Thank you all for your replies.

We tested and verified many problems mentioned by Erwann
In conclusion the problems mentioned by Erwann are:
1,No SAN in certificate
2,MIME type of AIA URI and CRLDP is test/plain
3,OCSP signer certificate's public key, valid period and extension.
4,root key generation ceremony.
5,Crl number field in crl downloaded from CRLDP
6,issue relate to oca2-SHA1 and oca2-SHA256 with same serial number.

Since we have two inclusion request (GT/EV), I'll explain separately.

For EV:

1, No SAN
Status:
No problem.
We checked our EV test website and other EV certificate (and the issuing 
model), EV subject certificate have SAN

2, MIME type
status:
Fixed.
The problem of MIME type is not within the CA issuing system (this means no 
problem with certificates' fields) but in the downloading server of AIA url and 
CRLDP.
This problem is fixed by now

3, OCSP signer certificate
Status:
Fixed.
The OCSP signing certificate issuing model is fixed by now, new ocsp signing 
certificate will have at least 2048 bits public key and valid period is set to 
1000 days(33month).
OCSP system for EV is updated and fixed by now.

4, root key generation ceremony.
Status:
No problem.
We discussed this issue with our auditor. Below is our reply:
Because our root was generated in August 2012 and we became aware of BRs in
2013 Dec, we did not require auditor to issue the audit report about root key 
generation.

Although the auditor did not issue an audit report about the root key 
generation, they actually observed the root key generation ceremony on site and 
performed all required audit procedures according to the Trust Service 
Principles and Criteria for CA v2.0 and WebTrust Audit Criteria and WebTrust EV 
Audit Criteria V1.4 which have same root key generation requirements with 
Webtrust BR Audit Criteria. No issue was identified. If the auditor cannot 
obtain reasonable assurance that all requirements are followed, it will not be 
possible to issue the unqualified WT opinions in 2012.

Following Mozilla's root certificate inclusion policy 
(https://wiki.mozilla.org/CA:CertificatePolicyV2.1#Time_Frames_for_included_CAs_to_comply_with_the_new_policy):

"Any Certificate Authority being considered for root inclusion after February 
15, 2013 must comply with Version 2.1 or later of Mozilla's CA Certificate 
Policy. This includes having a Baseline Requirements audit performed if the 
websites trust bit is to be enabled. Note that the CA's first Baseline 
Requirements audit may be a Point in Time audit. "

And it's our first BR audit, so the auditor performed a Point in Time 
Pre-Issuance Readiness audit in this April. Since this is a point in time 
audit, the auditor only evaluated the design effectiveness. In the next audit, 
the operating effectiveness for a period will be evaluated.

5, CRL number field in crl downloaded from CRLDP
Status:
Confirmed and fixing.
We discussed this issue with our auditor:

Our auditor performed the audit according to the Trust Service Principles and 
Criteria for CA v2.0 , SSL BR audit criteria V1.1 and WebTrust EV Audit 
Criteria V1.4. Except the SAN extension and root key generation requirements, 
other issues raised are not specified in these audit criteria, so they are not 
in the scope of audit. This is why the auditor did not find these issues.

Crl number field means "Section" in the old crl system of CFCA, for example the 
0~500 certificates have same crl number "1", which means they are in section 
one.
an update will take place soon in this system to ensure every detail comply to 
x509/RFC5280.

We will take measures to make sure similar problems won't happen again, and 
these features will not be missed in the future audit/report. We will provide 
details in next reply within this Public discussion.

6, issue relate to oca2-SHA1 and oca2-SHA256
Status:
No problem.
EV system has no problem relate to this issue.

For GT:
We are still investigating the issue relate to oca2-SHA1 and oca2-SHA256 with 
same serial number (How did it happen and what should we do).

We will include information relate to GT root in the next reply.
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to