Re: FNMT Root Inclusion Request

2016-02-05 Thread Kathleen Wilson

On 1/19/16 12:18 PM, Kathleen Wilson wrote:

On 1/15/16 4:42 AM, rafa...@gmail.com wrote:

Hi all.

We have developed a solution plan for this issues.


I believe that some of the concerns that were raised have been resolved,
and that the remaining open concerns are as follows. Please reply if I
missed any other items that still need to be resolved.

1) This root certificate has subordinate certificates that are not
technically constrained and not audited/disclosed according to sections
8-10 of Mozilla's CA Certificate Policy. The noted subCAs are "AC FNMT
Usuarios" (doesn't issue server certificates) and "ISA CA" (server
certificates are issued exclusively to a very restricted (almost
private) environment). Unless there are technical constraints on the
intermediate CA certificates representing those subCAs which make it
impossible for them to issue TLS or S/MIME certificates, they are
in-scope for this inclusion request, because they are a potential source
of mis-issuance which puts users of the Mozilla trust store at risk.


We are going to audit in-scope CAs. Finally our FNMT-RCM CAs hierarchy
audit scheme will be as follows:

+ AC RAIZ FNMT-RCM
+ AC Administración Pública
  - Issues: SSL certs, QCP certs
  - Audits: WebTrust for CAs, WebTrust SSL BRs, ETSI 101 456
+ AC Componentes Informáticos
  - Issues: SSL certs
  - Audits: WebTrust for CAs, WebTrust SSL BRs
+ AC FNMT Usuarios
  - Issues: issues QCP certs, not restricted by EKU extension
  - Audits: (ETSI 101 456 or WebTrust for CAS) and audit of
non-existence of SSL certs
+ ISA CA Will be revoked in early 2016
+ AC APE No longer used. Will be revoked in early 2016

As you can see, the two subCAs in-scope will be audited ("AC Usuarios)
and revoked ("ISA CA"). Also, "AC APE" which is no longer used will be
revoked


2) The allowed methods of verifying domain name ownership/control must
be in compliance with section 3.2.2.4 of version 1.3 (or later) of the
Baseline Requirements.


ISA CA is going to be revoked.

With this audit scheme, the remaining open issues would be solved.




I think this approach is reasonable, because I think the additional
annual audit check to ensure the AC FNMT Usuarios intermediate has not
issued SSL certs meets the intention of Mozilla's Policy and the BRs.

Does anyone see any problems with this approach?

Thanks,
Kathleen




Should I interpret the non-response to mean that everyone is OK with 
this approach?


Kathleen

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: More SHA-1 certs

2016-02-05 Thread Charles Reiss
On 02/05/16 21:14, Ben Wilson wrote:
> Aren't all of these CA certificates?

The links in the '#' column are to lists of BR-noncompliant
certificates; the links in the 'Issuer Name' column are to information
about the issuing DN+public key of those certificates.

> 
> -Original Message-
> From: dev-security-policy
> [mailto:dev-security-policy-bounces+ben=digicert@lists.mozilla.org] On
> Behalf Of martin.suc...@gmail.com
> Sent: Friday, February 5, 2016 1:13 PM
> To: mozilla-dev-security-pol...@lists.mozilla.org
> Subject: Re: More SHA-1 certs
> 
> Here's a list of all certificates with SHA-1 signatures and notBefore >=
> 2016-01-01, logged in the Certificate Transparency Log:
> https://crt.sh/?cablint=211&minNotBefore=2016-01-01
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
> 

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: More SHA-1 certs

2016-02-05 Thread Charles Reiss
On 02/05/16 20:13, martin.suc...@gmail.com wrote:
> Here's a list of all certificates with SHA-1 signatures and notBefore >= 
> 2016-01-01, logged in the Certificate Transparency Log:
> https://crt.sh/?cablint=211&minNotBefore=2016-01-01

Some notes on how these look as of now. The listed subCA CNs are:
- DOD CA-28
- DOD CA-27

These chain to DST ACES CA X6, see
https://bugzilla.mozilla.org/show_bug.cgi?id=1037590#c21 and
https://cabforum.org/pipermail/public/2016-February/006696.html


- Intel External Basic Issuing CA 3A

These chain through a technically constrained subordinate CA
https://crt.sh/?id=1250505


- Symantec Private SSL SHA1 CA

These chain to the 1024-bit VeriSign roots 'Class 3 Public Primary
Certification Authority' and 'Class 3 Public Primary Certification
Authority - G2' which are no longer included in Mozilla's root program.

Curiously, the similar COMODO CA 'COMODO Domain Validation Legacy Server
CA 2' (chains to retired root 'UTN - DATACorp SGC') appears to be
exempted from listing? (example cert:
https://crt.sh/?id=12584167&opt=cablint)


- VeriSign Class 3 Secure Server CA - G3
- VeriSign Class 3 International Server CA - G3

I believe these are the certs at
https://cabforum.org/pipermail/public/2016-January/006519.html or
precertificates for them.

- RSA Corporate Server CA v2
- DnB NOR ASA PKI Class G
- Shared Business CA 3
- TI Trust Technologies Global CA
- Postecom CS3
- Aetna Inc. Certificate Authority
- SHECA
- AC Infrastructure
- YourNet SSL for business
- Verizon Public SureServer CA G14-SHA1

These have been mentioned here previously.



___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: More SHA-1 certs

2016-02-05 Thread Ben Wilson
Also, aren't they issued prior to January 1, 2016?

-Original Message-
From: dev-security-policy
[mailto:dev-security-policy-bounces+ben=digicert@lists.mozilla.org] On
Behalf Of Ben Wilson
Sent: Friday, February 5, 2016 2:15 PM
To: martin.suc...@gmail.com; mozilla-dev-security-pol...@lists.mozilla.org
Subject: RE: More SHA-1 certs

Aren't all of these CA certificates?

-Original Message-
From: dev-security-policy
[mailto:dev-security-policy-bounces+ben=digicert@lists.mozilla.org] On
Behalf Of martin.suc...@gmail.com
Sent: Friday, February 5, 2016 1:13 PM
To: mozilla-dev-security-pol...@lists.mozilla.org
Subject: Re: More SHA-1 certs

Here's a list of all certificates with SHA-1 signatures and notBefore >=
2016-01-01, logged in the Certificate Transparency Log:
https://crt.sh/?cablint=211&minNotBefore=2016-01-01
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: More SHA-1 certs

2016-02-05 Thread Ben Wilson
Aren't all of these CA certificates?

-Original Message-
From: dev-security-policy
[mailto:dev-security-policy-bounces+ben=digicert@lists.mozilla.org] On
Behalf Of martin.suc...@gmail.com
Sent: Friday, February 5, 2016 1:13 PM
To: mozilla-dev-security-pol...@lists.mozilla.org
Subject: Re: More SHA-1 certs

Here's a list of all certificates with SHA-1 signatures and notBefore >=
2016-01-01, logged in the Certificate Transparency Log:
https://crt.sh/?cablint=211&minNotBefore=2016-01-01
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: More SHA-1 certs

2016-02-05 Thread martin . suchan
Here's a list of all certificates with SHA-1 signatures and notBefore >= 
2016-01-01, logged in the Certificate Transparency Log:
https://crt.sh/?cablint=211&minNotBefore=2016-01-01
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy