This request is for inclusion of the Microsec e-Szigno Root CA 2017 trust anchor and to EV-enable the currently included Microsec e-Szigno Root CA 2009 trust anchor as documented in the following bug: https://bugzilla.mozilla.org/show_bug.cgi?id=1445364

BR Self Assessment is here: https://bugzilla.mozilla.org/attachment.cgi?id=9036567

Summary of Information Gathered and Verified: https://ccadb-public.secure.force.com/mozilla/PrintViewForCase?CaseNumber=00000274

Root Certificate Download URLs:
http://www.e-szigno.hu/rootca2017.crt
http://www.e-szigno.hu/rootca2009.crt

CP/CPS:
eIDAS conform Qualified Certificate for Website Authentication CP (EV): https://static.e-szigno.hu/docs/hr--min--ssl--EN--v2.13.pdf eIDAS conform Qualified Certificate for Website Authentication CPS (EV): https://static.e-szigno.hu/docs/szsz--min--ssl--EN--v2.13.pdf eIDAS conform Certificate for Website Authentication CP (DV, OV): https://static.e-szigno.hu/docs/hr--fok--ssl--EN--v2.13.pdf eIDAS conform Certificate for Website Authentication CPS (DV, OV): https://static.e-szigno.hu/docs/szsz--fok--ssl--EN--v2.13.pdf

This request is to include the 2017 root with the websites and email trust bits enabled, and to enable both roots for EV.

Test Websites for the 2017 root:
Valid: https://eqtlsca2018-valid.e-szigno.hu/
Expired: https://eqtlsca2018-expired.e-szigno.hu/
Revoked: https://eqtlsca2018-revoked.e-szigno.hu/

Test Websites for the 2009 root:
Valid: https://qtlsca2018-valid.e-szigno.hu/
Expired: https://qtlsca2018-expired.e-szigno.hu/
Revoked: https://qtlsca2018-revoked.e-szigno.hu/

CRL URLs:
http://rootca2017-crl1.e-szigno.hu/rootca2017.crl, http://rootca2017-crl2.e-szigno.hu/rootca2017.crl, http://rootca2017-crl3.e-szigno.hu/rootca2017.crl
http://rootca2009-crl1.e-szigno.hu/rootca2009.crl,
http://rootca2009-crl2.e-szigno.hu/rootca2009.crl, http://rootca2009-crl3.e-szigno.hu/rootca2009.crl

OCSP URLs:
http://rootca2017-ocsp1.e-szigno.hu, http://rootca2017-ocsp2.e-szigno.hu, http://rootca2017-ocsp3.e-szigno.hu
http://rootca2009-ocsp1.e-szigno.hu,
http://rootca2009-ocsp2.e-szigno.hu, http://rootca2009-ocsp3.e-szigno.hu

Audit: Annual audits are performed by TÜViT according to the ETSI 319 411 audit criteria.
Microsec e-Szigno Root CA 2017:
BR: https://www.tuvit.de/fileadmin/Content/TUV_IT/zertifikate/en/AA2019121302_e-Szigno-Root-CA-2017_V1.1_s.pdf EV: https://www.tuvit.de/fileadmin/Content/TUV_IT/zertifikate/en/AA2019061201_Microsec-eSzignoRoot-CA-2017_EV-CAs_s.pdf
Microsec e-Szigno Root CA 2009:
BR: https://www.tuvit.de/fileadmin/Content/TUV_IT/zertifikate/en/AA2019121301_Microsec-eSzignoRoot-CA-2009_V1.1_s.pdf EV: https://www.tuvit.de/fileadmin/Content/TUV_IT/zertifikate/en/AA2019121301_Microsec-eSzignoRoot-CA-2009_V1.1_s.pdf

Wayne performed the detailed review of the CPs, CPSs, BR Self Assessment, and related information for inclusion of the Microsec e-Szigno Root CA 2017 and the EV-enablement of the Microsec e-Szigno Root CA 2009 roots that are being tracked in this bug and he had the following comments:

==Meh==
* The subordinate CA certificates for this root were created in 2017 and 2018. None of those intended for serverAuth are constrained by EKU. Mozilla began requiring this in 2019.
* Microsec issued two certificates in 2018 with 3-year validity periods [1].
* There are roughly 20 policy documents for this hierarchy [2]. It is quite challenging to determine which documents apply to which types of certificates. The upcoming version of Mozilla policy states that “CAs must provide a way to clearly determine which CP and CPS applies to each of its root and intermediate certificates.” * CP section 1.3.2 permits 3rd party RAs, but in their BR Self-Assessment, Microsec states that “The Trust Service Provider do not apply third parties for RA activities.” * CPS section 4.9.5 provides a detailed explanation of the revocation process but fails to mention the required preliminary report to the Subscriber and the entity who filed the Certificate Problem Report. * CPS section 4.9.1 contains a section titled “Reasons for Revoking a Subordinate CA Certificate operated by another CA” but in their BR Self-assessment, Microsec states that “All Subordinate CA-s under the Microsec roots are operated by Microsec.”

==Bad==
* I was unable to locate the description of email address validation practices required by Mozilla policy section 2.2. Microsec published new CPS version adding section 3.2.7 to resolve this issue. * Microsec recently issued what appears to be two certificate used for testing that violate the BRs [3][4]. They are now expired.
* CCADB currently lists 9 audit letter validation failures for Microsec.
* The root contains subject L and organizationIdentifier fields which are arguably in violation of BR 7.1.4.3 [5]. Some, if not all, of the subCAs also exhibit this issue. * BR section 4.9.3 requires CPS section 1.5.2 to contain instructions for reporting an issue such as key compromise to the CA. The Microsec CPS’ only state that questions related to the policy may be reported via the info in that section, and other email addresses (“highprioritycertificateproblemrep...@e-szigno.hu”, “revocat...@e-szigno.hu") are found in other sections of some documents. Section 4.9.5 then states that revocation requests are only accepted at the address listed in section 1.2, but there is no email address in this section. * Three EV (QWAC) certificates have been issued with an extra subject:serialNumber field that contains what appears to be a policy OID [6]. Only one is currently revoked. * In comment #18 of the inclusion bug dated January 2019, Microsec confirms that their CPS did not contain the required CAA information, despite Microsec being a Mozilla root program member at that time.

* The following non-conformities were listed in the 2018 BR attestation statement [7]. (they are not defined as “major” or “minor”): ** The TSP shall remove irrelevant and confusing information from each policy (e.g. explanation of how to create policy codes) [ETSI EN 319 401, REQ-6.1-01] ** The TSP shall clearly indicate which kind of documents are necessary for the application procedures of different types of certificates. [ETSI EN 319 401, REQ-6.1-01] ** The TSP shall maintain such asset list which can support the daily operation and does not cover unnecessary elements (e.g. mouse, keyboard) [ETSI EN 319 401, REQ-7.3.1-01, REQ-7.3.1-02]•The TSP shall ensure that the password policy provisions are applied in all systems in the TSP and shall review them periodically. [ETSI EN 319 401, REQ-7.4-06] ** The TSP shall move the videoserver from the secondary data center to another secure location without IT administrator access and shall review the records on regular basis. [ISO27001], [ETSI EN 319 401, REQ-7.6-03] ** The TSP shall check operational state of the CCTV system regularly. [ETSI EN 319 401, REQ-7.6-03]•The TSP shall extend the Termination Plan to all services mentioned in the CPSs. [ETSI EN 319 401, REQ-7.12-02] ** The TSP shall check the possibilities to store and review video logs for a longer period of time. [ETSI EN 319 411-1, OVR-6.4.2-07] The TSP shall maintain dual control for performing critical functions on the core systems (including Root CA, intermediate CAs, archiving system, TSA system, OCSP responders etc.) [ETSI EN 319 411-1, GEN-6.4.3-02, OVR-6.4.8-07, GEN-6.5.1-04, GEN-6.5.2-06] ** The TSP shall develop a restoration plan which schedules the restoration over time to cover every system. [ETSI 319 411-1, OVR-6.4.8-05] ** The TSP shall approve and publish the latest version of its CP und CPS documents. [ETSI EN 319 401, REQ-6.1-05] ** The TSP shall modify the web application form and the registration interface in such a way that it is clearly indicated what kind of information are required for the issuance of the given certificate in accordance with the policies. Misleading information shall be avoided. [ETSI EN 319 401, REQ-6.1-01] * The following minor non-conformities are listed in the 2018 EV attestation statement [8]: ** Findings with regard to ETSI EN 319 401: 7.11 Business continuity management Documentation and implementation of the generation of the OCSP certificates within the BCP document shall be improved. [ETSI EN 319 401, Clause 7.11] ** Findings with regard to ETSI EN 319 411-1: 6.2 Identification and authentication Documentation and implementation of the internal guideline with regard to the verification of possible organizations shall be improved. [ETSI EN 319 411-1, Clause 6.2.2 a), g), i)] [EVCG, Clause 11.1.1, Point 1. (A)] [ETSI EN 319 411-1, Clause 6.2.2 a)]

* The following non-conformities were listed in the 2019 BR attestation statement [9]: ** The TSP shall not issue non-compliant test certificates from the live environment. As this has been occurred in the past, the TSP shall provide evidences of the changed testing procedures to avoid further occurrence of such events. [ETSI EN 319 401, REQ-6.1-07] ** The TSP shall ensure that all issuance of a qualified signature comply with eIDAS Article 24 in each case. [ETSI EN 319 411-1, REG-6.2.3-01] ** The TSP shall ensure that all issuance of a qualified certificate comply with eIDAS Article 24 when TSP accepts certificate re-keying requests as written mail with handwritten (wet) signatures via postal services and any of the subject’s data is changed. [ETSI EN 319 411-1, REG-6.2.3-01] ** The TSP shall review the re-keying procedure in the CPS and shall align the CPS with the real process-es and the relating standards. [ETSI EN 319 411-1, REG-6.2.3-02] ** The TSP shall ensure that the reusing procedure of all data fulfills the EVCG 11.14 and the CPS corresponds to these reusing requirements. [ETSI EN 319 411-1, REG-6.2.3-03] ** There are conflicts between Hungarian law and EV Guideline regarding to the witnessing the root ca key generation by a Qualified Auditor, the TSP must inform the CAB/Forum about this fact. [ETSI 319 411-1 GEN-6.5.1-14], [BRG, 9.16.3], [EVCG, 8.1], [EVCG, 17.7] ** The TSP shall present a mitigation plan to revoke and replace the non-conforming certificates with exponent 101. [ETSI EN 319 411-1, SDP-6.5.1-18] * The following minor non-conformities are listed in the 2019 EV attestation statement [10]: ** Documentation and implementation of the generation of the OCSP certificates within the BCP document shall be improved. [ETSI EN 319 401, Clause 7.11] ** Documentation and implementation of the internal guideline with regard to the verification of possible organizations shall be improved. [ETSI EN 319 411-1, Clause 6.2.2 a), g), i)] [EVCG, Clause 11.1.1, Point 1. (A)] [ETSI EN 319 411-1, Clause 6.2.2 a)]


This begins the 3-week comment period for this request [11].

I will greatly appreciate your thoughtful and constructive feedback on the acceptance of this root into the Mozilla CA program.

- Kathleen

[1] https://bugzilla.mozilla.org/show_bug.cgi?id=1512270
[2] https://e-szigno.hu/en/all-documents.html
[3] https://crt.sh/?id=1947655126&opt=zlint,ocsp
[4] https://crt.sh/?id=1947655112&opt=zlint,ocsp
[5] https://cabforum.org/pipermail/servercert-wg/2019-October/001154.html
[6] https://crt.sh/?cablint=225&iCAID=115482&minNotBefore=2017-01-01
[7] https://www.tuvit.de/fileadmin/Content/TUV_IT/zertifikate/en/AA2018121303_Microsec-eSzignoRoot-CA-2017_nonEV-CAs_s.pdf [8] https://www.tuvit.de/fileadmin/Content/TUV_IT/zertifikate/en/AA2019061201_Microsec-eSzignoRoot-CA-2017_EV-CAs_s.pdf [9] https://www.tuvit.de/fileadmin/Content/TUV_IT/zertifikate/en/AA2019121302_e-Szigno-Root-CA-2017_V1.1_s.pdf [10] https://www.tuvit.de/fileadmin/Content/TUV_IT/zertifikate/en/AA2019061201_Microsec-eSzignoRoot-CA-2017_EV-CAs_s.pdf
[11] https://wiki.mozilla.org/CA/Application_Process

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to