Add ANF root certificate
Categories
(CA Program :: CA Certificate Root Program, task, P5)
Tracking
(Not tracked)
People
(Reporter: isabel.fabregas, Assigned: kathleen.a.wilson)
References
Details
(Whiteboard: [ca-closed] Request Withdrawn by CA)
Attachments
(24 files, 5 obsolete files)
|
2.62 KB,
application/x-x509-ca-cert
|
Details | |
|
22.34 KB,
application/pdf
|
Details | |
|
21.73 KB,
application/pdf
|
Details | |
|
97.90 KB,
application/pdf
|
Details | |
|
1.73 MB,
application/pdf
|
Details | |
|
587.21 KB,
application/pdf
|
Details | |
|
83.32 KB,
application/pdf
|
Details | |
|
592.26 KB,
application/pdf
|
Details | |
|
588.41 KB,
application/pdf
|
Details | |
|
508 bytes,
text/plain
|
Details | |
|
21.42 KB,
image/jpeg
|
Details | |
|
265.86 KB,
application/pdf
|
Details | |
|
93.21 KB,
application/pdf
|
Details | |
|
149.25 KB,
application/pdf
|
Details | |
|
150.09 KB,
application/pdf
|
Details | |
|
1.97 MB,
application/pdf
|
Details | |
|
1.35 MB,
application/pdf
|
Details | |
|
1.42 MB,
application/pdf
|
Details | |
|
2.09 KB,
application/x-x509-ca-cert
|
Details | |
|
2.76 KB,
application/x-x509-ca-cert
|
Details | |
|
3.06 KB,
application/x-x509-ca-cert
|
Details | |
|
5.94 KB,
application/x-pkcs7-certificates
|
Details | |
|
3.90 KB,
application/x-pkcs7-certificates
|
Details | |
|
683.51 KB,
application/pdf
|
Details |
| Assignee | ||
Comment 1•15 years ago
|
||
| Assignee | ||
Comment 2•15 years ago
|
||
| Assignee | ||
Comment 3•15 years ago
|
||
| Assignee | ||
Comment 4•15 years ago
|
||
| Assignee | ||
Comment 6•15 years ago
|
||
| Assignee | ||
Comment 7•15 years ago
|
||
Comment 8•15 years ago
|
||
Comment 9•15 years ago
|
||
Updated•15 years ago
|
Updated•15 years ago
|
| Assignee | ||
Comment 10•15 years ago
|
||
Comment 11•15 years ago
|
||
Updated•15 years ago
|
| Reporter | ||
Comment 12•15 years ago
|
||
| Reporter | ||
Comment 13•15 years ago
|
||
Comment 14•15 years ago
|
||
Comment 15•15 years ago
|
||
Comment 16•15 years ago
|
||
| Reporter | ||
Comment 17•15 years ago
|
||
Comment 18•15 years ago
|
||
Comment 19•15 years ago
|
||
Comment 20•15 years ago
|
||
Comment 21•15 years ago
|
||
Comment 22•15 years ago
|
||
| Assignee | ||
Updated•15 years ago
|
| Assignee | ||
Comment 23•15 years ago
|
||
| Reporter | ||
Comment 24•15 years ago
|
||
| Assignee | ||
Comment 25•15 years ago
|
||
Comment 26•15 years ago
|
||
| Assignee | ||
Comment 27•15 years ago
|
||
Comment 28•14 years ago
|
||
Comment 29•14 years ago
|
||
Updated•14 years ago
|
Comment 30•14 years ago
|
||
Updated•14 years ago
|
Updated•14 years ago
|
Updated•14 years ago
|
| Reporter | ||
Comment 31•14 years ago
|
||
| Assignee | ||
Comment 32•14 years ago
|
||
| Reporter | ||
Comment 33•14 years ago
|
||
| Reporter | ||
Comment 34•14 years ago
|
||
| Assignee | ||
Comment 35•14 years ago
|
||
| Reporter | ||
Comment 36•14 years ago
|
||
| Reporter | ||
Comment 37•14 years ago
|
||
| Reporter | ||
Comment 38•14 years ago
|
||
| Assignee | ||
Comment 39•14 years ago
|
||
| Reporter | ||
Comment 40•14 years ago
|
||
Comment 41•12 years ago
|
||
| Assignee | ||
Comment 42•12 years ago
|
||
Comment 43•12 years ago
|
||
| Assignee | ||
Comment 44•12 years ago
|
||
Comment 45•12 years ago
|
||
| Assignee | ||
Comment 46•12 years ago
|
||
| Assignee | ||
Comment 47•12 years ago
