Re: Audit Reminder Email Summary

2018-08-21 Thread Kathleen Wilson via dev-security-policy

 Forwarded Message 
Subject: Summary of August 2018 Audit Reminder Emails
Date: Tue, 21 Aug 2018 19:00:10 + (GMT)

Mozilla: Audit Reminder
Root Certificates:
   AC Raíz Certicámara S.A.
Standard Audit: https://cert.webtrust.org/SealFile?seal=2333&file=pdf
Audit Statement Date: 2017-08-09
CA Comments: null



Mozilla: Audit Reminder
Root Certificates:
   Certinomis - Root CA
Standard Audit: 
https://bug937589.bmoattachments.org/attachment.cgi?id=8898169

Audit Statement Date: 2017-07-24
BR Audit: https://bug937589.bmoattachments.org/attachment.cgi?id=8898169
BR Audit Statement Date: 2017-07-24
CA Comments: null



Mozilla: Audit Reminder
Root Certificates:
   E-Tugra Certification Authority
Standard Audit: 
https://www.e-tugra.com.tr/Portals/6/Documents/LSTIAL_ETugra_2017.pdf

Audit Statement Date: 2017-09-09
BR Audit: 
https://www.e-tugra.com.tr/Portals/6/Documents/LSTIAL_ETugra_2017.pdf

BR Audit Statement Date: 2017-09-09
EV Audit: 
https://www.e-tugra.com.tr/Portals/6/Documents/LSTIAL_ETugra_2017.pdf

EV Audit Statement Date: 2017-09-09
CA Comments: null



Mozilla: Audit Reminder
Root Certificates:
   Go Daddy Class 2 CA
   Go Daddy Root Certificate Authority - G2
   Starfield Class 2 CA
   Starfield Root Certificate Authority - G2
Standard Audit: https://cert.webtrust.org/SealFile?seal=2332&file=pdf
Audit Statement Date: 2017-08-31
BR Audit: https://cert.webtrust.org/SealFile?seal=2332&file=pdf
BR Audit Statement Date: 2017-08-31
EV Audit: https://cert.webtrust.org/SealFile?seal=2332&file=pdf
EV Audit Statement Date: 2017-08-31
CA Comments: null



Mozilla: Audit Reminder
Root Certificates:
   ACCVRAIZ1
Standard Audit: https://cert.webtrust.org/SealFile?seal=2299&file=pdf
Audit Statement Date: 2017-07-28
BR Audit: https://cert.webtrust.org/SealFile?seal=2300&file=pdf
BR Audit Statement Date: 2017-07-28
CA Comments: Per CA request, Root CA Generalitat Valenciana will be 
removed via https://bugzilla.mozilla.org/show_bug.cgi?id=1272158




Mozilla: Audit Reminder
Root Certificates:
   IdenTrust Commercial Root CA 1**
   IdenTrust Public Sector Root CA 1**
   DST Root CA X3**

** Audit Case in the Common CA Database is under review for this root 
certificate.


Standard Audit: https://cert.webtrust.org/SealFile?seal=2331&file=pdf
Audit Statement Date: 2017-08-31
BR Audit: https://cert.webtrust.org/SealFile?seal=2334&file=pdf
BR Audit Statement Date: 2017-09-18
CA Comments: null



Mozilla: Audit Reminder
Root Certificates:
   Izenpe.com
Standard Audit: 
http://www.izenpe.eus/contenidos/informacion/auditorias_acreditaciones/en_def/adjuntos/6757_Izenpe_Browser_Attestation_2017.pdf

Audit Statement Date: 2017-07-25
BR Audit: 
http://www.izenpe.eus/contenidos/informacion/auditorias_acreditaciones/en_def/adjuntos/6757_Izenpe_Browser_Attestation_2017.pdf

BR Audit Statement Date: 2017-07-25
EV Audit: 
http://www.izenpe.eus/contenidos/informacion/auditorias_acreditaciones/en_def/adjuntos/6757_Izenpe_Browser_Attestation_2017.pdf

EV Audit Statement Date: 2017-07-25
CA Comments: null



Mozilla: Audit Reminder
Root Certificates:
   OpenTrust Root CA G1
   OpenTrust Root CA G2
   Certplus Root CA G1
   Class 2 Primary CA
   OpenTrust Root CA G3
   Certplus Root CA G2
Standard Audit: 
https://bug1297034.bmoattachments.org/attachment.cgi?id=8916590

Audit Statement Date: 2017-07-24
BR Audit: https://bug1297034.bmoattachments.org/attachment.cgi?id=8916590
BR Audit Statement Date: 2017-07-24
CA Comments: null



Mozilla: Audit Reminder
Root Certificates:
   SECOM Trust.net - Security Communication RootCA1
   Security Communication RootCA2
Standard Audit: https://cert.webtrust.org/SealFile?seal=2321&file=pdf
Audit Statement Date: 2017-08-31
BR Audit: https://cert.webtrust.org/SealFile?seal=2323&file=pdf
BR Audit Statement Date: 2017-08-31
EV Audit: https://cert.webtrust.org/SealFile?seal=2322&file=pdf
EV Audit Statement Date: 2017-08-31
CA Comments: null



Mozilla: Overdue Audit Statements
Root Certificates:
   SwissSign Platinum CA - G2**

** Audit Case in the Common CA Database is under review for this root 
certificate.


Standard Audit: https://bugzilla.mozilla.org/attachment.cgi?id=8861552
Audit Statement Date: 2017-03-30
BR Audit: https://bugzilla.mozilla.org/attachment.cgi?id=8861552
BR Audit Statement Date: 2017-03-30
CA Comments: null



Mozilla: Audit Reminder
Root Certificates:
   Visa eCommerce Root
Standard Audit: http://enroll.visaca.com/WTCA%20eComm.pdf
Audit Statement Date: 2017-07-26
BR Audit: http://enroll.visaca.com/WTBR%20eComm.pdf
BR Audit Statement Date: 2017-07-26
CA Comments: null



Mozilla: Audit Reminder
Root Certificates:
   SSL.com EV Root Certification Authority ECC
   SSL.com Root Certification Authority ECC
   SSL.com Root Certification Authority RSA
   SSL.com EV Root Certification Authority RSA R2
Standard Audit: 
https://www.ssl.com/app/uploads/2017/07/SSL-COM-WTCA-Indp-Accountant-Report-and-Mgmt-Assertion-FINAL-2017.pd

Re: Telia CA - problem in E validation

2018-08-21 Thread Jakob Bohm via dev-security-policy

On 21/08/2018 16:54, Tim Hollebeek wrote:

There are lots of useful ways to publish unverified and potentially
inaccurate information.

Putting that information into a certificate signed by a public Certificate
Authority is
not one of them.

By the way, OUs need to be accurate as well, not just "partially verified",
so you might
want to look into that part of your processes as well.


Just curious, what validation procedure would apply to legitimate OU
values like:

"HQ" or "Datacenter 3" or "Sales"

And which ones would apply to uniqueness OUs like:

"2019-Apr" indicating this is the certificate requested in April 2019,
not the otherwise identical certificates requested in February 2019 and
June 2019?




BR 7.1.4.2: "By issuing the Certificate, the CA represents that it followed
the procedure
set forth in its Certificate Policy and/or Certification Practice Statement
to verify that, as
of the Certificate's issuance date, all of the Subject Information was
accurate."

-Tim


-Original Message-
From: dev-security-policy 

On

Behalf Of pekka.lahtiharju--- via dev-security-policy
Sent: Tuesday, August 21, 2018 10:45 AM
To: mozilla-dev-security-pol...@lists.mozilla.org
Subject: Re: Telia CA - problem in E validation

I believe it has been useful to our users even though it was only

partially

verified like OU. Now when it no more exists it certainly won't provide

any help

to anybody.





Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: Telia CA - problem in E validation

2018-08-21 Thread Tim Hollebeek via dev-security-policy
There are lots of useful ways to publish unverified and potentially
inaccurate information.

Putting that information into a certificate signed by a public Certificate
Authority is
not one of them.

By the way, OUs need to be accurate as well, not just "partially verified",
so you might
want to look into that part of your processes as well.

BR 7.1.4.2: "By issuing the Certificate, the CA represents that it followed
the procedure 
set forth in its Certificate Policy and/or Certification Practice Statement
to verify that, as 
of the Certificate's issuance date, all of the Subject Information was
accurate."

-Tim

> -Original Message-
> From: dev-security-policy 
On
> Behalf Of pekka.lahtiharju--- via dev-security-policy
> Sent: Tuesday, August 21, 2018 10:45 AM
> To: mozilla-dev-security-pol...@lists.mozilla.org
> Subject: Re: Telia CA - problem in E validation
> 
> I believe it has been useful to our users even though it was only
partially
> verified like OU. Now when it no more exists it certainly won't provide
any help
> to anybody.
> 
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://clicktime.symantec.com/a/1/tLUDvyC5tYQiVfqxZIo-c6Uq1a-
> jYOSGbZgRSHyUu1I=?d=zx9qYFefn2ZoXZK3hmoD2hX8Ch__jFtWDZM2CKgWQJ
> Ch5jZYL0ITP0GCk4W9UJI_8nQ6wryVSVMb4y504R9AbIRgEYDp_Umfk051kQR7s
> GVVgzxufqgL7iW3mtbBnroiKhwVEtkMa0IAxmXRTpWu9-
> pldvu8X2WSILON7AWHr-Twz3K3XJ0Ta9hXzKo2YjG4Qhxied-
> um1T97LsQ8H4mpGKC-
> zWuvaCTASohQCwcYAYMEhBqMfI9QS5AYzG3Ba5k10Kum32iQh9lrzUZP-
> 1JnjpJ8PRepHhaa7uNWbZbK_3JMKc_e6PKjA7dXMIqsa846_H9JlvO8TS4cmrHLv
> U0EkO0yv8s75TfAUqiRJlODRxOdcmNpG7-IByKbQxcsYwj1ZFmGkThjIl0AVQ_Y-
> GBp7X48byWDcHqqEkf10tsuQ%3D%3D&u=https%3A%2F%2Flists.mozilla.org%
> 2Flistinfo%2Fdev-security-policy


smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Telia CA - problem in E validation

2018-08-21 Thread pekka.lahtiharju--- via dev-security-policy
I believe it has been useful to our users even though it was only partially 
verified like OU. Now when it no more exists it certainly won't provide any 
help to anybody. 

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: Telia CA - problem in E validation

2018-08-21 Thread Tim Hollebeek via dev-security-policy
Yeah, but unvalidated "information" is not "informative" in any useful way.

-Tim

> -Original Message-
> From: dev-security-policy 
On
> Behalf Of pekka.lahtiharju--- via dev-security-policy
> Sent: Tuesday, August 21, 2018 9:59 AM
> To: mozilla-dev-security-pol...@lists.mozilla.org
> Subject: Re: Telia CA - problem in E validation
> 
> The purpose of this E value and SAN-rfc822 value is completely different.
The
> former is typically an information to server users where is its support.
The
> latter for email messaging. Thus it is natural that the verification
requirements
> of those two fields are also different (like they are).
> 
> I completely agree that verification of SAN-rfc822 has to be
challenge-response
> or domain based but the same doesn't apply to this E which is only
informative
> field like OU.
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://clicktime.symantec.com/a/1/L6gW5CkSOwyu-
> 5hl92vrKoozZhevZGTi1bqkARk0lDA=?d=tcaVpOxV1GZEsht-O5I-
> U1jUfOFbghk57eRNA4QIgc3Uw4rUol-c03Y4fMcVWJF1ZerQdZi4v4h-np-
> 1dARE42nMHSf8aUFNZjD_8NbzDyxU48VdpbKSdRNuh9TCm1_xS39jm-
> iu5N39wqrGYHD09F1LIinG2AXeJODvae0i3tBZynuZyDpFRwK5fgr87sR8O6J9gzW
> vb6SiokKC-
> 2Vd7BTaTuruLtXnLBM25IHfj77EQICOI2CKxe3iYbKmYS7XsoLfUBjpvdbXQ7AwL9
> sV56X2vvD74hClclwAD85eyRj5DtN6_7eqs95arC4rNn3vVKlBuXwUv5M83ljY_sFi
> EBHNG0-8TOuURHS9h-
> L841SrtQumQ8qWSMjOCKHG2Jnn8Xr2OOLWnoY7ZKVoGhEmT7RD8NgG29ipn
> F320B_Lcw%3D%3D&u=https%3A%2F%2Flists.mozilla.org%2Flistinfo%2Fdev-
> security-policy


smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Telia CA - problem in E validation

2018-08-21 Thread pekka.lahtiharju--- via dev-security-policy
The purpose of this E value and SAN-rfc822 value is completely different. The 
former is typically an information to server users where is its support. The 
latter for email messaging. Thus it is natural that the verification 
requirements of those two fields are also different (like they are). 

I completely agree that verification of SAN-rfc822 has to be challenge-response 
or domain based but the same doesn't apply to this E which is only informative 
field like OU.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: Telia CA - problem in E validation

2018-08-21 Thread Tim Hollebeek via dev-security-policy
Previous discussions on this list, which all CAs are required to follow,
have made
it clear that either challenge-response or domain validation is sufficient
to meet
Mozilla's policy for e-mail addresses.

Yes, the context was SMIME validation, but I am very troubled to hear that
instead of using the same rules for E validation, a CA would argue that it's
appropriate or allowed to do virtually no validation at all.  It's not.

-Tim

> -Original Message-
> From: dev-security-policy 
On
> Behalf Of pekka.lahtiharju--- via dev-security-policy
> Sent: Tuesday, August 21, 2018 9:41 AM
> To: mozilla-dev-security-pol...@lists.mozilla.org
> Subject: Re: Telia CA - problem in E validation
> 
> The first item in Mozilla policy is impossible for all CAs related to E
verification
> because there aren't any valid independent sources to check support email
> addresses. You potentially could validate only domain part of the email
address
> which doesn't cover the requirement that ALL information must be verified
> from such source. Most persons in this discussion have recommended using
> challenge-response method in E verification but I'm afraid it is also
against
> Mozilla requirement 2.1step1 because no independent source or similar is
> involved.
> 
> The second item in Mozilla policy is not valid because these SSL
certificates are
> not capable in email messaging. It is clear for SMIME certificates and
with them
> we follow it.
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://clicktime.symantec.com/a/1/_lQ2yVFZFmZcMjnytNPPhWO033O4qV_A
> d55EzA51Pnk=?d=Y3bT5wPI37DMxsvQ8o4N0HWiVOyK-
> eNjbf7Jxhf7xvbeeJ8yf2cm7BADzRYUkQBvJRPouhxTXVjeAHvJIbLkG1NtZ1dnYnq
> Y9ml3RxSoU8xz4soa15OSeMmOPKzQVmJY7ww9X4cgmfNXg_uQol0UxeXzoYO
> yGMgMGSxVEC9cnLih0UOrXrJ5LjeSUxitIBgvH5FkQI1xfXEjNw9wtpbPvdyEhaqo
> ON0bDkt0yC_Hu_UdML9zgpKAP49LuY60sd9_6Qq96a8c8-
> fyjS0hTrOnMPIXsWafHYDN9NT4eHV5nEf1efk9v28xBU02Kv-
> J_s5IwNByYW_TzPwQUEE4faBuitNYmCr_sJkSY2jMpE3xWHJxAGZWtkcKHHOm
> gv6V4X3GGPDexnyYYzEaV2tSYdUJi7zc-uno0zG9-
> CjM7SqOuA%3D%3D&u=https%3A%2F%2Flists.mozilla.org%2Flistinfo%2Fdev-
> security-policy


smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Telia CA - problem in E validation

2018-08-21 Thread pekka.lahtiharju--- via dev-security-policy
The first item in Mozilla policy is impossible for all CAs related to E 
verification because there aren't any valid independent sources to check 
support email addresses. You potentially could validate only domain part of the 
email address which doesn't cover the requirement that ALL information must be 
verified from such source. Most persons in this discussion have recommended 
using challenge-response method in E verification but I'm afraid it is also 
against Mozilla requirement 2.1step1 because no independent source or similar 
is involved.

The second item in Mozilla policy is not valid because these SSL certificates 
are not capable in email messaging. It is clear for SMIME certificates and with 
them we follow it.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: Telia CA - problem in E validation

2018-08-21 Thread Tim Hollebeek via dev-security-policy
The BRs indeed do not have many requirements about the validation of email
addresses, but Mozilla policy is much more proscriptive here.  See, for
example, the first two items of section 2.2.

These make it pretty clear that unverified addresses are prohibited by
Mozilla policy, and validation of email addresses is not just a "best
practice"; it's required.

-Tim

> -Original Message-
> From: dev-security-policy 
On
> Behalf Of pekka.lahtiharju--- via dev-security-policy
> Sent: Tuesday, August 21, 2018 6:18 AM
> To: mozilla-dev-security-pol...@lists.mozilla.org
> Subject: Re: Telia CA - problem in E validation
> 
> I agree that this culminates to what does it mean when requirement is
"verified
> by CA". When that is not specified anywhere and specifically not in E
validation
> chapter of BR I have interpreted that also weak E verification methods are
> acceptable. I understand that it would be "nice" to use stronger methods
but
> the point is that is it "illegal" to use weak method when such method is
not
> prohibited.
> 
> In our old process we have accepted personal addresses because in some
cases
> a single person is really the "support point" of a server. In practise
personal
> address has only been accepted if the same person is also the technical or
> administrative contact of the application. If anybody would complain or we
> notice in our visual check that the name or address can't be correct we
revoke
> or don't accept. In practice there hasn't been any complaints ever related
to
> our approved E values (except now in the this discussion). Note that all
used E
> values have originated from authenticated customers' CSR.
> 
> Note! Because we want to follow "best practices" we have already stopped
> using these weak methods based on these discussions.
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://clicktime.symantec.com/a/1/M8RQ_FBpnEWessS6VTb2TML0gjx1vzlJ-
> To0H9f1Upk=?d=mm6rf8hUuQt34DHH-
> 53_nlyLzE85Upq8F9coCGaDGTmCGJqbCuAdYHeE6BZrlgL64266orhG4-
> qpaAxW71xS5LPicNsPA_DXJT563uavmGor9blfsKv5oGec1ZEtL6DeN_B2af59ky
> WJgTwRpJgPyaePtW0bS56tNfBkLD37-
> _2hgrxOetTnhO0RZE_zIAMg5JQcDNT7HI1pv-
> VWy3I8yTyEv6uw4jcgBZnvM1M8tEXKyVuA9YACauy_kKPqA96LdRL15tLb65uhB
> KHNxSLMNPu3DyrV7cqoOYtj5T0WnlzQCvr8w5KvOuRlrR3p9Em4zmnyGVioHn6
> 64CTycuByUDrGAL6BB806izNaJ_mduZaFq5fgCRIz1Cyjo-
> 0WVWuWqcwLrJFX0Ro-
> 4igDlcfMXvP_f1rwhPByjdggp4xXTQ%3D%3D&u=https%3A%2F%2Flists.mozilla.
> org%2Flistinfo%2Fdev-security-policy


smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Telia CA - problem in E validation

2018-08-21 Thread pekka.lahtiharju--- via dev-security-policy
I agree that this culminates to what does it mean when requirement is "verified 
by CA". When that is not specified anywhere and specifically not in E 
validation chapter of BR I have interpreted that also weak E verification 
methods are acceptable. I understand that it would be "nice" to use stronger 
methods but the point is that is it "illegal" to use weak method when such 
method is not prohibited.

In our old process we have accepted personal addresses because in some cases a 
single person is really the "support point" of a server. In practise personal 
address has only been accepted if the same person is also the technical or 
administrative contact of the application. If anybody would complain or we 
notice in our visual check that the name or address can't be correct we revoke 
or don't accept. In practice there hasn't been any complaints ever related to 
our approved E values (except now in the this discussion). Note that all used E 
values have originated from authenticated customers' CSR.

Note! Because we want to follow "best practices" we have already stopped using 
these weak methods based on these discussions.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Telia CA - problem in E validation

2018-08-21 Thread Dimitris Zacharopoulos via dev-security-policy

Dear Pekka,

"verified by the CA" seems to be the weak point here. What does 
"verified by the CA" mean?


The community seems to interpret this as actions by the CA to verify 
that the information requested to be included in the certificate by the 
Applicant, is actually real and owned/controlled by the Applicant. As 
others already mentioned, CAs usually follow some kind of 
challenge-response process to prove that the email address is real and 
owned/controlled by the Applicant.


You seem to interpret this as "our RA officers look at the address that 
the Applicant requested to be included in the certificate and if it 
appears to have a correct email address syntax (something followed by an 
'@' and then a domain), accept it and include it in the certificate". Is 
this an accurate description of your process? If someone requested a 
Certificate to include "pekka.lahtiha...@teliasonera.com", which seems 
like a legitimate email address, wouldn't you approve it? If not, why not?



Dimitris.



On 21/8/2018 11:53 πμ, pekka.lahtiharju--- via dev-security-policy wrote:

In my opinion we follow BR. Here is why:  I think that the first chapter of  7.1.4.2 it 
says that "...CA represents it followed the procedure set forth in its Certificate 
Policy and/or Certification Practice Statement to verify...". That is exactly what 
we do because we have explained in our CPS how E is verified (check below). Perhaps the 
process description in CPS could be better but anyway the descriptions are there 
including the fact that email (domain) ownership hasn't been always verified. More 
detailed E process description has been in this discussion.

