Re: ComSign Root Renewal Request

2016-03-29 Thread Andrew Whalley
Hello Jesus,

Great points!

> Reviewing the BR audit report of Comsign Ltd I have a few doubts regarding 
> the audits accepted by Mozilla and may someone can help me.
> 
> The BR audit was conducted according to the WebTrust forCertification 
> Authorites - SSL Baseline Requirements Audit Criteria version 1.1 and it's a 
> point-of-time (as of April 26, 2015).
> Although this audit criteria is accepted according to the Mozilla CA 
> Certificate Inclusion Policy 2.2, the BR audit version 1.1 was superseded by 
> Webtrust SSL Baseline with Network Security version 2.0 (effective for audit 
> periods starting on or after July 1, 2014).
> 
> Webtrust audit criteria states that "The point-in-time readiness assessment 
> shall be completed no earlier than twelve (12) months prior to issuing 
> Publicly-Trusted Certificates and shall be followed by a complete audit under 
> such scheme within ninety (90) days of issuing the first Publicly-Trusted 
> Certificate. (See SSL Baseline Requirements Section 17.4)". Should Mozilla 
> expect a complete audit 90 days after the point-in-time BR audit report or 
> after the first certificate (I don't know when was issued)?
 
Neither of the other audit reports I can find by Sharony - Shefler & Co, for 
"ComSign CA" (https://bugzilla.mozilla.org/attachment.cgi?id=868616) and 
"Comsign Secured CA" (https://bugzilla.mozilla.org/attachment.cgi?id=8686170), 
give an audit duration and only state a point in time.

Eli, please confirm when we can expect a period audit and what period it will 
cover.

> In addition and regarding the OCSP Responder certificate with Serial Number: 
> 0e:2b:cd:a4:aa:4f:8f:80:da:16:94:4e:ba:33:35:33, the validity is 3 years. 
> According the RFC 6960 "A CA may specify that an OCSP client can trust a 
> responder for the lifetime of the responder's certificate.  The CA does so by 
> including the extension id-pkix-ocsp-nocheck.  This SHOULD be a non-critical 
> extension. The value of the extension SHALL be NULL. CAs issuing such a 
> certificate should realize that a compromise of the responder's key is as 
> serious as the compromise of a CA key used to sign CRLs, at least for the 
> validity period of this certificate.  CAs may choose to issue this type of 
> certificate with a very short lifetime and renew it frequently." Which is the 
> maximum acceptable lifetime for this type of certificates that contains the 
> id-pkix-ocsp-nocheck extension?

Three years seems excessive, but doesn't appear to be uncommon:

http://ocsp.entrust.net 
Not Before: Jun  4 19:15:34 2015 GMT
Not After : Jun  4 19:45:34 2017 GMT

http://crl.quovadisglobal.com/qvocag2.crl
Not Before: May 28 14:33:37 2014 GMT
Not After : May 28 14:33:37 2017 GMT

And there are some are valid for much longer:

http://root-c3-ca2-2009.ocsp.d-trust.net
Not Before: Jul  2 10:03:07 2013 GMT
Not After : Nov  5 08:35:58 2029 GMT

It sounds like limiting the validity period of OCSP signing certs would be an 
excellent topic to discuss generally, but I don't consider it a blocking issue 
for this application.

Andrew
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: March 2016 CA Communication

2016-03-29 Thread Kathleen Wilson
The email has been sent to the Primary POC of each CA with root certs currently 
included in Mozilla's program.

I also posted a security blog about this:
https://blog.mozilla.org/security/2016/03/29/march-2016-ca-communication/

Thanks,
Kathleen


___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


March 2016 CA Communication

2016-03-29 Thread Kathleen Wilson
The March 2016 CA Communication is ready to be sent.  

An example of the email that will be sent to the CAs is here:
https://wiki.mozilla.org/CA:Communications#March_2016
After the first sentence there will also be 
Certification Authority: 
Primary Point of Contact: 

On the wiki page there is: 'Link to full March 2016 CA Communication'
That link will not be in the email sent to the CAs, because the CAs will see 
the full communication in Salesforce.

I will send the email to the Primary Point of Contact for each CA, because each 
Primary POC has a CA Community Saleforce license, and is responsible for 
completing the survey.

The links to the reports about the survey responses will be here soon:
https://wiki.mozilla.org/CA:Communications#March_2016_Responses

Thanks to all of you who contributed to the creation of this CA Communication.

Kathleen
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy