Unretrievable CPS documents listed in CCADB

2019-05-02 Thread Corey Bonnell via dev-security-policy
Hello,
Section 4 of Mozilla Root Store Policy states that CAs are bound by the latest 
Common CCADB Policy (http://ccadb.org/policy). Section 5 of the Common CCADB 
Policy specifies the requirements for CAs regarding providing URLs to various 
documents, such as the CP, CPS, and audit reports. In particular, “the URLs to 
such CPs, CPSes and audits, and any metadata about them such as the name of the 
auditor or the date of the audit, need to be updated as new information become 
available.”

The current AllCertificateRecordsReport.csv was downloaded and the CPS URLs for 
all unrevoked intermediate and root certificates were extracted. Each extracted 
CPS URL was then requested via HTTP GET using cURL and the HTTP response status 
code recorded. Below is a list of all CPS URLs which return a HTTP status code 
of 400 or greater:

"Row number", "CA Owner", "Certificate Name", "CPS URL", "HTTP status code"
7, "AC Camerfirma, S.A.", "Chambers of Commerce Root", 
http://docs.camerfirma.com/publico/DocumentosWeb/politicas/CPS_eidas_EN_v_1_2_3.pdf,
 404
191, Atos, "Atos TrustedRoot 2011", 
https://pki.atos.net/Download/AtosTrustedCACPSv1.9.0.pdf, 404
258, "Autoridad de Certificacion Firmaprofesional", "SIGNE Autoridad de 
Certificacion", 
http://www.signe.es/wp-content/uploads/2018/08/DPC_SIGNE_2.1-180731.pdf, 404
262, Buypass, "Buypass Class 2 CA 1", 
http://www.buypass.com/home/support/ca-documentation-legal, 404
466, "Deutscher Sparkassen Verlag GmbH (S-TRUST, DSV-Gruppe)", "S-TRUST 
Authentication and Encryption Root CA 2005:PN", 
http://www.s-trust.de/stn-cps/stn_cps.pdf, 404
468, "Deutscher Sparkassen Verlag GmbH (S-TRUST, DSV-Gruppe)", "TC TrustCenter 
Class 3 CA II", https://www.s-trust.de/stn-cps, 404
594, DigiCert, "ADACOM CA for EU Qualified e-Seals", 
https://pki.adacom.com/repository/en/CPS/files/Certification_Practice_Statement_for_EU_Qualified_certificates_v3.pdf,
 404
634, DigiCert, "Allgeier IT Solutions CA", 
https://www.s-trust.de/ablage_download_dokumente/ablage_pdf/S-TRUST_STN_CPS_V3_87.pdf,
 404
741, DigiCert, "Belgium Root CA2", 
https://stage-pki.belgium.be/resources/PKI-BelgiumRootCA-CPS-v1.2.pdf, 404
1394, DigiCert, "Government AA", 
https://stage-pki.belgium.be/resources/Government-CA-Certification-Practice-Statement-v1.0.pdf,
 404
1546, DigiCert, "Microsoft IT SSL CA 1", 
https://www.microsoft.com/pki/mscorp/cps/Microsoft%20IT%20PKI%20CP-CPS%20for%20SSL%20Ver%201%203%20January%202015.htm,
 404
1551, DigiCert, "Microsoft IT SSL SHA2", 
http://www.microsoft.com/pki/mscorp/cps/Microsoft%20IT%20PKI%20CP-CPS%20for%20SSL%20Ver%201%203%20January%202015.htm,
 404
2494, "Financijska agencija (Fina)", "Fina Root CA", 
http://rdc.fina.hr/QTSA2017/FinaQTSA, 404
2815, "Government of France (ANSSI, DCSSI)", IGC/A, 
http://www.ssi.gouv.fr/site_article15.html, 404
2991, "Government of Tunisia, Agence National de Certification Electronique / 
National Digital Certification Agency (ANCE/NDCA)", "Tunisian Root Certificate 
Authority - TunRootCA2", 
http://www.tuntrust.tn/sites/default/files/documents/PolitiqueSERVEURS-PTC-BR-08.pdf,
 404
3209, "Microsec Ltd.", "e-Szigno Class2 CA 2017", 
https://static.e-szigno.hu/docs/szsz--fok--sea--EN--v2.8.pdf, 404
3211, "Microsec Ltd.", "e-Szigno Class3 CA 2017", 
https://static.e-szigno.hu/docs/szsz--fok--sig--EN--v2.8.pdf, 404
3216, "Microsec Ltd.", "e-Szigno Qualified CA 2017", 
https://static.e-szigno.hu/docs/szsz--min--sig--EN--v2.8.pdf, 404
3217, "Microsec Ltd.", "e-Szigno Qualified Organization CA 2017", 
https://static.e-szigno.hu/docs/szsz--min--sea--EN--v2.8.pdf, 404
3308, "Pos Digicert Sdn. Bhd (Malaysia)", "PosDigicert Class 2 Root CA G2", 
https://www.posdigicert.com.my/public/uploads/files/CPS-Rev-60.pdf, 404
3442, "SECOM Trust Systems CO., LTD.", http://www.valicert.com/, 
https://repository.secomtrust.net/rootrepository/CPSen.pdf, 404
3445, "SECOM Trust Systems CO., LTD.", "Security Communication EV RootCA1", 
https://repository.secomtrust.net/EV-Root1/index.html, 404
4526, "T-Systems International GmbH (Deutsche Telekom)", "Deutsche Telekom AG 
Issuing CA 01", http://corporate-pki.telekom.de/cps/cps.htm, 403
4528, "T-Systems International GmbH (Deutsche Telekom)", "Deutsche Telekom AG 
Issuing CA 01", http://corporate-pki1.telekom.de/cps/cps.htm, 403
5242, "Telia Company (formerly TeliaSonera)", "Sonera Class1 CA", 
http://repository.trust.teliasonera.com/CPS/index3.html, 404
5388, "WoSign CA Limited", "CA WoSign ECC Root", 
http://www.wosign.com/policy/wosign-policy-1-2-12.pdf, 403
5436, Zetes, "ZETES TSP ROOT CA 001", http://repository.tsp.zetes.com/Zetes, 404

Given that these URLs return error HTTP status codes, I do not believe these 
CCADB entries comply with CCADB Policy (and by extension, Mozilla Policy).

As an aside, I noticed that several URLs listed in CCADB are “Legal Repository” 
web page URLs that contain a list of many CP/CPS documents. My recommendation 
is to slightly amend CCADB Policy to require CAs to provide URLs to the 
specif

Re: Unretrievable CPS documents listed in CCADB

2019-05-02 Thread Andrew Ayer via dev-security-policy
On Thu, 2 May 2019 18:53:39 -0700 (PDT)
Corey Bonnell via dev-security-policy
 wrote:

> As an aside, I noticed that several URLs listed in CCADB are “Legal
> Repository” web page URLs that contain a list of many CP/CPS
> documents. My recommendation is to slightly amend CCADB Policy to
> require CAs to provide URLs to the specific document in question
> rather than a general “Legal Repository” page, where it is left up to
> the reader to decide which hyperlink on the page is the correct
> document.

+1.  It's often a real hassle to find the CP/CPS for a CA.  Linking
directly to the document would help a lot.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Unretrievable CPS documents listed in CCADB

2019-05-03 Thread Sándor dr . Szőke via dev-security-policy
2019. május 3., péntek 3:53:49 UTC+2 időpontban Corey Bonnell a következőt írta:
> 3209, "Microsec Ltd.", "e-Szigno Class2 CA 2017", 
> https://static.e-szigno.hu/docs/szsz--fok--sea--EN--v2.8.pdf, 404
> 3211, "Microsec Ltd.", "e-Szigno Class3 CA 2017", 
> https://static.e-szigno.hu/docs/szsz--fok--sig--EN--v2.8.pdf, 404
> 3216, "Microsec Ltd.", "e-Szigno Qualified CA 2017", 
> https://static.e-szigno.hu/docs/szsz--min--sig--EN--v2.8.pdf, 404
> 3217, "Microsec Ltd.", "e-Szigno Qualified Organization CA 2017", 
> https://static.e-szigno.hu/docs/szsz--min--sea--EN--v2.8.pdf, 404

The filenames werw incorrect in the CCADB.

I have corrected and checked all url-s.

Sorry for causing problems.

Sándor Szőke   
Microsec
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: Unretrievable CPS documents listed in CCADB

2019-05-03 Thread Ben Wilson via dev-security-policy
I'm against having to continually update the exact URL of the CP and CPS in the 
CCADB.  It's pretty easy to find the current CP and CPS from a legal 
repository.  Plus, if we point to an exact one in the CCADB, it might not be 
the one that is applicable to a given certificate that was issued prior to the 
most current CPS.  In other words, you should look at when the certificate was 
issued and then figure out which CPS is applicable.  

-Original Message-
From: dev-security-policy  On 
Behalf Of Andrew Ayer via dev-security-policy
Sent: Thursday, May 2, 2019 8:16 PM
To: mozilla-dev-security-pol...@lists.mozilla.org
Subject: Re: Unretrievable CPS documents listed in CCADB

On Thu, 2 May 2019 18:53:39 -0700 (PDT)
Corey Bonnell via dev-security-policy
 wrote:

> As an aside, I noticed that several URLs listed in CCADB are “Legal 
> Repository” web page URLs that contain a list of many CP/CPS 
> documents. My recommendation is to slightly amend CCADB Policy to 
> require CAs to provide URLs to the specific document in question 
> rather than a general “Legal Repository” page, where it is left up to 
> the reader to decide which hyperlink on the page is the correct 
> document.

+1.  It's often a real hassle to find the CP/CPS for a CA.  Linking
directly to the document would help a lot.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Unretrievable CPS documents listed in CCADB

2019-05-03 Thread Jakob Bohm via dev-security-policy
t be 
the one that is applicable to a given certificate that was issued prior to the 
most current CPS.  In other words, you should look at when the certificate was 
issued and then figure out which CPS is applicable.

-Original Message-
From: dev-security-policy  On 
Behalf Of Andrew Ayer via dev-security-policy
Sent: Thursday, May 2, 2019 8:16 PM
To: mozilla-dev-security-pol...@lists.mozilla.org
Subject: Re: Unretrievable CPS documents listed in CCADB

On Thu, 2 May 2019 18:53:39 -0700 (PDT)
Corey Bonnell via dev-security-policy
 wrote:


As an aside, I noticed that several URLs listed in CCADB are “Legal
Repository” web page URLs that contain a list of many CP/CPS
documents. My recommendation is to slightly amend CCADB Policy to
require CAs to provide URLs to the specific document in question
rather than a general “Legal Repository” page, where it is left up to
the reader to decide which hyperlink on the page is the correct
document.


+1.  It's often a real hassle to find the CP/CPS for a CA.  Linking
directly to the document would help a lot.



Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Unretrievable CPS documents listed in CCADB

2019-05-03 Thread Wayne Thayer via dev-security-policy
On Fri, May 3, 2019 at 8:36 AM Ben Wilson via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> I'm against having to continually update the exact URL of the CP and CPS
> in the CCADB.



A relatively simple solution to this problem is to create a "permanent
link" to the current version of these docs (e.g.
https://digicert.com/repository/current_cp.pdf), then modify or redirect
the document that the link returns each time the document is updated as
part of the publishing process. Under this scheme, the CA should never need
to worry about updating CCADB.


>   It's pretty easy to find the current CP and CPS from a legal repository.



But not as easy as getting it from a CCADB report, especially when the
repository page doesn't clearly map a policy to a CA certificate.

  Plus, if we point to an exact one in the CCADB, it might not be the one
> that is applicable to a given certificate that was issued prior to the most
> current CPS.  In other words, you should look at when the certificate was
> issued and then figure out which CPS is applicable.
>
>
I'm almost always looking for the current policy rather than trying to
identify the version applicable to a specific certificate.


> -Original Message-
> From: dev-security-policy 
> On Behalf Of Andrew Ayer via dev-security-policy
> Sent: Thursday, May 2, 2019 8:16 PM
> To: mozilla-dev-security-pol...@lists.mozilla.org
> Subject: Re: Unretrievable CPS documents listed in CCADB
>
> On Thu, 2 May 2019 18:53:39 -0700 (PDT)
> Corey Bonnell via dev-security-policy
>  wrote:
>
> > As an aside, I noticed that several URLs listed in CCADB are “Legal
> > Repository” web page URLs that contain a list of many CP/CPS
> > documents. My recommendation is to slightly amend CCADB Policy to
> > require CAs to provide URLs to the specific document in question
> > rather than a general “Legal Repository” page, where it is left up to
> > the reader to decide which hyperlink on the page is the correct
> > document.
>
> +1.  It's often a real hassle to find the CP/CPS for a CA.  Linking
> directly to the document would help a lot.
>
>
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: Unretrievable CPS documents listed in CCADB

2019-05-03 Thread Ben Wilson via dev-security-policy
That approach could work.

 

From: Wayne Thayer  
Sent: Friday, May 3, 2019 1:19 PM
To: Ben Wilson 
Cc: Andrew Ayer ; Corey Bonnell ; 
mozilla-dev-security-pol...@lists.mozilla.org
Subject: Re: Unretrievable CPS documents listed in CCADB

 

On Fri, May 3, 2019 at 8:36 AM Ben Wilson via dev-security-policy 
mailto:dev-security-policy@lists.mozilla.org> > wrote:

I'm against having to continually update the exact URL of the CP and CPS in the 
CCADB.

 

 

A relatively simple solution to this problem is to create a "permanent link" to 
the current version of these docs (e.g. 
https://digicert.com/repository/current_cp.pdf), then modify or redirect the 
document that the link returns each time the document is updated as part of the 
publishing process. Under this scheme, the CA should never need to worry about 
updating CCADB.

 

  It's pretty easy to find the current CP and CPS from a legal repository.

 

 

But not as easy as getting it from a CCADB report, especially when the 
repository page doesn't clearly map a policy to a CA certificate.

 

  Plus, if we point to an exact one in the CCADB, it might not be the one that 
is applicable to a given certificate that was issued prior to the most current 
CPS.  In other words, you should look at when the certificate was issued and 
then figure out which CPS is applicable.  

 

I'm almost always looking for the current policy rather than trying to identify 
the version applicable to a specific certificate.

 

-Original Message-
From: dev-security-policy mailto:dev-security-policy-boun...@lists.mozilla.org> > On Behalf Of Andrew 
Ayer via dev-security-policy
Sent: Thursday, May 2, 2019 8:16 PM
To: mozilla-dev-security-pol...@lists.mozilla.org 
<mailto:mozilla-dev-security-pol...@lists.mozilla.org> 
Subject: Re: Unretrievable CPS documents listed in CCADB

On Thu, 2 May 2019 18:53:39 -0700 (PDT)
Corey Bonnell via dev-security-policy
mailto:dev-security-policy@lists.mozilla.org> > wrote:

> As an aside, I noticed that several URLs listed in CCADB are “Legal 
> Repository” web page URLs that contain a list of many CP/CPS 
> documents. My recommendation is to slightly amend CCADB Policy to 
> require CAs to provide URLs to the specific document in question 
> rather than a general “Legal Repository” page, where it is left up to 
> the reader to decide which hyperlink on the page is the correct 
> document.

+1.  It's often a real hassle to find the CP/CPS for a CA.  Linking
directly to the document would help a lot.



smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Unretrievable CPS documents listed in CCADB

2019-05-04 Thread Man Ho via dev-security-policy
I could be wrong, but some browsers (IE/Chrome) seems to cache 
downloaded PDF file and display the cache file if the filename is the 
same. If it's true, end user may be actually reading an outdated PDF file.

- Man Ho

On 04-May-19 3:18 AM, Wayne Thayer via dev-security-policy wrote:
> A relatively simple solution to this problem is to create a "permanent
> link" to the current version of these docs (e.g.
> https://digicert.com/repository/current_cp.pdf), then modify or redirect
> the document that the link returns each time the document is updated as
> part of the publishing process. Under this scheme, the CA should never need
> to worry about updating CCADB.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: Unretrievable CPS documents listed in CCADB

2019-05-04 Thread Matt Palmer via dev-security-policy
On Sat, May 04, 2019 at 11:11:43AM +, Man Ho via dev-security-policy wrote:
> I could be wrong, but some browsers (IE/Chrome) seems to cache 
> downloaded PDF file and display the cache file if the filename is the 
> same. If it's true, end user may be actually reading an outdated PDF file.

If a browser is caching content retrieved from the target of a 307 Temporary
Redirect under the initial URI which issued the redirect, I'm *pretty* sure
that's a bug, and should be reported as such.

- Matt

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: [EXT]Unretrievable CPS documents listed in CCADB

2019-05-03 Thread (RS) Tyler Schroder via dev-security-policy
Hi Corey,

FWIW, at least one of those CAs are no longer active, such as 5388 WoSign: 
https://blog.mozilla.org/security/2016/10/24/distrusting-new-wosign-and-startcom-certificates/
 - do old CAs get removed from CCADB or marked inactive in that system?

I do like the idea of linking the specific document over the general repo page.

Regards,

Tyler

-Original Message-
From: dev-security-policy  On 
Behalf Of Corey Bonnell via dev-security-policy
Sent: Thursday, May 2, 2019 9:54 PM
To: mozilla-dev-security-pol...@lists.mozilla.org
Subject: [EXT]Unretrievable CPS documents listed in CCADB

Hello,
Section 4 of Mozilla Root Store Policy states that CAs are bound by the latest 
Common CCADB Policy (http://ccadb.org/policy). Section 5 of the Common CCADB 
Policy specifies the requirements for CAs regarding providing URLs to various 
documents, such as the CP, CPS, and audit reports. In particular, “the URLs to 
such CPs, CPSes and audits, and any metadata about them such as the name of the 
auditor or the date of the audit, need to be updated as new information become 
available.”

The current AllCertificateRecordsReport.csv was downloaded and the CPS URLs for 
all unrevoked intermediate and root certificates were extracted. Each extracted 
CPS URL was then requested via HTTP GET using cURL and the HTTP response status 
code recorded. Below is a list of all CPS URLs which return a HTTP status code 
of 400 or greater:

"Row number", "CA Owner", "Certificate Name", "CPS URL", "HTTP status code"
7, "AC Camerfirma, S.A.", "Chambers of Commerce Root", 
http://docs.camerfirma.com/publico/DocumentosWeb/politicas/CPS_eidas_EN_v_1_2_3.pdf,
 404
191, Atos, "Atos TrustedRoot 2011", 
https://pki.atos.net/Download/AtosTrustedCACPSv1.9.0.pdf, 404
258, "Autoridad de Certificacion Firmaprofesional", "SIGNE Autoridad de 
Certificacion", 
http://www.signe.es/wp-content/uploads/2018/08/DPC_SIGNE_2.1-180731.pdf, 404
262, Buypass, "Buypass Class 2 CA 1", 
http://www.buypass.com/home/support/ca-documentation-legal, 404
466, "Deutscher Sparkassen Verlag GmbH (S-TRUST, DSV-Gruppe)", "S-TRUST 
Authentication and Encryption Root CA 2005:PN", 
http://www.s-trust.de/stn-cps/stn_cps.pdf, 404
468, "Deutscher Sparkassen Verlag GmbH (S-TRUST, DSV-Gruppe)", "TC TrustCenter 
Class 3 CA II", https://www.s-trust.de/stn-cps, 404
594, DigiCert, "ADACOM CA for EU Qualified e-Seals", 
https://pki.adacom.com/repository/en/CPS/files/Certification_Practice_Statement_for_EU_Qualified_certificates_v3.pdf,
 404
634, DigiCert, "Allgeier IT Solutions CA", 
https://www.s-trust.de/ablage_download_dokumente/ablage_pdf/S-TRUST_STN_CPS_V3_87.pdf,
 404
741, DigiCert, "Belgium Root CA2", 
https://stage-pki.belgium.be/resources/PKI-BelgiumRootCA-CPS-v1.2.pdf, 404
1394, DigiCert, "Government AA", 
https://stage-pki.belgium.be/resources/Government-CA-Certification-Practice-Statement-v1.0.pdf,
 404
1546, DigiCert, "Microsoft IT SSL CA 1", 
https://www.microsoft.com/pki/mscorp/cps/Microsoft%20IT%20PKI%20CP-CPS%20for%20SSL%20Ver%201%203%20January%202015.htm,
 404
1551, DigiCert, "Microsoft IT SSL SHA2", 
http://www.microsoft.com/pki/mscorp/cps/Microsoft%20IT%20PKI%20CP-CPS%20for%20SSL%20Ver%201%203%20January%202015.htm,
 404
2494, "Financijska agencija (Fina)", "Fina Root CA", 
http://rdc.fina.hr/QTSA2017/FinaQTSA, 404
2815, "Government of France (ANSSI, DCSSI)", IGC/A, 
http://www.ssi.gouv.fr/site_article15.html, 404
2991, "Government of Tunisia, Agence National de Certification Electronique / 
National Digital Certification Agency (ANCE/NDCA)", "Tunisian Root Certificate 
Authority - TunRootCA2", 
http://www.tuntrust.tn/sites/default/files/documents/PolitiqueSERVEURS-PTC-BR-08.pdf,
 404
3209, "Microsec Ltd.", "e-Szigno Class2 CA 2017", 
https://static.e-szigno.hu/docs/szsz--fok--sea--EN--v2.8.pdf, 404
3211, "Microsec Ltd.", "e-Szigno Class3 CA 2017", 
https://static.e-szigno.hu/docs/szsz--fok--sig--EN--v2.8.pdf, 404
3216, "Microsec Ltd.", "e-Szigno Qualified CA 2017", 
https://static.e-szigno.hu/docs/szsz--min--sig--EN--v2.8.pdf, 404
3217, "Microsec Ltd.", "e-Szigno Qualified Organization CA 2017", 
https://static.e-szigno.hu/docs/szsz--min--sea--EN--v2.8.pdf, 404
3308, "Pos Digicert Sdn. Bhd (Malaysia)", "PosDigicert Class 2 Root CA G2", 
https://www.posdigicert.com.my/public/uploads/files/CPS-Rev-60.pdf, 404
3442, "SECOM Trust Systems CO., LTD.", http://www.valicert.com/, 
https://repository.secomtrust.net/rootrepository/CPSen.pdf, 404
3445, "SECOM Trust Systems CO., LTD.", "Security Communication EV RootCA1", 
https://repository.secomtrust.net/EV-Root1/index.html, 404
4526,