Dear All,

Let me reflect to some of the above points.

First of all, our public website is www.e-szigno.hu.
The webpage at https://srv.e-szigno.hu:4444/cgi-bin/editugyvedcsv.cgi
is a restricted page, it requires a client-side SSL certificate (with
certain values in the subject DN), so you should not be able to access
it.

I do not know of any (useful) tool capable of translating from
Hungarian to English. Please let me know if you find one.

OCSP:
-----
According to section 2 of RFC 2560, there are three ways to operate an
OCSP responder:
"
   All definitive response messages SHALL be digitally signed. The key
   used to sign the response MUST belong to one of the following:

   -- the CA who issued the certificate in question
   -- a Trusted Responder whose public key is trusted by the requester
   -- a CA Designated Responder (Authorized Responder) who holds a
      specially marked certificate issued directly by the CA,
indicating
      that the responder may issue OCSP responses for that CA
"

Later, in section 4.2.2.2 Authorized Responders, RFC 2560 gives more
requirements on using the third option, CA designated or authorized
responders. We do not use this third option.

We support the second option (Trusted Responder), where the requester
explicitly trusts the OCSP responder. (In our case the link of trust
is established by our CPS stating the the separate root can be trusted
for signing relevant OCSP responses.) I do not know of any statement
in RFC 2560 that requires the responder to be under the same root.

Based on the above, we consider our solution RFC 2560 conformant.

(We know of other similar solutions, e.g. openvalidation.org works
exactly this way.)

We had good reasons to choose this solution. According to Hungarian
regulations, a qualified CA is allowed to use its private key for the
following two purposes only:
* signing qualified end-user certificates and
* signing CRLs.
As neither 'signing OCSP responses', nor 'singing OCSP responder
certificates' is listed here, we were not allowed to support options 1
and 3 marked in RFC 2560, so only option 2 remained.

Our OCSP is used by our own customers for creating so-called 'archive
signatures' e.g. according to ETSI TS 101 903. (An archive signature
is timestamped and the necessary revocation information is also
attached to the signature. Certain signature policies require that the
revocation information needs to be issued _after_ the time of signing,
i.e. the point of time marked in the timestamp on the signature.)

We understand that our OCSP is not useful for the general public, so
we did not wish to include our OCSP root (and support for our OCSP) in
Mozilla.

If you consider that the OCSP URL in the AIA field poses a problem, we
can modify the profile of the SSL server certifictes so the AIA field
will not be included.


Unrecognized extensions:
------------------------
Our regulations require us to comply with European ETSI
specifications. Qualified certificates are one of the key concepts of
European PKI regulations and ETSI TS 101 862 defines the QCStatement
extension for marking a certificate to be qualified. According to ETSI
TS 101 862 this extension is mandatory.

This is not a Microsec-specific problem, it affects most of the other
European CAs who issue qualified certificates.

The QCStatement extension is *NOT* critical in our certificates.

Webserver and code signing certificates are generally non-qualified,
so they are not affected by this issue.


Liability:
----------
In our qualified certificates, the liability limit is included in the
certificate. The minimum value is ~5400 USD, the maximum value is ~1
million USD.

> They do not claim to include this information in non-qualified certs.

Our law does not allow us to do so.
We can include it in our CPS only.

> Apparently the absence of an explicit liability limit should be understood
> to mean no liability.

In our country this is exactly vice versa. If you do not state any
limit, your liability is unlimited. (This is a general and not a CA-
specific rule.)

In fact, the liability is unlimited anyway as you can limit it per
relying party only. If you limit your liability at $1, you may still
need to pay $1million for one million relying parties.

In case of class 3 non-qualified certificates this limit is ~$500.

> Any cert for which the issuer has no liability is a cert for which the
> issuer has no incentive to be accurate.  If a CA has no liability for
> doing so, what stops it for issuing lots of certs for paypal.com?

In fact, we agree that a CA should be responsible for certificates it
issues. Still, due to various reasons (mostly because other CAs limit
their liability to zero too), we need to offer class2 certificates
with zero liability too. Fortunately, we issue very few of these.

However, we refuse to issue webserver and code signing certificates as
class2, and we require them to be at least class3 (where the CP is
based on NCP or NCP+ and thus a face-to-face registration is used)
where our liability is non-zero.


> [1] Fun fact: Within Hungary names are normally given in "Eastern order"
> (i.e., like China or Japan) with surname first. In this case I've
> transposed to Western order (I think).

Sometimes we transpose our names ourselves, so that Western people can
figure out which one our first name is. Sometimes we meet people who
know that Hungarian names are written "the opposite" way, so they do
the transposition again.
Conclusion: in case of Hungarians you never know which the first name
and which the surname is. :)


Bye,

István

(this is my first name)
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to