Closed
Bug 1391064
Opened 7 years ago
Closed 7 years ago
SECOM: Non-BR-Compliant Certificate Issuance
Categories
(CA Program :: CA Certificate Compliance, task)
CA Program
CA Certificate Compliance
Tracking
(Not tracked)
RESOLVED
FIXED
People
(Reporter: kathleen.a.wilson, Assigned: h-kamo)
References
Details
(Whiteboard: [ca-compliance] [ov-misissuance])
The following problems have been found in certificates issued by your CA, and reported in the mozilla.dev.security.policy forum. Direct links to those discussions are provided for your convenience.
To continue inclusion of your CA’s root certificates in Mozilla’s Root Store, you must respond in this bug to provide the following information:
1) How your CA first became aware of the problems listed below (e.g. via a Problem Report, via the discussion in mozilla.dev.security.policy, or via this Bugzilla Bug), and the date.
2) Prompt confirmation that your CA has stopped issuing TLS/SSL certificates with the problems listed below.
3) Complete list of certificates that your CA finds with each of the listed issues during the remediation process. The recommended way to handle this is to ensure each certificate is logged to CT and then attach a CSV file/spreadsheet of the fingerprints or crt.sh IDs, with one list per distinct problem.
4) Summary of the problematic certificates. For each problem listed below: number of certs, date first and last certs with that problem were issued.
5) Explanation about how and why the mistakes were made, and not caught and fixed earlier.
6) List of steps your CA is taking to resolve the situation and ensure such issuance will not be repeated in the future, accompanied with a timeline of when your CA expects to accomplish these things.
7) Regular updates to confirm when those steps have been completed.
Note Section 4.9.1.1 of the CA/Browser Forum’s Baseline Requirements, which states:
“The CA SHALL revoke a Certificate within 24 hours if one or more of the following occurs: …
9. The CA is made aware that the Certificate was not issued in accordance with these Requirements or the CA’s Certificate Policy or Certification Practice Statement;
10. The CA determines that any of the information appearing in the Certificate is inaccurate or misleading; …
14. Revocation is required by the CA’s Certificate Policy and/or Certification Practice Statement; or
15. The technical content or format of the Certificate presents an unacceptable risk to Application Software Suppliers or Relying Parties (e.g. the CA/Browser Forum might determine that a deprecated cryptographic/signature algorithm or key size presents an unacceptable risk and that such Certificates should be revoked and replaced by CAs within a given period of time).
However, it is not our intent to introduce additional problems by forcing the immediate revocation of certificates that are not BR compliant when they do not pose an urgent security concern. Therefore, we request that your CA perform careful analysis of the situation. If there is justification to not revoke the problematic certificates, then explain those reasons and provide a timeline for when the bulks of the certificates will expire or be revoked/replaced.
We expect that your forthcoming audit statements will indicate the findings of these problems. If your CA will not be revoking the certificates within 24 hours in accordance with the BRs, then that will also need to be listed as a finding in your CA’s BR audit statement.
We expect that your CA will work with your auditor (and supervisory body, as appropriate) and the Root Store(s) that your CA participates in to ensure your analysis of the risk and plan of remediation is acceptable. If your CA will not be revoking the problematic certificates as required by the BRs, then we recommend that you also contact the other root programs that your CA participates in to acknowledge this non-compliance and discuss what expectations their Root Programs have with respect to these certificates.
The problems reported for your CA in the mozilla.dev.security.policy forum are as follows:
** Certificates with metadata-only subject fields (at least one subject field that only contains ASCII punctuation characters)
https://groups.google.com/d/msg/mozilla.dev.security.policy/Sae5lpT02Ng/-lsC11JnBwAJ
Prevent further issuance of certs with N/A and other metadata but revocation not necessary in this case.
Assignee | ||
Comment 1•7 years ago
|
||
Dear Kathleen-san,
Thank you for the notice.
We are now contacting the customer and also going to undertake technical measure to avoid this kind of error in the future.
Comment 2•7 years ago
|
||
Greetings. It has been one week, and no answer to the above matters has been provided.
When can we expect an update from SECOM on each of the items listed, 1-7, in Comment #0?
Assignee | ||
Comment 3•7 years ago
|
||
We apologize for delay.
Let us update for items 1) to 7).
1)
We aware of the problem via the discussion in mozilla.dev.security.policy on August 16, and via this Bugzilla Bug on August 17.
2)
We will confirm to stop the further issuance of certificates with this problem.
3)
27300E0A50486C9E
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
373EFC2527849B71
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
4EB686367A460484
-----BEGIN CERTIFICATE-----
MIIFBTCCA+2gAwIBAgIITraGNnpGBIQwDQYJKoZIhvcNAQELBQAwbTELMAkGA1UE
BhMCSlAxEDAOBgNVBAcTB0FjYWRlbWUxKjAoBgNVBAoTIU5hdGlvbmFsIEluc3Rp
dHV0ZSBvZiBJbmZvcm1hdGljczEgMB4GA1UEAxMXTklJIE9wZW4gRG9tYWluIENB
IC0gRzQwHhcNMTcwMjE0MDUzMjMwWhcNMTkwMzE3MDUzMjMwWjCBlDELMAkGA1UE
BhMCSlAxEDAOBgNVBAcTB0FjYWRlbWUxQzBBBgNVBAoTOlVuaXZlcnNpdHkgb2Yg
T2NjdXBhdGlvbmFsIGFuZCBFbnZpcm9ubWVudGFsIEhlYWx0aCxKYXBhbi4xCjAI
BgNVBAsTAS0xIjAgBgNVBAMTGXMycHViYWRmLnB1Yi51b2VoLXUuYWMuanAwggEi
MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCcVIHpbCyQemPFbAz0hcPz5Ixw
QYOhV7a/Xe0O+ypq7LDWqECBRv5mh522ZiuTDCXcuTHtVI3gidKZA9ZExaCcmtbh
fQyGG/of/swhnFj69Djvmi6NGU8m34YT5KPWLs96sd25xdDXxzuAn6IwfsGEx8Tq
7Gk5k+jkU48/GA8350oL3w3z3SsGEEbLx6tZnxeCIOZ5Hp32HkjPkRNKA0/7cn1r
2RCDce1557bcDGzsebX+OaWnvcs3GAR946D+RX8hjj6gE2FIOMAEeePGx9Y40V30
G6NHrd6w6+5RIY1wmi8ABK2Fqki8Fhg32mOtgaOhajLPgLkfoiSZske/D0fTAgMB
AAGjggF/MIIBezAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwHwYDVR0j
BBgwFoAUGQtvOR8xAzRf5NJAHzfmjediOXwwSgYDVR0fBEMwQTA/oD2gO4Y5aHR0
cDovL3JlcG8xLnNlY29tdHJ1c3QubmV0L3NwcGNhL25paS9vZGNhMy9mdWxsY3Js
ZzQuY3JsMA4GA1UdDwEB/wQEAwIFoDAdBgNVHQ4EFgQUlr3OxS9eJkW1Ll3jgrAf
dPE/GxowWgYDVR0gBFMwUTBPBgwrBgEEAYH8CAMCAQEwPzA9BggrBgEFBQcCARYx
aHR0cHM6Ly9yZXBvMS5zZWNvbXRydXN0Lm5ldC9zcGNwcC9jcHMvaW5kZXguaHRt
bDA8BggrBgEFBQcBAQQwMC4wLAYIKwYBBQUHMAGGIGh0dHA6Ly9uaWlnNC5vY3Nw
LnNlY29tdHJ1c3QubmV0MCQGA1UdEQQdMBuCGXMycHViYWRmLnB1Yi51b2VoLXUu
YWMuanAwDQYJKoZIhvcNAQELBQADggEBAEhkpPcYpHFPk3wsW7Y7mzQUhMFCotRC
320qoYzsnvApUbRUJ2O2hGbWUcJdGOzuZqXHnDTrVfbDHSxLyex4gfAp8s4lSwJf
1Sz2JR3FSBIcYcOCX7pC5ngCYp487ggTZvm8N2y74B6Ef8fkmQb1kkWXjj4i3/1Q
qDRygT4kMf/EXPrgNpxqaCLQUY6kYYhbuTqnkCAyqFlrKx4BqZ8i43dI2f4mamok
69wSeIrVbVTOd+tVZCQze4bKEEUjFkZVNP1N6skP4UrT8ln6aM6WybSyQoN2Zpoa
JD8C5s2O/SU/E5UNcV7u3EV1IWzrkEol8mA822odCJiuc8/2SBe+5qE=
-----END CERTIFICATE-----
5FC1415746FF9634
-----BEGIN CERTIFICATE-----
MIIE2DCCA8CgAwIBAgIIX8FBV0b/ljQwDQYJKoZIhvcNAQELBQAwbTELMAkGA1UE
BhMCSlAxEDAOBgNVBAcTB0FjYWRlbWUxKjAoBgNVBAoTIU5hdGlvbmFsIEluc3Rp
dHV0ZSBvZiBJbmZvcm1hdGljczEgMB4GA1UEAxMXTklJIE9wZW4gRG9tYWluIENB
IC0gRzQwHhcNMTYwMzI4MDIyNzI1WhcNMTgwNDI4MDIyNzI1WjBvMQswCQYDVQQG
EwJKUDEQMA4GA1UEBxMHQWNhZGVtZTElMCMGA1UEChMcS3lvdG8gUHJlZmVjdHVy
YWwgVW5pdmVyc2l0eTEKMAgGA1UECxMBLjEbMBkGA1UEAxMSZndsaWIxMDEua3B1
LmFjLmpwMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuikyh0EOCUFM
5QLP1y7e4J5Tt5fEAbiO29gEekeFZCx72Pf2xEBU7HC9ToRTA55ETipI4gIfw1cC
dnhkAdE3xet8XvGhkM56KjtRlnYwEAMiYBRbVFjePuVxYWhjargAJOKAT62weiIJ
b3FWIw/jhsW/8UC0LfxlYFIPDOcQL8Cyt41+otht3Sl+oPCaOU4F0cKAqAcdMkx5
K0LdZuMRQHyCzaxmLwr9TAaMU08qOMhdaq34MLase IaQrWFF/WR8Sali3kGg6fFuG1A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-----END CERTIFICATE-----
614CF312272907F0
-----BEGIN CERTIFICATE-----
MIIE8zCCA9ugAwIBAgIIYUzzEicpB/AwDQYJKoZIhvcNAQELBQAwbTELMAkGA1UE
BhMCSlAxEDAOBgNVBAcTB0FjYWRlbWUxKjAoBgNVBAoTIU5hdGlvbmFsIEluc3Rp
dHV0ZSBvZiBJbmZvcm1hdGljczEgMB4GA1UEAxMXTklJIE9wZW4gRG9tYWluIENB
IC0gRzQwHhcNMTYwOTA3MTAyMjE3WhcNMTgxMDA4MTAyMjE3WjCBizELMAkGA1UE
BhMCSlAxEDAOBgNVBAcTB0FjYWRlbWUxQzBBBgNVBAoTOlVuaXZlcnNpdHkgb2Yg
T2NjdXBhdGlvbmFsIGFuZCBFbnZpcm9ubWVudGFsIEhlYWx0aCxKYXBhbi4xCjAI
BgNVBAsTAS0xGTAXBgNVBAMTEHd3dy51b2VoLXUuYWMuanAwggEiMA0GCSqGSIb3
DQEBAQUAA4IBDwAwggEKAoIBAQDWIRgbIf+0BP0kzNZu31ZrRVBpnq+KGeiI9q50
moOKrYBp7aMKu86Q+Uy2Sbk+1RLebhbQnaZ1TqLOAT3zo95mHAK3sxhHf/9LSPva
OvHPhVTX1nLz7HiRYe5BE37+hlvt1/raxJwi7Jbb0+eL0leL1/9OQdE5JTzWN0q0
utMnT6J5SZdtOM6EVhRcEIByNE4vTUoGxm0pPyg0uLmIV9Yh3b7/XovPrn3LKwj4
lp744hL0a9VIcRCtmuG5nPU25YgFFeR8XbQawx9deqpQPdEcPgyjj9wUfD1O0h6a
ydqZiE8t30eXxMmz/0CM71QwV9pw+JaL+YIzoo8lAzmpG3YrAgMBAAGjggF2MIIB
cjAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwHwYDVR0jBBgwFoAUGQtv
OR8xAzRf5NJAHzfmjediOXwwSgYDVR0fBEMwQTA/oD2gO4Y5aHR0cDovL3JlcG8x
LnNlY29tdHJ1c3QubmV0L3NwcGNhL25paS9vZGNhMy9mdWxsY3JsZzQuY3JsMA4G
A1UdDwEB/wQEAwIFoDAdBgNVHQ4EFgQUs1PcP34TpQ+kuBT0nDrhfgyY3oAwWgYD
VR0gBFMwUTBPBgwrBgEEAYH8CAMCAQEwPzA9BggrBgEFBQcCARYxaHR0cHM6Ly9y
ZXBvMS5zZWNvbXRydXN0Lm5ldC9zcGNwcC9jcHMvaW5kZXguaHRtbDA8BggrBgEF
BQcBAQQwMC4wLAYIKwYBBQUHMAGGIGh0dHA6Ly9uaWlnNC5vY3NwLnNlY29tdHJ1
c3QubmV0MBsGA1UdEQQUMBKCEHd3dy51b2VoLXUuYWMuanAwDQYJKoZIhvcNAQEL
BQADggEBADP4dQQe32TY/pTC3uheCQ4d4lj2zJuKZVPIHG1Znv5YIqjo7rAuV6ah
s6t+DL54DfKc1hjDw5Kgq2XNFsk8v/e2wQuHI4ucMxswhXECgtQqGwvAmW7S2aY7
QTg4SGyWaBcwB1D1JCIHaDfkJ5NYpojCAX8I4016cRnk41qtbecV5hMXLrRax7GZ
49PEFZoN4xLqW1b7y8xtXJaSdO1LLCnwH4HfQdPBEDqCWqnGeJpdTx9mw9Igx1sp
5XJK4gbVs8+SMD6PpSgR5q0esKh7itvjcyzl1PTurfXh/ogQuRQoFOHTqKr2qKlk
7seHW+siEU14MOUi4Ac2jlKvBShoQMA=
-----END CERTIFICATE-----
6CB2E1EBCBC9D1CD
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
764589145D04A048
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
7C5667B49DB30931
-----BEGIN CERTIFICATE-----
MIIEzjCCA7agAwIBAgIIfFZntJ2zCTEwDQYJKoZIhvcNAQELBQAwbTELMAkGA1UE
BhMCSlAxEDAOBgNVBAcTB0FjYWRlbWUxKjAoBgNVBAoTIU5hdGlvbmFsIEluc3Rp
dHV0ZSBvZiBJbmZvcm1hdGljczEgMB4GA1UEAxMXTklJIE9wZW4gRG9tYWluIENB
IC0gRzQwHhcNMTYwNTE5MDQxNzE5WhcNMTgwNjE5MDQxNzE5WjBqMQswCQYDVQQG
EwJKUDEQMA4GA1UEBxMHQWNhZGVtZTElMCMGA1UEChMcS3lvdG8gUHJlZmVjdHVy
YWwgVW5pdmVyc2l0eTEKMAgGA1UECxMBLjEWMBQGA1UEAxMNdnBuLmtwdS5hYy5q
cDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANlXlUnvkcT8omhZbVne
RKQcd1DQJ9OXgqNfjyjQLrAI4ue52359JrpGbR0V2A//8xLG0SifX7Xy5208nHYK
ms6CNhDrMDYmfcVGXYpJGQpkn7m8YABhcfA4QWLHz5XHkzF1kli86N6+RtOEMVGr
EhUJ9aBjd7ipmAyxYFIu6vI4LeGUK9LfzWmz8RknX9hDRVZPj7jR6gNlq/7vG2ZR
3xFJRHkOFsKEMOh6nW1Y0H0abl1gCHBoH41iEoHvwFH86iz7gW79MfiAarKyhXVg
VrRVtYEuhXVL2MNfttzODz9SwWmeWMOiqMj15R6xr48G3ANFNCGQTyPrdAVhxZyH
ErUCAwEAAaOCAXMwggFvMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAf
BgNVHSMEGDAWgBQZC285HzEDNF/k0kAfN+aN52I5fDBKBgNVHR8EQzBBMD+gPaA7
hjlodHRwOi8vcmVwbzEuc2Vjb210cnVzdC5uZXQvc3BwY2EvbmlpL29kY2EzL2Z1
bGxjcmxnNC5jcmwwDgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQWBBQJzgQYOD8sjSoc
23IrZGerhFkrnjBaBgNVHSAEUzBRME8GDCsGAQQBgfwIAwIBATA/MD0GCCsGAQUF
BwIBFjFodHRwczovL3JlcG8xLnNlY29tdHJ1c3QubmV0L3NwY3BwL2Nwcy9pbmRl
eC5odG1sMDwGCCsGAQUFBwEBBDAwLjAsBggrBgEFBQcwAYYgaHR0cDovL25paWc0
Lm9jc3Auc2Vjb210cnVzdC5uZXQwGAYDVR0RBBEwD4INdnBuLmtwdS5hYy5qcDAN
BgkqhkiG9w0BAQsFAAOCAQEAI4+9/vx3mFDelwEyUgObwc9mSsnW6D5C7mulP33l
XGHGFvEZ/wlrR4QTZOd+E9FQ1p2lKER5GI70UqmQkGu8n+R+0Z8IBv/kMGi7y/Z3
2lpAfTQxUCYdLOPvbUfQCNraGhsmeHt0+bPp7WbcloVjR5WtjXpzVBIKreQVAC1d
L4igNbhw6PY1r52Cns6jTwC+a9sk1i9hXSjoskcGzr8IvLCTIwnTiDgM2x4uCk5n
cQ4IjvKAdTQNP14BisQafDc8HDwtu60GxGFIQzLs7FGFu/h52ztSzqRaeLmxJS0i
cou2o16I5Xig0mtziMlFTvU/m+C2vu1fz8KyrFlvdkdJbg==
-----END CERTIFICATE-----
7C95E5344C0D83AF
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
4)
We have found nine certificates whose subject DN has an attribute with metadata as its value.
The last one was issued on 2017-02-22.
While one is already expired, eight certificates are still valid. The last one will expire on 2019-03-17.
All nine certificates have problem in OU. We have not found certificates with other attribute(s) with metadata as its/their value.
Six certificates have '-', three certificates have '.'. We have not found any certificates whose subject DN has attribute(s) with a single space character ' '.
5)
Although the strict procedures are stipulated as a total verification procedure, there are variations in the skill of RA members for checking details of CSR (recognition of usable characters), and then this mistake was made.
6)
1. Detailed description for the manual and awareness raising to prevent this problem.
2. Enhanced education and to be more sensitive for RA members.
This will be implemented thoroughly while presenting NG cases.
3. Technical measure for check to prevent this kind of problem.
(Rejecting issuance by system in case of nonstandard character string)
Regarding the timeline, we are planning to build the technical measure in January 2018.
We will implement countermeasures for the operations 1 and 2 to prevent recurrence until that time.
7)
We will update according to the progress of the situation.
Thank you for your consideration.
Comment 4•7 years ago
|
||
The fourth certificate was broken.
It should be the following (11th line had excess "ASE " in the middle):
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Comment 5•7 years ago
|
||
Thank you for your reply and status update.
(In reply to Hisashi Kamo from comment #3)
> 5)
> Although the strict procedures are stipulated as a total verification
> procedure, there are variations in the skill of RA members for checking
> details of CSR (recognition of usable characters), and then this mistake was
> made.
Can you please describe more about the process for how information is entered in to your system and how it is verified?
That is, it might be useful to use a certificate such as https://crt.sh/?id=198301534 as an example, analyzing how every piece of information was validated, how the request was received, etc. By analyzing this whole process (from request to issuance - and if request is reusing information, from the very first request), and sharing those details publicly, we can better understand the system, the existing checks, and how to mitigate in the future.
I highlight this, as your process (based on the answer below) seems to rely heavily on human factors to detect these issues. Understanding where and how these human factors play in to the validation of different pieces of information help the community understand whether, for example, a human factor can lead to an improperly issued domain. Understanding what elements of the certificate humans are responsible for entering or reviewing and what secondary controls exist (e.g. are there technical controls? Does it require a second review from another RA? Are there other procedural mitigations?) can help the community understand both the risk and the context of the proposed mitigations.
>
> 6)
> 1. Detailed description for the manual and awareness raising to prevent this
> problem.
> 2. Enhanced education and to be more sensitive for RA members.
> This will be implemented thoroughly while presenting NG cases.
Can you explain how operations 1 and 2 are different? That is, it seems like you'll be updating a manual and then informing your RA staff you've updated the manual?
> 3. Technical measure for check to prevent this kind of problem.
> (Rejecting issuance by system in case of nonstandard character string)
> Regarding the timeline, we are planning to build the technical measure in
> January 2018.
Could you explain and share further detail about why this will take until January 2018? That is, is it a question of prioritization? If so, what are the competing priorities. Is it a question of development schedules? If so, what happens if there's a misissuance that poses greater security risk - how quickly can those mitigations be deployed?
Understanding why it would take 4 months is useful to understand how well, organizationally, the CA is prepared to respond to issues.
> We will implement countermeasures for the operations 1 and 2 to prevent
> recurrence until that time.
>
> 7)
> We will update according to the progress of the situation.
When do you expect Operations 1 and 2 to be completed?
Flags: needinfo?(h-kamo)
Assignee | ||
Comment 6•7 years ago
|
||
Dear Ryan-san,
We decided to deal with the system instead of covering with operations.
We are going to measure technically to prevent issuing more certificates.
The completion goal of this treatment is in September.
The meeting with the customer will be held next week.
Flags: needinfo?(h-kamo)
Comment 7•7 years ago
|
||
Attempting to summarize all the information to date:
1) Certificates with meta-data only subject fields
- See Comment #0, Comment #3, Comment #6
- Remediations:
- 2017-08-25 - Updated training materials specific to this problem (See Comment #3)
- 2017-09-XX - Automated technical controls (See Comment #6; Originally scheduled for 2018-01 per Comment #3)
Is that a correct summary? That is, are you moving forward your original estimate of 2018-01 to 2017-09?
I'm uncertain what Comment #6 means with respect to meeting with the customer. https://crt.sh/?id=6274915 indicates it's operated by SECOM (e.g. it's not an externally operated sub-CA). What customer is this?
I note a number of questions in Comment #5 are not addressed in Comment #6, but I believe they still are relevant, despite Comment #6.
Flags: needinfo?(h-kamo)
Assignee | ||
Comment 8•7 years ago
|
||
Dear Ryan-san,
Let us answers as below.
> Is that a correct summary? That is, are you moving forward your original estimate of 2018-01 to 2017-09?
Yes, that is correct.
We decided to implement it technically than to rely on human operation and target to release is in September.
> operated by SECOM (e.g. it's not an externally operated sub-CA). What customer is this?
Customer is NII.
NII(National Institute of Informatics) is an academic information agency that manages the whole universities in Japan.
SSL/ TLS certificates are issued limited to academic organizations registered in the administrative list of the Ministry of Education, Culture, Sports, Science and Technology.
(1) The namespaces to be issued are limited (issued only to academic organizations recognized by the Ministry of Education, Culture, Sports, Science and Technology)
(2) Certificates are issued only to organizations corresponding to domains of issued certificates.
NII is carrying out as part of RA of internally operated sub-CA.
There is a contractual relationship with us, and then it was described as customer. Sorry for the confused expression.
> Can you please describe more about the process for how information is entered in to your system and how it is verified?
RA is implemented with operational and technical framework, and CSR check is carried out by human operation.
Human operation/ technical verification and process are as follows.
Subscribers submit application by using Web application system implementing client authentication.
In addition to verify the existence of the academic organization, the domain information, the identity of the subscriber, and CSR check is conducted.
Regarding human operation, registration staff conducts CSR check.
In technically, it is verified for the existence of the academic organization, the domain information, and the the identity of the subscriber, but we decided now to comply with the system because the CSR check error depends on the human was occurred.
Initially, with a view to further improving the quality of the system, we planned to implement it in January 2018 after placing sufficient time for planning and testing.
However, we decided that it is urgent and important to systemize the CSR check without human intervention, and we have a plan to deal with it during September.
> Can you explain how operations 1 and 2 are different? That is, it seems like you'll be updating a manual and then informing your RA staff you've updated the manual?
As you mentioned, there is no difference between 1 and 2.
> Could you explain and share further detail about why this will take until January 2018?
Same as above.
Initially, with a view to further improving the quality of the system, we planned to implement it in January 2018 after placing sufficient time for planning and testing.
However, we decided that it is urgent and important to systemize the CSR check without human intervention, and we have a plan to deal with it during September.
> When do you expect Operations 1 and 2 to be completed?
It was already thoroughly announced to the RA members as contents of this error as a reminder.
Flags: needinfo?(h-kamo)
Assignee | ||
Comment 9•7 years ago
|
||
Let us update as follows.
> However, we decided that it is urgent and important to systemize the CSR check without human intervention, and we have a plan to deal with it during September.
Although we are dedicated to systematization, let us change the release date to the week of September 23.
Best regards,
Hisashi Kamo
Assignee | ||
Comment 10•7 years ago
|
||
I apologize for wrong information at the previous comment9.
> Although we are dedicated to systematization, let us change the release date to the week of September 23.
It was intended for the week of October 23, not the week of September 23.
Now, let us inform you that our target release date will be October 24.
Best regards,
Hisashi Kamo
Assignee | ||
Comment 11•7 years ago
|
||
Let us inform you that the treatment was released today, October 24.
Best regards,
Hisashi Kamo
Comment 12•7 years ago
|
||
It appears that all actions have been completed, so I am marking this issue resolved.
Status: NEW → RESOLVED
Closed: 7 years ago
Resolution: --- → FIXED
Updated•2 years ago
|
Product: NSS → CA Program
Updated•2 years ago
|
Whiteboard: [ca-compliance] → [ca-compliance] [ov-misissuance]
You need to log in
before you can comment on or make changes to this bug.
Description
•