|
||
Comment 48•11 years ago
|
||
Comment 49•11 years ago
|
||
Comment 50•11 years ago
|
||
| Assignee | ||
Comment 51•11 years ago
|
||
| Assignee | ||
Comment 52•11 years ago
|
||
Comment 53•11 years ago
|
||
Comment 54•11 years ago
|
||
| Assignee | ||
Comment 55•11 years ago
|
||
Comment 56•11 years ago
|
||
| Assignee | ||
Comment 57•11 years ago
|
||
Comment 58•11 years ago
|
||
| Assignee | ||
Comment 59•11 years ago
|
||
| Assignee | ||
Comment 60•11 years ago
|
||
Comment 61•11 years ago
|
||
Comment 62•11 years ago
|
||
| Assignee | ||
Comment 63•11 years ago
|
||
Comment 64•11 years ago
|
||
Comment 65•11 years ago
|
||
| Assignee | ||
Comment 66•11 years ago
|
||
Comment 67•11 years ago
|
||
| Assignee | ||
Comment 68•11 years ago
|
||
Comment 69•11 years ago
|
||
Comment 70•11 years ago
|
||
Comment 71•11 years ago
|
||
Comment 72•11 years ago
|
||
Comment 73•11 years ago
|
||
| Assignee | ||
Comment 74•11 years ago
|
||
| Assignee | ||
Comment 75•11 years ago
|
||
| Assignee | ||
Comment 76•11 years ago
|
||
Comment 77•11 years ago
|
||
| Assignee | ||
Comment 78•11 years ago
|
||
| Assignee | ||
Comment 79•11 years ago
|
||
Comment 80•10 years ago
|
||
Comment 81•10 years ago
|
||
| Assignee | ||
Comment 82•10 years ago
|
||
Comment 83•10 years ago
|
||
Comment 84•10 years ago
|
||
| Assignee | ||
Comment 85•10 years ago
|
||
| Assignee | ||
Comment 86•10 years ago
|
||
Comment 87•10 years ago
|
||
| Assignee | ||
Comment 88•9 years ago
|
||
| Assignee | ||
Comment 89•9 years ago
|
||
Comment 90•9 years ago
|
||
| Assignee | ||
Updated•9 years ago
|
| Assignee | ||
Comment 91•9 years ago
|
||
| Assignee | ||
Comment 92•9 years ago
|
||
Comment 93•9 years ago
|
||
Comment 94•9 years ago
|
||
Comment 95•9 years ago
|
||
Comment 96•9 years ago
|
||
Comment 97•9 years ago
|
||
Comment 98•9 years ago
|
||
| Assignee | ||
Comment 99•9 years ago
|
||
Comment 100•8 years ago
|
||
Comment 101•8 years ago
|
||
Comment 102•8 years ago
|
||
| Assignee | ||
Comment 103•8 years ago
|
||
| Assignee | ||
Comment 104•8 years ago
|
||
Comment 105•8 years ago
|
||
Comment 106•8 years ago
|
||
| Assignee | ||
Updated•8 years ago
|
Comment 107•8 years ago
|
||
Comment 108•8 years ago
|
||
Comment 109•8 years ago
|
||
Comment 110•8 years ago
|
||
Comment 111•8 years ago
|
||
Comment 112•8 years ago
|
||
Comment 113•8 years ago
|
||
Updated•8 years ago
|
Updated•8 years ago
|
Comment 114•8 years ago
|
||
Comment 115•8 years ago
|
||
Comment 116•8 years ago
|
||
Updated•8 years ago
|
Updated•8 years ago
|
Comment 117•8 years ago
|
||
Updated•8 years ago
|
Comment 118•7 years ago
|
||
Comment 119•7 years ago
|
||
| Assignee | ||
Comment 120•7 years ago
|
||
Comment 121•6 years ago
|
||
This morning on CABF's servercert-wg mailing list, Tim Hollebeek reported a misissued certificate chaining to ANF Global Root CA, as well as CPS non-compliance: https://cabforum.org/pipermail/servercert-wg/2019-May/000849.html
Comment 122•6 years ago
|
||
Another example, which is quite problematic: https://crt.sh/?id=1723124144&opt=ocsp,zlint,x509lint,cablint and issued 2019-07-30
I would recommend this be rejected with prejudice, and the CA be required to create a new hierarchy, with clear disclosures about the nature of these incidents and how the new hierarchy addresses them.
Comment 123•6 years ago
|
||
Dear sirs,
ANF AC's Certification Practices Statement is fully compliant with the Baseline Requirements and is constructed in accordance with RFC 3647. CA Contact person can be found in section 1.5.2. of the same: https://anf.es/pdf/Certification_Practices_Statement_ANFAC_v26.pdf
The certificate Ryan Sleevi points out, issued by error, has already been revoked. ANF AC has established controls to prevent non BR compliant test certificates (max validity period of 30 day and including OID 2.23.140.2.1) and has no other valid wrong constructed test certificates.
As we will not continue with the inclusion request of this hierarchies, I personally asked to close this Bug #555156 as WONTFIX, but it hasn't been closed yet. ANF AC proceded to the issuance of a new hierarchy, as indicated, fixing all errors and tested with all the tools indicated by Mozilla. We will open a new Inclusion Request Bugzilla bug.
Please close this Bug #555156.
Comment 124•6 years ago
|
||
(In reply to Pablo Díaz from comment #123)
ANF AC has established controls to prevent non BR compliant test certificates (max validity period of 30 day and including OID 2.23.140.2.1) and has no other valid wrong constructed test certificates.
https://crt.sh/?q=77754817eced33241b540d6ef3db4f1a3c0529f2646fad1d0e87c0ab6585e2f8 as mentioned in Comment #121 is also misissued and not revoked.
For posterity, the most recent audits, from 3/23/2018 until 3/22/2019, is
Kathleen: I'll leave you to close as WONTFIX per Comment #123, and also clarify any follow-up requirements for future inclusion requests, regarding these incidents or the selection of auditors for the new infrastructure, if one should be created.
| Assignee | ||
Comment 125•6 years ago
|
||
(In reply to Pablo Díaz from comment #123)
Please close this Bug #555156.
Closing the request as WONTFIX. I am also going to close the existing Root Inclusion Case in the CCADB, in order to avoid future confusion.
Pablo, when you are ready with the new CA hierarchy and corresponding documentation, please create a new Root Inclusion Case and corresponding Bugzilla Bug as described here:
https://wiki.mozilla.org/CA/Information_Checklist#Create_a_Root_Inclusion_Case
| Assignee | ||
Comment 126•6 years ago
|
||
(In reply to Ryan Sleevi from comment #124)
the selection of auditors for the new infrastructure, if one should be created.
I have noted in the CCADB that this auditor provided clean audits even though this CA was having problems with BR-compliance during the audit period.
Comment 127•6 years ago
|
||
(In reply to Ryan Sleevi from comment #122)
the CA be required to create a new hierarchy, with clear disclosures about the nature of these incidents and how the new hierarchy addresses them.
I attach the preliminary report of incidents and the measures that have been taken to prevent them from happening again. I hope it is of the level of detail required and I wait to any observation or indication to clarify any aspect or to apply any further measures.
(In reply to Kathleen Wilson from comment #125)
Pablo, when you are ready with the new CA hierarchy and corresponding documentation, please create a new Root Inclusion Case and corresponding Bugzilla Bug as described here: https://wiki.mozilla.org/CA/Information_Checklist#Create_a_Root_Inclusion_Case
Please see bug 1585951. The new hierarchies requested in bug 1585951 are clean.
Comment 128•6 years ago
|
||
Comment 129•6 years ago
|
||
Pablo: Thanks for providing these.
Part of my concern, that I want to highlight because it still appears, is the confusion on ANF's respect as to what constitutes a test certificate. Regarding Incident #1, on Page 1 of Comment #128, ANF notes the language from the BRs "not containing a CABF OID (2.23.140.2.1) in a critical extension". However, later on, on Page 3 of that report as to measures already taken, ANF notes "and include the OID 2.23.140.2.1 in a certificatepolicies extension, marked as critical"
There's a huge problem with that, and it should be immediately obvious to anyone familiar with PKI: the intent of the BRs is that the /extension OID/ itself is the CABF OID, and the extension is marked critical. Not that the OID appears anywhere in some extension (such as certificatePolicies). Anyone familiar with PKI should recognize that, by including a critical extension whose OID is not supported in a client application, a well-conforming client application should reject that certificate from being trusted. i.e. if you put it as the extension OID, and mark it critical, the certificate will be rejected. However, ANF's proposed solution would absolutely make this a valid TLS certificate, if placed only in certificatePolicies - and that would be huge!
That's why I continue to share concern about ANF's understanding of the requirements here, because the function and purpose of the 'critical' field in an extension, which is explicitly to indicate that a client should fail if it does not handle that particular extension OID, should be intimately familiar to any CA, as it's one of the key components to PKI's flexibility and trust model.
Now, as it relates to the other part, the issuance of test certificates, I want to encourage you to review Mozilla's past CA communications for their program, which hopefully provides clarity to a host of issues or questions of interpretation. Any CA applying should review these (and perhaps it's an opportunity to make this clear), since they contain the collective set of clarifications and expectations. Mozilla provides these at https://wiki.mozilla.org/CA/Communications , and I want to draw your attention to the March 2016 communication, which was made during ANF's pending application here. You can read the full communication here, but of particular interest is Action #6 - which tries to make it clear the expectations regarding "Test Certificates" (i.e. even those with the critical OID, as noted above).
What it lacks is some of the contemporaneous context for why that matter was added, it's important to note that this was shortly after Symantec misissued a large number of certificates, which they claimed were test certificates. This incident was one of the several critical incidents that ultimately led to the removal of trust. While that context was not included in the CA communication, it's important at least with respect to understanding the expectations to review the past CA communications, to understand what is expected.
Comment 130•6 years ago
|
||
Ryan: I deduce from your answer that the report provided meets the level of detail required and you do not request further clarification than the one regarding the OID/extension. Otherwise we wait for further indications. I proceed to answer what you highlighted:
(In reply to Ryan Sleevi from comment #129)
There's a huge problem with that, and it should be immediately obvious to anyone familiar with PKI: the intent of the BRs is that the /extension OID/ itself is the CABF OID, and the extension is marked critical. Not that the OID appears anywhere in some extension (such as certificatePolicies). Anyone familiar with PKI should recognize that, by including a critical extension whose OID is not supported in a client application, a well-conforming client application should reject that certificate from being trusted. i.e. if you put it as the extension OID, and mark it critical, the certificate will be rejected.
In the beginning we were going to apply the measure as you indicated in your comment. However, taking the philosophy of learning from other cases that may have happened in the community, we considered it appropriate to investigate test certificates from some other CA included that have had Mozilla’s approval in order to ensure the measures to be taken.
In a request for inclusion that I found by Microsoft, Wayne Thayer reported some unrevoked certificates with BR violations, to which Microsoft replied that although they were misissued, these certificates included the test OID: “nearly all the certs listed meet the requirements for Test Certificate as listed in Section 1.6.1 of the BRs, including the presence of the “Test” OID (2.23.140.2.1) in a critical extension ”. We reviewed these test certificates, constructed exactly in the way we indicated in our incident report, with the OID included in certificate policies, and said extension marked as critical. Subsequently, at no time was anything highlighted or said by Mozilla to indicate that this was incorrect, that we have been able to find. Moreover, the 3 week discussion period passed successfully (as recently as last August) and it was recommended for inclusion. I am not in favor of pointing other CAs. But you said this was something that no one familiar with PKI would do.
We have proceeded to rectify the measure adopted and OID 2.23.140.2.1 of a test certificate is now entered in an OID extension that it is itself the CABF OID, and the extension is marked critical.
However, ANF's proposed solution would absolutely make this a valid TLS certificate, if placed only in certificatePolicies - and that would be huge!
While the OID has to be in an independent critical extension, which I affirm ANF AC has already applied, there is another aspect you totally overlooked in the report of measures applied. ANF AC indicates that the issuance of said test certificates will be derived to a specific test hierarchy for such purposes, not publicly trusted, therefore, not submitted under the BR.
In this forum Dean Coclin indicates that “The CA/B Forum Baseline Requirements only apply to certificates which chain to publicly trusted roots. This is made clear in the preamble of the document. The BRs do not apply to certificate issuance from non publicly trusted hierarchies.”
https://groups.google.com/forum/#!msg/mozilla.dev.security.policy/3NdZkcftqtU/TiRnrvZFBgAJ
I want to encourage you to review Mozilla's past CA communications for their program, which hopefully provides clarity to a host of issues or questions of interpretation. Any CA applying should review these (and perhaps it's an opportunity to make this clear), since they contain the collective set of clarifications and expectations. Mozilla provides these at https://wiki.mozilla.org/CA/Communications , and I want to draw your attention to the March 2016 communication, which was made during ANF's pending application here. You can read the full communication here, but of particular interest is Action #6 - which tries to make it clear the expectations regarding "Test Certificates" (i.e. even those with the critical OID, as noted above).
I have not been able to find any reference to critical OID in Action #6. It indicates that test certificates issued under a hierarchy included in Mozilla must also comply with Mozilla’s Root Policy, and also refers to its section 9 (not existing anymore). In Mozilla’s Root Policy I also have not been able to find any reference to test certificates, and no clarification of the critical OID/extension. But as I specified before, we have applied the measures so that OID 2.23.140.2.1 of a test certificate is now introduced in an OID extension that it is itself the CABF OID, and the extension is marked critical.
Thank you for the Mozilla's past CA communications information pages. ANF AC will proceed to read all the communications that Mozilla has made in the past for its program in order to clarify aspects and expectations, and not hinder the process.
Comment 131•6 years ago
|
||
Ryan: I deduce from your answer that the report provided meets the level of detail required and you do not request further clarification
In general, it's a bad idea to make assumptions. It's certainly true that, because ANF is not a trusted CA, the burden of effort is shifted to the CA to demonstrate that they meet and exceed the minimum expectations, as they are now working from a trust deficit. It is easier to simply reject a CA when the answers are not detailed as to how they were caused or the remediations.
Regarding Microsoft, thanks for highlighting this. I've raised it for Microsoft at https://www.mail-archive.com/dev-security-policy@lists.mozilla.org/msg12793.html It is as deeply (now more deeply) concerning for Microsoft to have had this interpretation, and so I appreciate you highlighting the unfortunate precedent that was overlooked.
Please also be aware of the CA/Browser Forum discussions, such as https://cabforum.org/pipermail/servercert-wg/2019-October/001189.html - which seek to codify many requirements.
In general, if anything is confusing, out of expectation, or seems more permissive, it is important to raise these as concerns.
Comment 132•6 years ago
|
||
(In reply to Ryan Sleevi from comment #131)
In general, it's a bad idea to make assumptions.
My answer might have not been was clear, your interpretation is incorrect. It was not an assumption nor an affirmation, it was an implicit query. That is precisely why I then added: Otherwise we wait for further indications. I expected a confirmation or that you told me if there was any further aspect that we should detail about the incident report provided.
It's certainly true that, because ANF is not a trusted CA, the burden of effort is shifted to the CA to demonstrate that they meet and exceed the minimum expectations, as they are now working from a trust deficit. It is easier to simply reject a CA when the answers are not detailed as to how they were caused or the remediations.
Permanently, we are invited to read the forums, wikis and mailings to acquire a comprehensive knowledge about what we are expected to accomplish and to take into account other cases and incidents that have occurred in the community. Obviously, as I have shown, we are doing so.
We follow Mozilla's approval criteria in a similar event, whose criteria I understand should serve as guidance on how to act. And, what could be a Mozilla reviewing error (as you acknowledge) is subsequently charged to ANF AC.
ANF AC applies a measure following the criteria of Mozilla in a similar case. Mozilla took as valid the explanation given by Microsoft and the case was approved. Then ANF AC is blamed for it as a very serious error. Not to mention that you totally ignored, that the incident report provided specifies that test certificates will be derived to a NON-publicly trusted hierarchy and, therefore, not subject to the Baseline Requirements.
Regarding Microsoft, thanks for highlighting this. I've raised it for Microsoft at https://www.mail-archive.com/dev-security-policy@lists.mozilla.org/msg12793.html It is as deeply (now more deeply) concerning for Microsoft to have had this interpretation, and so I appreciate you highlighting the unfortunate precedent that was overlooked.
In general, if anything is confusing, out of expectation, or seems more permissive, it is important to raise these as concerns.
If I am not wrong, I consider that in this forum you indicate an inconsistency in the BRs, which indicates conditions to the construction of test certificates and subsequently associates them with a domain validation method which is not allowed anymore. Therefore, you indicate that Test certificates are not allowed under the BRs because there is nothing in the BRs that authorizes them. Specifically: “there's nothing in the BRs that authorize this Test Certificate” or “they were explicitly forbidden from use.” However, you report errors on our incident report of bad construction of Test certificates as if they were to be issued under a public hierarchy. This also creates confusion.
Despite the inconsistency, ANF AC would be in accordance with your indication in that forum, since, again, we indicate that test certificates are now derived to a private hierarchy for these purposes, not subject to the BRs.
(In reply to Ryan Sleevi from comment #122)
the CA be required to create a new hierarchy, with clear disclosures about the nature of these incidents and how the new hierarchy addresses them.
ANF AC proceeded to the creation of the new hierarchy in bug 1585951, and has proceeded to report the incidents described in this bug about the previous hierarchy, including the measures taken.
We remain at complete disposal of the community in case further explanations or clarification of aspects are required.
Updated•2 years ago
|
Description
•