Closed
Bug 1040072
Opened 11 years ago
Closed 4 years ago
Add MULTICERT Root Certificate
Categories
(CA Program :: CA Certificate Root Program, task)
CA Program
CA Certificate Root Program
Tracking
(Not tracked)
RESOLVED
WONTFIX
People
(Reporter: ca.forum, Assigned: kathleen.a.wilson)
References
Details
(Whiteboard: [ca-verifying] - KW Comment #65 2018-12-06)
Attachments
(21 files, 4 obsolete files)
139.46 KB,
application/pdf
|
Details | |
141.69 KB,
application/pdf
|
Details | |
109.25 KB,
application/pdf
|
Details | |
495.91 KB,
application/pdf
|
Details | |
153.42 KB,
application/pdf
|
Details | |
314.09 KB,
application/pdf
|
Details | |
71.09 KB,
application/pdf
|
Details | |
75.98 KB,
application/pdf
|
Details | |
155.89 KB,
application/pdf
|
Details | |
61.32 KB,
application/pdf
|
Details | |
606.71 KB,
application/pdf
|
Details | |
659.71 KB,
image/jpeg
|
Details | |
710.81 KB,
image/jpeg
|
Details | |
36.99 KB,
application/pdf
|
Details | |
632.47 KB,
image/jpeg
|
Details | |
97.84 KB,
application/pdf
|
Details | |
766.04 KB,
application/pdf
|
Details | |
814.88 KB,
application/pdf
|
Details | |
816.15 KB,
application/pdf
|
Details | |
867.90 KB,
application/pdf
|
Details | |
154.19 KB,
application/pdf
|
Details |
User Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36
Assignee | ||
Comment 3•11 years ago
|
||
I am accepting this bug, and will work on it as soon as possible, but I have a large backlog.
https://wiki.mozilla.org/CA:Schedule#Requests_in_the_Information_Gathering_and_Verification_Phase
I will update this bug when I begin the Information Verification phase.
https://wiki.mozilla.org/CA:How_to_apply#Information_Verification
(In reply to him from comment #2)
> Super CA?
I don't know.
Sara, please see the description of a Super-CA, and clarify.
https://wiki.mozilla.org/CA:SubordinateCA_checklist#Super-CAs
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true
Yes, it is a Super CA. This is a Offline SuperCA which issue certificate for other MULTICERT Subordinate CA's.
All CA's, including SuperCA, are audited annually.
Website for testing
https://promotor.teste.multicert.com/
It is not a requirement (at least of the CA/B Baseline) but do you plan on adding the CA Issuers extension?
We're not using at the moment. However, we are planing to include this extension in the certificate profiles as soon as possible.
Assignee | ||
Comment 8•10 years ago
|
||
The attached document summarizes the information that has been verified.
The items highlighted in yellow indicate where further information or
clarification is needed. Please review the full document for accuracy and
completeness, and provide the necessary information in this bug.
Assignee | ||
Updated•10 years ago
|
Whiteboard: Information incomplete
New document with reviewed information and new audit statements.
Whiteboard: Information incomplete → Information incomplete - New Information
Assignee | ||
Comment 10•9 years ago
|
||
Please attach the audit statements directly to this bug.
>> This does respect to our subordinates MULTICERT CA 002 and MULTICERT CA 001 wich are, for now,
signed by Baltimore as well.
Does this mean that the subordinate "MULTICERT CA 002" is signed by both "MULTICERT Root Certification Authority 01" and "Baltimore CybertTrust Root"?
Assignee | ||
Updated•9 years ago
|
Whiteboard: Information incomplete - New Information → Information incomplete
Assignee | ||
Comment 11•9 years ago
|
||
I have entered the information for this request into Salesforce.
Please review the attached document to make sure it is accurate and complete, and comment in this bug to provide corrections and the additional requested information (search for NEED in the pdf).
Reporter | ||
Comment 12•9 years ago
|
||
(In reply to Kathleen Wilson from comment #10)
> Please attach the audit statements directly to this bug.
>
> >> This does respect to our subordinates MULTICERT CA 002 and MULTICERT CA 001 wich are, for now,
> signed by Baltimore as well.
>
> Does this mean that the subordinate "MULTICERT CA 002" is signed by both
> "MULTICERT Root Certification Authority 01" and "Baltimore CybertTrust Root"?
Yes Kathleen. For now, MULTICERT CA 001 and 002 are signed by both MULTICERT and Baltimore Root CA's.
Reporter | ||
Comment 13•9 years ago
|
||
Reporter | ||
Comment 14•9 years ago
|
||
Assignee | ||
Comment 15•9 years ago
|
||
(In reply to ca.forum from comment #14)
> Created attachment 8651752 [details]
> ETSI 102 042 /BR Audit
When audit statements are provided by the Certification Authority rather than having an audit statement posted on the auditor's website, the Mozilla process requires doing an independent verification of the authenticity of the audit statements that have been provided. Therefore, I have sent email to sgs.portugal@sgs.com to confirm the authenticity of the audit statement.
As per Comment #11, the following items are still needed:
1) NEED to resolve all errors listed here:
https://certificate.revocationcheck.com/promotor.teste.multicert.com
2) NEED: Please carefully read sections 8 through 14 of https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/inclusion/
and confirm that all future subCAs of MULTICERT will be required to be audited by an independent, competent party according to the ETSI or WebTrust audit criteria as per sections 11 through 14 of Mozilla's policy (unless they are technically constrained as described in section 9 of Mozilla policy).
Is this audit requirement in your CP/CPS?
3) NEED URLs and section/page number information pointing directly to the sections of the CP/CPS documents that describe the procedures for verifying that the email address to be included in the certificate is owned/controlled by the certificate subscriber.
as per item #4 of https://wiki.mozilla.org/CA:Information_checklist#Verification_Policies_and_Practices
4) NEED URL to a web page or a Bugzilla Bug Number that lists all of your publicly disclosed subordinate CA certificates as per item #4 of
https://wiki.mozilla.org/CA:Information_checklist#CA_Hierarchy_information_for_each_root_certificate
Reporter | ||
Comment 16•9 years ago
|
||
1) NEED to resolve all errors listed here:
https://certificate.revocationcheck.com/promotor.teste.multicert.com
[MULTICERT] MULTICERT Certification Authority exists since 2008 and was always signed by Baltimore. Last year, MULTICERT wage on its own Root Certification Authority. Thinking on our clients, We decide to maintain the Baltimore Root while our root was not recognized in every systems.
That’s why you have that problem in the OCSP. The url promotor.teste.multicert.com is using a ssl certificate and the server has the MULTICERT chain configured. However, in order to have a correct response to our client, we have, in the OCSP service, a responder with the Baltimore Chain.
2) NEED: Please carefully read sections 8 through 14 of https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/inclusion/
and confirm that all future subCAs of MULTICERT will be required to be audited by an independent, competent party according to the ETSI or WebTrust audit criteria as per sections 11 through 14 of Mozilla's policy (unless they are technically constrained as described in section 9 of Mozilla policy).
Is this audit requirement in your CP/CPS?
[MULTICERT]http://pkiroot.multicert.com/pol/CPS_MULTICERT_PJ.ECRAIZ_24.1.1_0001_en.pdf --> Chapter 9
3) NEED URLs and section/page number information pointing directly to the sections of the CP/CPS documents that describe the procedures for verifying that the email address to be included in the certificate is owned/controlled by the certificate subscriber.
as per item #4 of https://wiki.mozilla.org/CA:Information_checklist#Verification_Policies_and_Practices
[MULTICERT] We are implementing this issue at the moment. The due date is the 31 December. Until there, a new CP and CPS will be launched.
4) NEED URL to a web page or a Bugzilla Bug Number that lists all of your publicly disclosed subordinate CA certificates as per item #4 of
https://wiki.mozilla.org/CA:Information_checklist#CA_Hierarchy_information_for_each_root_certificate
[MULTICERT] https://pki.multicert.com/index.html. You can find here all the subordinate CA’s belonging to MULTICERT PKI.
Reporter | ||
Comment 17•9 years ago
|
||
About the ETSI 102 042 Audit Statement, is this issue closed?
Assignee | ||
Comment 18•9 years ago
|
||
(In reply to ca.forum from comment #16)
> 1) NEED to resolve all errors listed here:
> https://certificate.revocationcheck.com/promotor.teste.multicert.com
>
> [MULTICERT] MULTICERT Certification Authority exists since 2008 and was
> always signed by Baltimore. Last year, MULTICERT wage on its own Root
> Certification Authority. Thinking on our clients, We decide to maintain the
> Baltimore Root while our root was not recognized in every systems.
>
> That’s why you have that problem in the OCSP. The url
> promotor.teste.multicert.com is using a ssl certificate and the server has
> the MULTICERT chain configured. However, in order to have a correct response
> to our client, we have, in the OCSP service, a responder with the Baltimore
> Chain.
>
I don't understand.
Do you have your own OCSP service?
Can you set up a test server that does not have any dependency on the Baltimore Chain or OCSP service?
Reporter | ||
Comment 19•9 years ago
|
||
We do have our own OCSP, however we must have the Baltimore chain configured in the OCSP service until we have our Root CA available in Mozilla trusted store.
However, we are trying to set up a testing environment like you ask.
Reporter | ||
Comment 20•9 years ago
|
||
The new test server wihtout any depency from Baltimore is available for testing.
https://promotor.teste.multicert.com
Assignee | ||
Comment 21•9 years ago
|
||
(In reply to ca.forum from comment #20)
> The new test server wihtout any depency from Baltimore is available for
> testing.
>
> https://promotor.teste.multicert.com
Still getting errors:
https://certificate.revocationcheck.com/promotor.teste.multicert.com
Reporter | ||
Comment 22•9 years ago
|
||
We can not explain why this error occurs.
We have study the OCSP response for promotor.teste.multicert.com as well for www.cgd.com using https://certificate.revocationcheck.com.
The problem existing with multicert ocsp signature doesn’t happens with cgd ocsp signature. In order to find out what this error is, we had download both OCSP requests and responses from this site and analyzed them with OpenSSL.
The signature is performed the same way. Apparently the site doesn’t publish the multicert OCSP signing certificate, but, if you use the OpenSSL to decode the OCSP response, you'll be able to get it.
In other hand, we issue millions of ocsp responses, and we have no complains.
You may find attached all the results.
Is this site (https://certificate.revocationcheck.com) owned by Mozilla?
Reporter | ||
Comment 23•9 years ago
|
||
We can not explain why this error occurs.
We have study the OCSP response for promotor.teste.multicert.com as well for www.cgd.com using https://certificate.revocationcheck.com.
The problem existing with multicert ocsp signature doesn’t happens with cgd ocsp signature. In order to find out what this error is, we had download both OCSP requests and responses from this site and analyzed them with OpenSSL.
The signature is performed the same way. Apparently the site doesn’t publish the multicert OCSP signing certificate, but, if you use the OpenSSL to decode the OCSP response, you'll be able to get it.
In other hand, we issue millions of ocsp responses, and we have no complains.
You may find attached all the results.
Is this site (https://certificate.revocationcheck.com) owned by Mozilla?
Assignee | ||
Comment 24•9 years ago
|
||
(In reply to ca.forum from comment #23)
> Is this site (https://certificate.revocationcheck.com) owned by Mozilla?
I have sent email to the owner of the revocationcheck site to see if he can determine what the cause of the error is.
In the meantime, please let me know when the updated CP/CPS are available as per Comment #16.
> 3) NEED URLs and section/page number information pointing directly to the
> sections of the CP/CPS documents that describe the procedures for verifying
> that the email address to be included in the certificate is owned/controlled
> by the certificate subscriber.
> as per item #4 of
> https://wiki.mozilla.org/CA:
> Information_checklist#Verification_Policies_and_Practices
>
> [MULTICERT] We are implementing this issue at the moment. The due date is
> the 31 December. Until there, a new CP and CPS will be launched.
Assignee | ||
Comment 25•9 years ago
|
||
(In reply to Kathleen Wilson from comment #24)
> (In reply to ca.forum from comment #23)
> > Is this site (https://certificate.revocationcheck.com) owned by Mozilla?
>
> I have sent email to the owner of the revocationcheck site to see if he can
> determine what the cause of the error is.
Here's his reply: The server returns a response signed with a "1.3.14.3.2.29" signature algorithm instead of "1.2.840.113549.1.1.5".
>
> In the meantime, please let me know when the updated CP/CPS are available as
> per Comment #16.
> > 3) NEED URLs and section/page number information pointing directly to the
> > sections of the CP/CPS documents that describe the procedures for verifying
> > that the email address to be included in the certificate is owned/controlled
> > by the certificate subscriber.
> > as per item #4 of
> > https://wiki.mozilla.org/CA:
> > Information_checklist#Verification_Policies_and_Practices
> >
> > [MULTICERT] We are implementing this issue at the moment. The due date is
> > the 31 December. Until there, a new CP and CPS will be launched.
Reporter | ||
Comment 26•9 years ago
|
||
(In reply to Kathleen Wilson from comment #25)
> (In reply to Kathleen Wilson from comment #24)
> > (In reply to ca.forum from comment #23)
> > > Is this site (https://certificate.revocationcheck.com) owned by Mozilla?
> >
> > I have sent email to the owner of the revocationcheck site to see if he can
> > determine what the cause of the error is.
>
> Here's his reply: The server returns a response signed with a
> "1.3.14.3.2.29" signature algorithm instead of "1.2.840.113549.1.1.5".
MULTICERT - Problem resolved. Please Check at https://certificate.revocationcheck.com. Don't forget to clear the browser chache.
>
> >
> > In the meantime, please let me know when the updated CP/CPS are available as
> > per Comment #16.
> > > 3) NEED URLs and section/page number information pointing directly to the
> > > sections of the CP/CPS documents that describe the procedures for verifying
> > > that the email address to be included in the certificate is owned/controlled
> > > by the certificate subscriber.
> > > as per item #4 of
> > > https://wiki.mozilla.org/CA:
> > > Information_checklist#Verification_Policies_and_Practices
> > >
> > > [MULTICERT] We are implementing this issue at the moment. The due date is
> > > the 31 December. Until there, a new CP and CPS will be launched.
[MULTICERT] . We are implementing a new feature to automatically confirm the user email. 31 of January is the due date.
Assignee | ||
Comment 27•9 years ago
|
||
(In reply to ca.forum from comment #13)
> Created attachment 8651751 [details]
> ETSI 101 456 Audit
(In reply to ca.forum from comment #14)
> Created attachment 8651752 [details]
> ETSI 102 042 /BR Audit
I have exchanged email with the auditor to confirm the authenticity of these audit statements.
Assignee | ||
Comment 28•9 years ago
|
||
(In reply to ca.forum from comment #26)
> [MULTICERT] . We are implementing a new feature to automatically confirm the
> user email. 31 of January is the due date.
Please update this bug when the updated CP/CPS is available.
Reporter | ||
Comment 29•9 years ago
|
||
We are now confirming User email on the Subject registration.
Please see page 21 at the url https://pki.multicert.com/pol/cp/MULTICERT_PJ.CA3_24.1.2_0002_en.pdf.
Assignee | ||
Comment 30•9 years ago
|
||
(In reply to ca.forum from comment #29)
> We are now confirming User email on the Subject registration.
>
> Please see page 21 at the url
> https://pki.multicert.com/pol/cp/MULTICERT_PJ.CA3_24.1.2_0002_en.pdf.
Thanks!
I was just testing BR compliance, and got an error...
http://cert-checker.allizom.org/
Root Cert: http://pkiroot.multicert.com/cert/MCRootCA.cer
Test Website: https://promotor.teste.multicert.com/
/C=PT/O=MC/OU=Certificado SSL/CN=promotor.teste.multicert.com
...
Error
BR certificates with organizationName must include either localityName or stateOrProvinceName
Please comment in this bug when the error has been resolved.
Reporter | ||
Comment 31•9 years ago
|
||
Problem solved.
This issue was related to a certificate profile we have for testing the production certificate chain. We had issued a few certificates for chain testing and this one was, in a wrong way, included in this tests.
We have just correct this situation by issuing a new certificate in the right profile, which is online now.
Assignee | ||
Comment 32•9 years ago
|
||
Assignee | ||
Comment 33•9 years ago
|
||
This request has been added to the queue for public discussion.
https://wiki.mozilla.org/CA:Schedule#Queue_for_Public_Discussion
I will update this bug when I start the discussion.
Whiteboard: Information incomplete → Ready for Public Discussion
Reporter | ||
Comment 34•9 years ago
|
||
Assignee | ||
Comment 35•9 years ago
|
||
(In reply to ca.forum from comment #34)
> Created attachment 8746964 [details]
> New ETSI 102 042 /BR Audit Statment 2016
As per Mozilla's process, I have exchanged email with the auditor to confirm the authenticity of this audit statement.
Reporter | ||
Comment 36•9 years ago
|
||
Whiteboard: Ready for Public Discussion → [ca-ready-for-discussion-new 2016-02-12]
Assignee | ||
Comment 37•8 years ago
|
||
MULTICERT, Please perform the BR Self Assessment, and attach the resulting BR-self-assessment document to this bug.
Note:
Current version of the BRs: https://cabforum.org/baseline-requirements-documents/
Until a version of the BRs is published that describes all of the allowed methods of domain validation, use version 1.4.1 for section 3.2.2.4 (Domain validation): https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.4.1.pdf
= Background =
We are adding a BR-self-assessment step to Mozilla's root inclusion/change process.
Description of this new step is here:
https://wiki.mozilla.org/CA:BRs-Self-Assessment
It includes a link to a template for CA's BR Self Assessment, which is a Google Doc:
https://docs.google.com/spreadsheets/d/1ni41Czial_mggcax8GuCBlInCt1mNOsqbEPzftuAuNQ/edit?usp=sharing
Phase-in plan is here:
https://groups.google.com/d/msg/mozilla.dev.security.policy/Y-PxWRCIcck/Fi9y6vOACQAJ
In particular, note:
+ For the CAs currently in the queue for discussion, I would ask them to perform this BR Self Assessment before I would start their discussion.
Whiteboard: [ca-ready-for-discussion-new 2016-02-12] → [ca-ready-for-discussion-new 2016-02-12] - Need BR Self Assessment
Updated•8 years ago
|
Product: mozilla.org → NSS
Reporter | ||
Comment 38•7 years ago
|
||
Reporter | ||
Comment 39•7 years ago
|
||
Reporter | ||
Comment 40•7 years ago
|
||
Reporter | ||
Comment 41•7 years ago
|
||
Assignee | ||
Comment 42•7 years ago
|
||
Still waiting for CA's BR Self Assessment, per Comment #37.
Assignee: kwilson → awu
Reporter | ||
Comment 43•7 years ago
|
||
Kathleen,
We expect to update it next week.
Regards,
Sara
Comment 44•7 years ago
|
||
Bulk reassign, see https://bugzilla.mozilla.org/show_bug.cgi?id=1430324
Assignee: awu → kwilson
Comment 45•7 years ago
|
||
MULTICERT: Are you still planning to provide a BR Self Assessment?
Also, I took a quick look at this request and identified the following problems:
1. The test site promotor.teste.multicert.com is not accessible
2. The most recent audit statement you provided do not contain all information required by Mozilla policy section 3.1.4 (https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/)
3. The CP and CPS were last updated in 2014 and 2015 respectively
4. The document described as the 'SSL CP' (https://pki.multicert.com/pol/cp/MULTICERT_PJ.CA3_24.1.2_0009_pt.pdf) hasn't been translated, doesn't appear to be in RFC 2527 or RFC 3647 format, and doesn't appear to contain all information required by the BRs.
5. A bunch of errors are being identified for certs issued under this root: https://crt.sh/?caid=1602&opt=cablint,zlint,x509lint&minNotBefore=2014-01-01
Flags: needinfo?(ca.forum)
Reporter | ||
Comment 46•7 years ago
|
||
Yes. We are working on it, with a few delays, but we pretend to provide it in the next week.
We are also analyzing the problem identified.
Flags: needinfo?(ca.forum)
Reporter | ||
Comment 47•7 years ago
|
||
Assignee | ||
Comment 48•7 years ago
|
||
Moving this bug back to the Information Verification phase, step 2 of
https://wiki.mozilla.org/CA/Application_Process#Process_Overview
The status if this request is that we are waiting for the CA to attach their BR Self Assessment to this bug.
https://wiki.mozilla.org/CA/BR_Self-Assessment
Whiteboard: [ca-ready-for-discussion-new 2016-02-12] - Need BR Self Assessment → [ca-verifying] - Need BR Self Assessment
Reporter | ||
Comment 49•7 years ago
|
||
Hello,
My name is Carla Coutinho, i work in Multicert.
Find attached the Self Assessment for Multicert CA.
Any doubts, feel free to ask.
Best regards,
Carla Coutinho
Attachment #8962660 -
Attachment description: 2017 Audit Statment → 2017 SSL Audit Statment
Reporter | ||
Comment 50•7 years ago
|
||
Attachment #8962660 -
Attachment description: 2017 SSL Audit Statment → 2017 SSL Audit Statement
Reporter | ||
Comment 51•7 years ago
|
||
Attachment #8970549 -
Attachment description: 2017 Seal Audit Statement → 2017 eSeal Audit Statement
Reporter | ||
Comment 52•7 years ago
|
||
Comment 53•7 years ago
|
||
Why does this bug report have the severity = critical? This bug requests an enhancement to the NSS database, not a fix to a discrepancy that represents a loss of existing functionality.
Reporter | ||
Comment 54•7 years ago
|
||
My mistake, back to normal
Reporter | ||
Comment 55•7 years ago
|
||
Url's for Testing:
https://expired.mtrust.online/ - with an expired certificate
https://revoked.mtrust.online/ - with a revoked certificate
https://demo.mtrust.online/ - with a valid certificate
Attachment #8962660 -
Attachment is obsolete: true
Reporter | ||
Comment 56•6 years ago
|
||
Reporter | ||
Comment 57•6 years ago
|
||
Attachment #8970549 -
Attachment is obsolete: true
Reporter | ||
Comment 58•6 years ago
|
||
Attachment #8970548 -
Attachment is obsolete: true
Reporter | ||
Comment 59•6 years ago
|
||
Attachment #8970550 -
Attachment is obsolete: true
Comment 60•6 years ago
|
||
Reference to MULTICERT misissuance under Camerfirma root: https://bugzilla.mozilla.org/show_bug.cgi?id=1481862
Assignee | ||
Comment 61•6 years ago
|
||
Attached is the information that has been verified for this request. Within the document search for "NEED" to find where further information is needed from the CA.
In particular:
1) The Audit Statements do not properly specify the audit period start and end dates.
Audit period is NOT the same as the dates that the audit was performed.
Reference:
Sections 3.1.3 and 3.1.4 of
https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/
and
https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.6.0.pdf
Audit Period: In a period-of-time audit, the period between the first day (start) and the last day of operations (end) covered by the auditors in their engagement. (This is not the same as the period of time when the auditors are on-site at the CA.) The coverage rules and maximum length of audit periods are defined in section 8.1.
2) There is a Confidentiality clause at the top of both of the CP and CPS documents. This is problematic, because Mozilla requires the CA's CP/CPS to be publicly disclosed.
Note that the CP and CPS are published on the CA's website:
https://pki.multicert.com/index.html
So I recommend that the CA remove the confidentiality clauses.
3) Are you requesting the Email (S/MIME) trust bit for this root?
If requesting the Email (S/MIME) trust bit, then the CP and/or CPS must explain how the CA confirms that the certificate requester owns/controls the email address to be included in the certificate.
https://wiki.mozilla.org/CA/Required_or_Recommended_Practices#Verifying_Email_Address_Control
4) Please check that the test websites are serving up the version of the intermediate certificate that chains up to the MULTICERT Root Certification Authority 01 root. I have the MULTICERT Root Certification Authority 01 root imported, but when I disable the Baltimore CyberTrust Root, the SSL validation does not switch over to the MULTICERT Root Certification Authority 01, so the test website fails.
5) Please explain the Lint testing errors:
https://crt.sh/?caid=5842&opt=cablint,zlint,x509lint&minNotBefore=2014-04-04
https://crt.sh/?caid=1602&opt=cablint,zlint,x509lint&minNotBefore=2014-04-04
https://crt.sh/?caid=84368&opt=cablint,zlint,x509lint&minNotBefore=2014-04-04
https://crt.sh/?caid=15339&opt=cablint,zlint,x509lint&minNotBefore=2014-04-04
6) It appears that MULTICERT CA allows for externally-operated subordinate CAs. However, I did not find text in the CP or CPS stating that such externally-operated subCAs must follow the rules of the CP/CPS and must be externally-audited (as per the BRs and Mozilla's requirements), or must be technically constrained, etc.
Assignee | ||
Updated•6 years ago
|
Whiteboard: [ca-verifying] - Need BR Self Assessment → [ca-verifying] - KW Comment #61 2018-08-15
Reporter | ||
Comment 62•6 years ago
|
||
Dear Kathleen,
We are reviewing your inputs and expect to respond within the next few days.
Regards
Sara
Reporter | ||
Comment 63•6 years ago
|
||
Dear Kathleen,
Please find below comments to the issues that you posted:
1) The Audit Statements do not properly specify the audit period start and end dates.
Audit period is NOT the same as the dates that the audit was performed.
Reference:
Sections 3.1.3 and 3.1.4 of
https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/
and
https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.6.0.pdf
Audit Period: In a period-of-time audit, the period between the first day (start) and the last day of operations (end) covered by the auditors in their engagement. (This is not the same as the period of time when the auditors are on-site at the CA.) The coverage rules and maximum length of audit periods are defined in section 8.1.
-> The audit was performed between 03.08.2017 to 24.08.2017. In accordance with the requirement 7.6 b) of EN 319 403, “a TSP audit may be passed with pending nonconformities provided that these do not impact the ability of the TSP to meet the intended service. This certification decision is conditional upon to the implementation of corrective actions within 3 months after conclusion of the audit (depending on the type and criticality of the correction(s))”. So, between 03.08.2017 to 24.08.2017 it was performed the audit, and between 3.11.2017 to 19.12.2017, it was performed a new audit, to verify if the non-conformities identified before was resolved.
If necessary, we can provide the auditor contact so you can check.
2) There is a Confidentiality clause at the top of both of the CP and CPS documents. This is problematic, because Mozilla requires the CA's CP/CPS to be publicly disclosed.
Note that the CP and CPS are published on the CA's website:
https://pki.multicert.com/index.html
So I recommend that the CA remove the confidentiality clauses.
-> The new version publicly available does not have the confidentiality clause:
CP (https://pki.multicert.com/docs/EN/MULTICERT_PJ.ECRAIZ_426_en.pdf)
CPS (https://pki.multicert.com/docs/EN/MULTICERT_PJ.ECRAIZ_427_en.pdf)
Subordinate CA Policy (http://pkiroot.multicert.com/politicas/MULTICERT_PJ.ECRAIZ_405_en.pdf)
3) Are you requesting the Email (S/MIME) trust bit for this root?
If requesting the Email (S/MIME) trust bit, then the CP and/or CPS must explain how the CA confirms that the certificate requester owns/controls the email address to be included in the certificate.
https://wiki.mozilla.org/CA/Required_or_Recommended_Practices#Verifying_Email_Address_Control
-> Yes, We are requesting the Email trust bit. We validate that the subscriber of the certificate have the possession of the email. We perform this validation in a challenge-response method, in accordance with section 3.2.2 of the CPS.
4) Please check that the test websites are serving up the version of the intermediate certificate that chains up to the MULTICERT Root Certification Authority 01 root. I have the MULTICERT Root Certification Authority 01 root imported, but when I disable the Baltimore CyberTrust Root, the SSL validation does not switch over to the MULTICERT Root Certification Authority 01, so the test website fails.
-> We have corrected the hierarchy chain of the test websites:
Website with valid certificate: https://promotor.teste.multicert.com/
Website with expired certificate: https://expired.mtrust.online/
Website with revoked certificate: https://revoked.mtrust.online/
5) Please explain the Lint testing errors:
https://crt.sh/?caid=5842&opt=cablint,zlint,x509lint&minNotBefore=2014-04-04
-> ERROR: CA certificates must include CRL Signing This certificate is revoked.
-> The remaining certificates are not SSL OV certificates, but OCSP or TSA certificates. In this case, the filter from crt.sh shouldn’t have been applied. Is this understanding correct?
https://crt.sh/?caid=1602&opt=cablint,zlint,x509lint&minNotBefore=2014-04-04
-> Most of the certificates presented in this filter are revoked or expired. In fact, most of them are not SSL Certificate, but OCSP, TSA and Qualified Signature certificates. Once more, this shouldn’t be on the filter, only SSL certificates. However, we do know that some of them are active and with problems essentially on the 'Organization Name' field that must be less than 64 characters.
To resolve all issues identified and also to give to ours costumers a new version of the Certificate Transparency (initially we were using OCSP stapling and now we implemented the Certificate Extension.), Multicert had established a plan to replace all SSL certificates. We are already replacing the SSL certificates, in phases. Until the end of December this year, we will revoke the previous SSL certificates.
https://crt.sh/?caid=84368&opt=cablint,zlint,x509lint&minNotBefore=2014-04-04´
-> All certificates presented in this filter are revoked.
https://crt.sh/?caid=15339&opt=cablint,zlint,x509lint&minNotBefore=2014-04-04
-> All certificates presented in this filter are OCSP or TSA certificates.
6) It appears that MULTICERT CA allows for externally-operated subordinate CAs. However, I did not find text in the CP or CPS stating that such externally-operated subCAs must follow the rules of the CP/CPS and must be externally-audited (as per the BRs and Mozilla's requirements), or must be technically constrained, etc.
-> We added a section to describe the external certification authorities, in section 1.3.1.1 in CP and CPS. Also, this section refers to the Subordinate CA Policy publicly available, where we describe the practices for external certification authorities. The policy is available here: http://pkiroot.multicert.com/politicas/MULTICERT_PJ.ECRAIZ_405_en.pdf
Available for any question,
Best Regards,
Patrícia Silva
Comment 64•6 years ago
|
||
MULTICERT misissuance of certificates with validity periods greater than 825 days is documented in bug #1509002
QA Contact: kwilson
Assignee | ||
Updated•6 years ago
|
Assignee | ||
Comment 65•6 years ago
|
||
Mozilla's process has changed from using PDF documents to directly pulling information from the Root Inclusion Case in the CCADB. The information for this root inclusion request is available at the following URL. Search in the page for the word "NEED" to see where further clarification is requested.
https://ccadb-public.secure.force.com/mozilla/PrintViewForCase?CaseNumber=00000029
In particular, the CA needs to provide:
1) Instructions for reporting suspected Private Key Compromise, Certificate misuse, or other types of fraud, compromise, or any other matter related to certificates. Preference is an email address that the CA closely monitors.
2) Updated audit statements per
https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy#314-public-audit-information
and
https://bugzilla.mozilla.org/show_bug.cgi?id=1502957#c16
3) Resolution to https://bugzilla.mozilla.org/show_bug.cgi?id=1509002
"Camerfirma: MULTICERT certificates with a validity period greater than 825 days"
No longer depends on: 1502957
Whiteboard: [ca-verifying] - KW Comment #61 2018-08-15 → [ca-verifying] - KW Comment #65 2018-12-06
Comment 66•4 years ago
|
||
Today I sent an email to MULTICERT inquiring whether or not they intend to pursue this root inclusion request.
Flags: needinfo?(ca.forum)
Comment 67•4 years ago
|
||
MULTICERT responded that they will submit new RSA and ECC root CA certificates when they are ready.
Flags: needinfo?(ca.forum)
Reporter | ||
Comment 68•4 years ago
|
||
Many thanks for updating this bug.
I suggest this one to be closed now and we will file a new one when we are ready to start the process.
Updated•4 years ago
|
Status: ASSIGNED → RESOLVED
Closed: 4 years ago
Resolution: --- → WONTFIX
Updated•2 years ago
|
Product: NSS → CA Program
You need to log in
before you can comment on or make changes to this bug.
Description
•