order to comply with section 4.9.1.1. They can be reviewd in the linked draft. > * Contrary to Section 4.9.3 of the Baseline Requirements, ComSign does not > appear to have documented a means to report suspected misissuance or > compromise. In the upcoming CPS revision we will specify the means to report such information in accordance with section 4.9.3. It can be reviewd in the linked draft. > * Section 10.15.15 permits the suspension of certificates, which is > contrary to Section 4.9.3 of v1.3.1 of the Baseline Requirements. Certificate suspension is a practice used by ComSign only in relation to personal certificates and not SSL certificates. In the upcoming CPS revision we will specify a clarification for the issue. It can be reviewd in the linked draft. Eli Spitzer, Information security & System Management, Comsign _______________________________________________ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy