Closed
Bug 1007683
Opened 11 years ago
Closed 9 years ago
Add TÜRKTRUST Root CA for TÜRKTRUST Root Hierarchy 5 and 6
Categories
(CA Program :: CA Certificate Root Program, task)
CA Program
CA Certificate Root Program
Tracking
(Not tracked)
RESOLVED
FIXED
People
(Reporter: mert.ozarar, Assigned: kathleen.a.wilson)
References
Details
(Whiteboard: EV - In Firefox 42, NSS 3.19.3; EV enabled in Firefox 44)
Attachments
(4 files, 2 obsolete files)
User Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.131 Safari/537.36
Steps to reproduce:
We have already produced and declared a new root hierarchy and we obviously want to add this 5th hierarchy to Mozilla store, as well.
We have attached a file which answers the questions given at the URL: https://wiki.mozilla.org/CA:Information_checklist
Expected results:
The new root hierarchy should be included to Mozilla Root CA Store as included previously.
Comment 1•11 years ago
|
||
A little over a year ago, TÜRKTRUST misissued intermediate certificates, creating a MITM vulnerability. This was discovered in a report by Google. TÜRKTRUST appears to have delayed reporting the problem.
To what extent has an outside, independent audit specifically determined that such lapses will not occur again?
Reference: <https://blog.mozilla.org/security/2013/01/03/revoking-trust-in-two-turktrust-certficates/>
Assignee | ||
Comment 2•11 years ago
|
||
I am accepting this bug, and will work on it as soon as possible, but I have a large backlog.
https://wiki.mozilla.org/CA:Schedule#Requests_in_the_Information_Gathering_and_Verification_Phase
I will update this bug when I begin the Information Verification phase.
https://wiki.mozilla.org/CA:How_to_apply#Information_Verification
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true
Reporter | ||
Comment 3•11 years ago
|
||
Thanks for information. Please note that the main aim of this root is going to issue EV SSL certificates to end-entities.
(I've just seen some EV flags in the URL https://wiki.mozilla.org/CA:Schedule#Requests_in_the_Information_Gathering_and_Verification_Phase that's why I wanted to mention)
Assignee | ||
Comment 4•11 years ago
|
||
I'm going to combine bug #1007682 with this bug.
Assignee | ||
Updated•11 years ago
|
Summary: Add TÜRKTRUST Root CA for TÜRKTRUST Root Hierarchy 6 → Add TÜRKTRUST Root CA for TÜRKTRUST Root Hierarchy 5 and 6
Assignee | ||
Comment 6•11 years ago
|
||
The attached document summarizes the information that has been verified.
The items highlighted in yellow indicate where further information or
clarification is needed. Please review the full document for accuracy and
completeness, and provide the necessary information in this bug.
Assignee | ||
Updated•11 years ago
|
Whiteboard: EV - information incomplete
Assignee | ||
Comment 7•11 years ago
|
||
Please also complete the EV testing as described here:
https://wiki.mozilla.org/PSM:EV_Testing_Easy_Version
Comment 8•10 years ago
|
||
Our recent updates about the status of TURKTRUST H5 and H6 roots are found below.
Update of CA Primary Point of Contact (POC) info:
e-mail_1: volkan.nergiz@turktrust.com.tr
e-mail_2: burak.kalkan@turktrust.com.tr
Email Alias: ssl@turktrust.com.tr
CA Phone Number: +90 312 439 10 00
About “Comment 6” of 2014-06-23:
1) The OCSP problems regarding H5 and H6 on the below test web sites are solved.
https://testsuite12001.turktrust.com.tr
https://testsuite12002.turktrust.com.tr
2) The following e-mail address prefixes are used for domain verification of both DV and OV certificates: "admin", "administrator", "webmaster", "hostmaster" or "postmaster".
3) Domain/e-mail validation is performed by TURKTRUST CA and is not delegated to any third party.
4) Generated private keys are “not” distributed in PKCS#12 files.
5) CRLs are not generated with critical CIDP extentions.
6) About “Lack of communication with end users” item: TURKTRUST is contactable by public customer services phone number 0850 222 444 6 and e-mail address ssl@turktrust.com.tr which are openly announced on TURKTRUST website http://www.turktrust.com.tr, and accepts and acts upon complaints made by, those relying on its assertions of identity. This includes being responsive to members of the general public, including people who have not purchased products from TURKTRUST.
7) About “Backdating the notBefore date” item: The notBefore date of an SSL certificate issued by TURKTRUST is its issuance time.
About “Comment 7” of 2014-06-23:
The EV testing as described in https://wiki.mozilla.org/PSM:EV_Testing_Easy_Version is performed successfully for H6.
We are looking forward to progressing in our root inclusion and EV enabling process for Mozilla soon. Please promptly respond us if there is any other additional information to be supplied on our side.
Assignee | ||
Comment 9•10 years ago
|
||
This link is no longer working: http://www.turktrust.com.tr/en/kok_sertifika_kurulumu2.html
What is the new url?
Assignee | ||
Comment 10•10 years ago
|
||
Please also respond to https://wiki.mozilla.org/CA:Problematic_Practices#SHA-1_Certificates
Assignee | ||
Comment 11•10 years ago
|
||
I have entered the information for this request into SalesForce. Please review the attached document for accuracy and completeness.
Comment 12•10 years ago
|
||
About “Comment 9” of 2015-02-03
New URL for this page is ; http://www.turktrust.com.tr/en/bilgi-deposu/kok-sertifikalari-kurulumu-ve-iptal-listeleri/
About “Comment 10” of 2015-02-03
We are not issuing any new SHA-1 intermediate or end-entity certificates and we do not have any active SHA-1 intermediate certificates in use.
About “Comment 11” of 2015-02-03
Attached document has been reviewed and it is confirmed that it’s accurate and complete. After the verification of the answers above in this comment, “Need Response From CA” areas of the document should be updated.
Assignee | ||
Comment 13•10 years ago
|
||
Assignee | ||
Comment 14•10 years ago
|
||
I will try to start the discussion soon.
https://wiki.mozilla.org/CA:Schedule#Queue_for_Public_Discussion
Whiteboard: EV - information incomplete → EV - Ready for Public Discussion
Assignee | ||
Comment 15•10 years ago
|
||
Fixed a copy-paste error regarding root hierarchy information.
Attachment #8562953 -
Attachment is obsolete: true
Assignee | ||
Comment 16•10 years ago
|
||
I am now opening the first public discussion period for this request from TurkTrust to include the SHA-256 “TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5” and “TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6” root certificates; turn on the Websites trust bit for both roots, turn on the Code Signing trust bit for the H5 root, and enable EV treatment for the H6 root. TurkTrust’s SHA-1 root certificates were included in NSS via Bugzilla Bug #380635 and Bug #433845.
For a description of the public discussion phase, see https://wiki.mozilla.org/CA:How_to_apply#Public_discussion
Public discussion will be in the mozilla.dev.security.policy newsgroup and the corresponding dev-security-policy@lists.mozilla.org mailing list.
The discussion thread is called “TurkTrust Root Renewal Request”.
Please actively review, respond, and contribute to the discussion.
A representative of TurkTrust must promptly respond directly in the discussion thread to all questions that are posted.
Whiteboard: EV - Ready for Public Discussion → EV - In public discussion
Updated•10 years ago
|
Attachment #8564145 -
Attachment is obsolete: true
Attachment #8564145 -
Attachment is patch: false
Attachment #8564145 -
Attachment mime type: text/plain → application/pdf
Updated•10 years ago
|
Attachment #8564145 -
Attachment description: 685128-CAInformation.pdf → spam copied from bug 685128-CAInformation.pdf
Assignee | ||
Comment 18•10 years ago
|
||
The public comment period for this request is now over.
This request has been evaluated as per Mozilla’s CA Certificate Inclusion Policy at
https://www.mozilla.org/about/governance/policies/security-group/certs/policy/inclusion/
Here follows a summary of the assessment. If anyone sees any factual errors, please point them out.
Inclusion Policy Section 4 [Technical].
I am not aware of instances where TurkTrust has knowingly issued certificates for fraudulent use. If anyone knows of any such issues or instances, please note them in this bug.
Inclusion Policy Section 6 [Relevance and Policy].
TurkTrust appears to provide a service relevant to Mozilla users. It is an IT company based in Turkey. TÜRKTRUST is an authorized qualified electronic certificate service provider according to the Turkish Electronic Signature Law. TÜRKTRUST issues qualified certificates, time-stamping services, SSL certificates, and object signing certificates.
TurkTrust's SHA-1 root certificates were included in NSS via Bugzilla Bug #380635 and Bug #433845.
== Root Certificate 1 of 2 ==
Root Certificate Name: TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5
O From Issuer Field: TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri A.Ş.
Trust Bits: Code; Websites
EV Policy OID(s): Not EV
Root Certificate Download URL: http://www.turktrust.com.tr/sertifikalar/TURKTRUST_Elektronik_Sertifika_Hizmet_Saglayicisi_h5.crt
Certificate Summary: The H5 root has internally-operated subCAs that issue SSL and Code Signing certificates.
Certificate Revocation
CRL URL(s): http://www.turktrust.com.tr/sil/TURKTRUST_SSL_SIL_h5.crl
http://www.turktrust.com.tr/sil/TURKTRUST_Kok_SIL_h5.crl
OCSP URL(s): http://ocsp.turktrust.com.tr
Inclusion Policy Section 18 [Certificate Hierarchy]
CA Hierarchy: http://www.turktrust.com.tr/en/bilgi-deposu/kok-sertifikalari-kurulumu-ve-iptal-listeleri/
TURKTRUST ECSP 5. ROOT HIERARCHY
Root: TURKTRUST Electronic Certificate Service Provider Certificate
SSL subCA: TURKTRUST Electronic Server Certificate Services Certificate
Non-QEC subCA: TURKTRUST Simple Electronic Certificate Services Certificate
Code-Signing subCA: TURKTRUST Object Signing Services Certificate
Externally Operated SubCAs: None. None planned.
Cross Signing: None. None planned.
==
== Root Certificate 2 of 2 ==
Root Certificate Name: TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6
O From Issuer Field: TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri A.Ş.
Trust Bits: Websites
EV Policy OID(s): 2.16.792.3.0.3.1.1.5
Root Certificate Download URL: http://www.turktrust.com.tr/sertifikalar/TURKTRUST_Elektronik_Sertifika_Hizmet_Saglayicisi_h6.crt
Certificate Summary: The H6 root has an internally-operated subCA that issues EV SSL certificates.
Certificate Revocation
CRL URL(s): http://www.turktrust.com.tr/sil/TURKTRUST_EV_SSL_SIL_h6.crl
http://www.turktrust.com.tr/sil/TURKTRUST_Kok_SIL_h6.crl
OCSP URL(s): http://ocsp.turktrust.com.tr
Inclusion Policy Section 18 [Certificate Hierarchy]
CA Hierarchy: http://www.turktrust.com.tr/en/bilgi-deposu/kok-sertifikalari-kurulumu-ve-iptal-listeleri/
TURKTRUST ECSP 6. ROOT HIERARCHY
Root: TURKTRUST Electronic Certificate Service Provider Certificate
EV SSL subCA: TURKTRUST Electronic Server Certificate Services Certificate (EVSSL)
Externally Operated SubCAs: None. None planned.
Cross Signing: None. None planned.
==
CA Document Repository: http://www.turktrust.com.tr/en/bilgi-deposu
CP: http://dl.turktrust.com.tr/pdf/TURKTRUST-CP-v09-SSL.pdf
CPS: http://dl.turktrust.com.tr/pdf/TURKTRUST-CP-v09-SSL.pdf
Inclusion Policy Section 7 [Validation].
TurkTrust appears to meet the minimum requirements for subscriber verification, as follows:
* SSL Verification Procedures: Domain/e-mail validation is performed by TURKTRUST CA and is not delegated to any third party. The following e-mail address prefixes are used for domain verification: "admin", "administrator", "webmaster", "hostmaster" or "postmaster". According to CPS section 3.2.2.1, for SSL and OSC applications, different control steps are applied depending on whether the request is domestic or foreign. The residential address of the subscriber is based on while determining of such distinction. Subscribers’ legal existence and credentials, domain name, applicant’s representative’s and application’s existence, CSR information and so forth informations should be verified This verification is done with a unique user name and activation code sent to the authorized person’s e-mail address.
CPS section 3.2.2.2 describes the verification procedures for EV SSL certs.
* Email Verification Procedures: Not requesting the Email trust bit.
* Code Signing Subscriber Verification Procedure: According to CPS Section 1.2, TURKTRUST OSC Policy (2.16.792.3.0.3.1.1.4) covers certificates related to object signing operations. OSC is issued and maintained in conformity with “Normalized Certificate Policy” defined in ETSI TS 102 042. CPS sections 3.1.5.3 and 3.2.2 describe how TURKTRUST verifies the identity and authority of the certificate subscriber.
Inclusion Policy Sections 11-14 [Audit]. Annual audits are performed by TUVIT, according to the ETSI TS 102 042 criteria.
https://www.tuvit.de/en/certification-overview-1265-trusted-site-etsi-certificates-1334.htm
Based on this assessment I intend to approve this request from TURKTRUST to include the SHA-256 "TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5" and "TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6" root certificates; turn on the Websites trust bit for both roots, turn on the Code Signing trust bit for the H5 root, and enable EV treatment for the H6 root.
Whiteboard: EV - In public discussion → EV - Pending Approval
Assignee | ||
Comment 19•10 years ago
|
||
Updated links...
CA Document Repository: http://www.turktrust.com.tr/en/repository
CP: http://dl.turktrust.com.tr/pdf/TURKTRUST-CP-v09-SSL.pdf
CPS: http://dl.turktrust.com.tr/pdf/TURKTRUST-CPS-v09-SSL.pdf
CA Hierarchy: http://www.turktrust.com.tr/en/repository/root-certificate-installation-and-ARLs/
Assignee | ||
Comment 20•10 years ago
|
||
(In reply to Kathleen Wilson from comment #19)
> CA Hierarchy:
> http://www.turktrust.com.tr/en/repository/root-certificate-installation-and-
> ARLs/
Correction:
http://www.turktrust.com.tr/en/repository/root-certificate-installation-and-CRLs/
Assignee | ||
Comment 21•10 years ago
|
||
As per the summary in Comment #18, and on behalf of Mozilla I approve this request from TURKTRUST to include the following root certificates:
** “TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H5” (websites, code signing)
** "TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı H6” (websites), enable EV
I will file the NSS and PSM bugs for the approved changes.
Whiteboard: EV - Pending Approval → EV - Approved - awaiting NSS and PSM changes
Assignee | ||
Comment 22•10 years ago
|
||
I have filed bug #1147672 against NSS and bug #1147675 against PSM for the actual changes.
Assignee | ||
Updated•10 years ago
|
Whiteboard: EV - Approved - awaiting NSS and PSM changes → EV - In Firefox 42, NSS 3.19.3 - awaiting PSM changes
Assignee | ||
Updated•9 years ago
|
Status: ASSIGNED → RESOLVED
Closed: 9 years ago
Resolution: --- → FIXED
Whiteboard: EV - In Firefox 42, NSS 3.19.3 - awaiting PSM changes → EV - In Firefox 42, NSS 3.19.3; EV enabled in Firefox 44
Updated•8 years ago
|
Product: mozilla.org → NSS
Updated•2 years ago
|
Product: NSS → CA Program
You need to log in
before you can comment on or make changes to this bug.
Description
•