Hello Jesus,

Great points!

> Reviewing the BR audit report of Comsign Ltd I have a few doubts regarding 
> the audits accepted by Mozilla and may someone can help me.
> 
> The BR audit was conducted according to the WebTrust forCertification 
> Authorites - SSL Baseline Requirements Audit Criteria version 1.1 and it's a 
> point-of-time (as of April 26, 2015).
> Although this audit criteria is accepted according to the Mozilla CA 
> Certificate Inclusion Policy 2.2, the BR audit version 1.1 was superseded by 
> Webtrust SSL Baseline with Network Security version 2.0 (effective for audit 
> periods starting on or after July 1, 2014).
> 
> Webtrust audit criteria states that "The point-in-time readiness assessment 
> shall be completed no earlier than twelve (12) months prior to issuing 
> Publicly-Trusted Certificates and shall be followed by a complete audit under 
> such scheme within ninety (90) days of issuing the first Publicly-Trusted 
> Certificate. (See SSL Baseline Requirements Section 17.4)". Should Mozilla 
> expect a complete audit 90 days after the point-in-time BR audit report or 
> after the first certificate (I don't know when was issued)?
 
Neither of the other audit reports I can find by Sharony - Shefler & Co, for 
"ComSign CA" (https://bugzilla.mozilla.org/attachment.cgi?id=868616) and 
"Comsign Secured CA" (https://bugzilla.mozilla.org/attachment.cgi?id=8686170), 
give an audit duration and only state a point in time.

Eli, please confirm when we can expect a period audit and what period it will 
cover.

> In addition and regarding the OCSP Responder certificate with Serial Number: 
> 0e:2b:cd:a4:aa:4f:8f:80:da:16:94:4e:ba:33:35:33, the validity is 3 years. 
> According the RFC 6960 "A CA may specify that an OCSP client can trust a 
> responder for the lifetime of the responder's certificate.  The CA does so by 
> including the extension id-pkix-ocsp-nocheck.  This SHOULD be a non-critical 
> extension. The value of the extension SHALL be NULL. CAs issuing such a 
> certificate should realize that a compromise of the responder's key is as 
> serious as the compromise of a CA key used to sign CRLs, at least for the 
> validity period of this certificate.  CAs may choose to issue this type of 
> certificate with a very short lifetime and renew it frequently." Which is the 
> maximum acceptable lifetime for this type of certificates that contains the 
> id-pkix-ocsp-nocheck extension?

Three years seems excessive, but doesn't appear to be uncommon:

http://ocsp.entrust.net 
            Not Before: Jun  4 19:15:34 2015 GMT
            Not After : Jun  4 19:45:34 2017 GMT

http://crl.quovadisglobal.com/qvocag2.crl
            Not Before: May 28 14:33:37 2014 GMT
            Not After : May 28 14:33:37 2017 GMT

And there are some are valid for much longer:

http://root-c3-ca2-2009.ocsp.d-trust.net
            Not Before: Jul  2 10:03:07 2013 GMT
            Not After : Nov  5 08:35:58 2029 GMT

It sounds like limiting the validity period of OCSP signing certs would be an 
excellent topic to discuss generally, but I don't consider it a blocking issue 
for this application.

Andrew
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to