Then BR 7.1.4.2.j specifies how E should be verified for SSL certificates:

"All other optional attributes, when present within the subject field, MUST 
contain information that has
been verified by the CA. Optional attributes MUST NOT contain metadata such as 
‘.’, ‘-‘, and ‘ ‘ (i.e. space)
characters, and/or any other indication that the value is absent, incomplete, or not 
applicable."

In our opinion we follow also completely that chapter because we do two kind of 
verifications to E values and also we prevent meta data values like required. 
Note that it is not prohibited in BR text to use our methods. I still can't 
understand what is the exact BR detail that hasn't been followed by us? We 
haven't verified everything (specifically E) perfectly but we have followed our 
CPS and our E process has been written to be compatible to current BR 7.1.4.2.j.

Our current CPS v2.1 has E verification documentation mostly in chapter "3.2.4 
Non-verified Subscriber Information" and partly in 3.2.2. Our CPS is here 
https://repository.trust.teliasonera.com/Telia_Server_Certificate_CPS_v2.1.pdf. Relevant 
parts of it are copied below:

---
3.2.2: Other subject values like OU or E are verified each time separately.
3.2.4: The Registration Officer is obliged to always review all subject 
information and initiate additional checking routines if there are any unclear 
Subject values
...Domain name ownership of domains in email addresses may belong to another 
company than the applicant e.g. to some service provider

Note! We have now changed the CPS text into upcoming v2.2 because we completely 
stopped adding E values to certificates because our old methods have caused 
these discussions and E is not mandatory for Customers.

In my opinion E value requirements in BR are much more like weak OU process 
than any of the strict processes. And that is how it should be because there is 
no sense to require company support teams to accept each of your OV certificate 
but the current hostmaster acceptance related to SAN domains is enough.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy



___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Telia CA - problem in E validation

2018-08-21 Thread pekka.lahtiharju--- via dev-security-policy
In my opinion we follow BR. Here is why:  I think that the first chapter of  
7.1.4.2 it says that "...CA represents it followed the procedure set forth in 
its Certificate Policy and/or Certification Practice Statement to verify...". 
That is exactly what we do because we have explained in our CPS how E is 
verified (check below). Perhaps the process description in CPS could be better 
but anyway the descriptions are there including the fact that email (domain) 
ownership hasn't been always verified. More detailed E process description has 
been in this discussion.

Then BR 7.1.4.2.j specifies how E should be verified for SSL certificates:  

"All other optional attributes, when present within the subject field, MUST 
contain information that has
been verified by the CA. Optional attributes MUST NOT contain metadata such as 
‘.’, ‘-‘, and ‘ ‘ (i.e. space)
characters, and/or any other indication that the value is absent, incomplete, 
or not applicable."

In our opinion we follow also completely that chapter because we do two kind of 
verifications to E values and also we prevent meta data values like required. 
Note that it is not prohibited in BR text to use our methods. I still can't 
understand what is the exact BR detail that hasn't been followed by us? We 
haven't verified everything (specifically E) perfectly but we have followed our 
CPS and our E process has been written to be compatible to current BR 7.1.4.2.j.

Our current CPS v2.1 has E verification documentation mostly in chapter "3.2.4 
Non-verified Subscriber Information" and partly in 3.2.2. Our CPS is here 
https://repository.trust.teliasonera.com/Telia_Server_Certificate_CPS_v2.1.pdf. 
Relevant parts of it are copied below:

---
3.2.2: Other subject values like OU or E are verified each time separately. 
3.2.4: The Registration Officer is obliged to always review all subject 
information and initiate additional checking routines if there are any unclear 
Subject values
...Domain name ownership of domains in email addresses may belong to another 
company than the applicant e.g. to some service provider

Note! We have now changed the CPS text into upcoming v2.2 because we completely 
stopped adding E values to certificates because our old methods have caused 
these discussions and E is not mandatory for Customers.

In my opinion E value requirements in BR are much more like weak OU process 
than any of the strict processes. And that is how it should be because there is 
no sense to require company support teams to accept each of your OV certificate 
but the current hostmaster acceptance related to SAN domains is enough.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy