Closed
Bug 1176188
Opened 9 years ago
Closed 8 years ago
Enable email trust bit for Actalis Authentication Root CA
Categories
(CA Program :: CA Certificate Root Program, task)
CA Program
CA Certificate Root Program
Tracking
(Not tracked)
RESOLVED
FIXED
People
(Reporter: adriano.santoni, Assigned: kwilson, Mentored)
References
Details
(Whiteboard: Updated in NSS 3.23)
Attachments
(2 files)
This is a request to turn on the mail trust bit for the Actalis root named "Actalis Authentication Root CA". Our root is already trusted for secure email on all other platforms, with the sole exception of Mozilla, so we would like the email trust bit to be enabled for our root in Mozilla as well. All information about our current S/MIME certificate services can be found at the following address: https://www.actalis.it/products/certificates-for-secure-electronic-mail.aspx At present, we only have one S/MIME policy: https://www.actalis.it/documenti-it/caact-free-s-mime-certificates-policy.aspx This policy incorporates by reference our CPS, to be found here: https://www.actalis.it/documenti-en/cps-for-ssl-server-and-code-signing.pdf Our current audit statement does not yet cover these certificates, but the next one will.
Assignee | ||
Updated•9 years ago
|
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true
Whiteboard: Information incomplete
Assignee | ||
Comment 1•9 years ago
|
||
I have entered the information for this request into Salesforce. Please review the attached document to make sure it is accurate and complete, and comment in this bug to provide corrections and the additional requested information.
Reporter | ||
Comment 2•9 years ago
|
||
Find below the additional information requested: CP/CPS for email certs ====================== I already provided the link to the relevant CP upon submitting this bug: https://www.actalis.it/documenti-it/caact-free-s-mime-certificates-policy.aspx Please note that this CP includes by reference our CPS, which is found at: https://www.actalis.it/documenti-en/cps-for-ssl-server-and-code-signing.pdf Auditor Qualifications ====================== Our auditor, IMQ, meets the requirements of ETSI 102 042 - Annex E (Auditors qualification) as it is accredited by Accredia based on ISO/IEC 17021 and ISO 27006, where Accredia is the Italian MLA signatory (as it can be seen on http://www.european-accreditation.org). The accreditations of IMQ can be found at http://www.accredia.it/ppsearch/accredia_orgmask.jsp?PPSEARCH_ORG_SEARCH_MASK_ORG=0040 Email Address Verification Procedures ===================================== The procedure can be found under paragraph 3.2.1 of our CP, and I am quoting it below: "The only element of the requestor’s identity that is collected and verified by the CA is the requestor’s email address. This is checked by sending a random code to the alleged email address specified by the requestor in the on-line certificate request form, then asking the requestor to also enter such code before the certificate request is accepted. The requestor’s ability to enter the correct code proves that the specified email address exists and the requestor has access to it."
Comment 3•9 years ago
|
||
(In reply to adriano.santoni from comment #2) > "The only element of the requestor’s identity that is collected and verified > by the CA is the requestor’s > email address. This is checked by sending a random code to the alleged email > address specified > by the requestor in the on-line certificate request form, then asking the > requestor to also enter > such code before the certificate request is accepted. The requestor’s > ability to enter the correct code > proves that the specified email address exists and the requestor has access > to it." This merely proves that the requester has access to the E-mail address. It does not prove the requester owns the address.
Reporter | ||
Comment 4•9 years ago
|
||
Mozilla does not require the CA to assess that the requestor *owns* the address: https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/inclusion/ In fact, it reads: "for a certificate to be used for digitally signing or encrypting email messages, the CA takes reasonable measures to verify that the entity submitting the request controls the email account associated with the email address referenced in the certificate or has been authorized by the email account holder to act on the account holder’s behalf" And that's precisely what we do: we take a reasonable measure to verify that the requestor either controls or has access to the mailbox. If the requestor can read the mailbox, either she is the mailbox owner, or she has been allowed by the owner to use that mailbox. In either case, it's ok. Recipients of mail messages sent from that mailbox cannot distinguish the two persons (mailbox "owner" vs. mailbox "user"), based on just the sender's email address, and our S/MIME certificates only contain the email address. Besides, this procedure is already used by other CAs whos Root is trusted in Mozilla for secure email.
Comment 5•9 years ago
|
||
I do not think "access" equals "control".
Assignee | ||
Comment 6•8 years ago
|
||
(In reply to David E. Ross from comment #5) > I do not think "access" equals "control". Hi David, To date, we have allowed this type of challenge-response mechanism, and it is commonly used by the CAs. https://wiki.mozilla.org/CA:Recommended_Practices#Verifying_Email_Address_Control "The recommended way to satisfy this requirement is to perform a challenge-response type of procedure in which the CA sends email to the email address to be included in the certificate, and the applicant must respond in a way that demonstrates that they have control over that email address. For instance, the CA may send an email to the address to be included in the certificate, containing secret unpredictable information, giving the applicant a limited time to use the information within." If you think we should change this, then please start a discussion about it in the mozilla.dev.security.policy forum. Thanks, Kathleen
Assignee | ||
Comment 7•8 years ago
|
||
Assignee | ||
Comment 8•8 years ago
|
||
I will try to start the discussion soon. https://wiki.mozilla.org/CA:Schedule#Queue_for_Public_Discussion
Whiteboard: Information incomplete → Ready for Public Discussion
Reporter | ||
Comment 9•8 years ago
|
||
Our latest ETSI TS 102 042 audit statement was just published on our web site at: https://www.actalis.it/documenti-en/actalisca_audit_statement.pdf This audit statement shows that also our S/MIME certificates conforms to ETSI TS 102 042, policy LCP.
Assignee | ||
Comment 10•8 years ago
|
||
(In reply to adriano.santoni from comment #9) > Our latest ETSI TS 102 042 audit statement was just published on our web > site at: > https://www.actalis.it/documenti-en/actalisca_audit_statement.pdf > > This audit statement shows that also our S/MIME certificates conforms to > ETSI TS 102 042, policy LCP. I exchanged email with the auditor to confirm the authenticity of the audit statement.
Assignee | ||
Comment 11•8 years ago
|
||
I am now opening the public discussion period for this request from Actalis to turn on the Email trust bit for the "Actalis Authentication Root CA" root certificate that was included via Bugzilla Bug #520557, and enabled for EV via Bugzilla Bug #957548. For a description of the public discussion phase, see https://wiki.mozilla.org/CA:How_to_apply#Public_discussion Public discussion will be in the mozilla.dev.security.policy forum. https://www.mozilla.org/en-US/about/forums/#dev-security-policy The discussion thread is called "Enable Email trust bit for Actalis root cert". Please actively review, respond, and contribute to the discussion. A representative of Actalis must promptly respond directly in the discussion thread to all questions that are posted.
Whiteboard: Ready for Public Discussion → In public discussion
Assignee | ||
Comment 12•8 years ago
|
||
The public comment period for this request is now over. This request has been evaluated as per Mozilla’s CA Certificate Inclusion Policy at https://www.mozilla.org/about/governance/policies/security-group/certs/policy/inclusion/ Here follows a summary of the assessment. If anyone sees any factual errors, please point them out. Inclusion Policy Section 4 [Technical]. I am not aware of instances where Actalis has knowingly issued certificates for fraudulent use. If anyone knows of any such issues or instances, please note them in this bug. Inclusion Policy Section 6 [Relevance and Policy]. Actalis appears to provide a service relevant to Mozilla users. Actalis CA has a wide number of customers, mainly banks and local government. Actalis is a Qualified certification service provider according to the EU Signature Directive (Directive 1999/93/EC). Root Certificate Name: Actalis Authentication Root CA O From Issuer Field: Actalis S.p.A./03358520967 Trust Bits: Code; Email; Websites EV Policy OID: 1.3.159.1.17.1 Root Certificate Download URL: Already included Certificate Summary: Requesting that the email trust bit be turned on for the "Actalis Authentication Root CA" root certificate that was included via Bugzilla Bug #520557, and enabled for EV via Bugzilla Bug #957548. * The primary documents are the CP for Email Certs and the CPS for SSL and Code Signing Certs; provided in Italian and English. Document Repository: http://www.actalis.it/area-download.aspx CP: https://www.actalis.it/documenti-it/caact-free-s-mime-certificates-policy.aspx CPS: https://www.actalis.it/documenti-en/cps-for-ssl-server-and-code-signing.aspx CP/CPS for Email Certs: https://www.actalis.it/documenti-it/caact-free-s-mime-certificates-policy.aspx CP/CPS for SSL and Code Signing Certs: https://www.actalis.it/documenti-en/cps-for-ssl-server-and-code-signing.pdf Inclusion Policy Section 18 [Certificate Hierarchy] This root signs internally-operated intermediate certificates that sign end-entity certificates. Externally Operated SubCAs: None. None planned. Cross Signing: None. None planned. Inclusion Policy Section 7 [Validation]. Actalis appears to meet the minimum requirements for subscriber verification, as follows: * SSL Verification Procedures: According to section 3.3.1 of the CPS, For SSL Server certificates, the CA verifies that all FQDNs and IP address to be included in the certificate are under the control of the Applicant organization, or his parent organization. These checks are carried out by different methods, depending on the case and the certificate class: - by means of WHOIS queries (+ reverse DNS lookups for IP addresses) to reliable DNS information sources. - by querying the relevant DNS Registrars or governmental domain registration agencies, as appropriate; - by communicating with the domain administrator via e-mail, using an e-mail address obtainned by pre-pending a “admin”, “administrator”, “webmaster”, “hostmaster”, or “postmaster” to the domain name (this latter is obtained by pruning zero or more components from the requested FQDN). Should one or more of those FQDNs and/or IP addresses be managed by an entity other than the Applicant or their parent organization, the Applicant is required to provide evidence to the CA that they have been formally delegated by the domains’ owner to manage those domains and/or IP addresses. * EV SSL Verification Procedures: CPS section 3.3.2. * Email Verification Procedures: According to section 3.2.1 of the CP/CPS for Email Certs, The only element of the requestor’s identity that is collected and verified by the CA is the requestor’s email address. This is checked by sending a random code to the alleged email address specified by the requestor in the on-line certificate request form, then asking the requestor to also enter such code before the certificate request is accepted. The requestor’s ability to enter the correct code proves that the specified email address exists and the requestor has access to it. No other attributes (e.g. name, surname, affiliation, etc.) are collected or verified by the CA, as they are not inserted into the certificate. Code Signing Subscriber Verification Procedure: CPS section 1.3.3. Certificate Revocation CRL URLs: http://portal.actalis.it/Repository/AUTH-ROOT/getLastCRL http://crl03.actalis.it/Repository/AUTH-G3/getLastCRL OCSP URLs: http://portal.actalis.it/VA/AUTH-ROOT http://ocsp03.actalis.it/VA/AUTH-G3 OCSP responses have an expiration time of 1 day Inclusion Policy Sections 11-14 [Audit]. Annual audits are performed by IMQ, according to the ETSI TS 102 042 criteria. http://www.actalis.it/documenti-en/actalisca_audit_statement.pdf Based on this assessment I intend to approve this request from Actalis to turn on the email trust bit for the already-included "Actalis Authentication Root CA" root certificate.
Whiteboard: In public discussion → Pending Approval
Assignee | ||
Comment 13•8 years ago
|
||
As per the summary in Comment #12, and on behalf of Mozilla I approve this request from Actalis to turn on the Email trust bit for the following root certificate: ** "Actalis Authentication Root CA" (websites, email, code), EV already enabled I will file the NSS bug for the approved change.
Whiteboard: Pending Approval → Approved - awaiting NSS changes
Assignee | ||
Updated•8 years ago
|
Status: ASSIGNED → RESOLVED
Closed: 8 years ago
Resolution: --- → FIXED
Whiteboard: Approved - awaiting NSS changes → Updated in NSS 3.23
Updated•7 years ago
|
Product: mozilla.org → NSS
Updated•1 year ago
|
Product: NSS → CA Program
You need to log in
before you can comment on or make changes to this bug.
Description
•