Add 2 Microsoft Roots to Mozilla's Root Store
Categories
(CA Program :: CA Certificate Root Program, task)
Tracking
(Not tracked)
People
(Reporter: bryand, Assigned: kathleen.a.wilson)
References
Details
(Whiteboard: [ca-approved] - 2 roots In NSS 3.54, FF 79)
Attachments
(16 files, 5 obsolete files)
525.13 KB,
application/vnd.openxmlformats-officedocument.wordprocessingml.document
|
Details | |
129.77 KB,
application/pdf
|
Details | |
46.93 KB,
application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
|
Details | |
596.51 KB,
application/pdf
|
Details | |
624.53 KB,
application/pdf
|
Details | |
344.94 KB,
application/pdf
|
Details | |
342.20 KB,
application/pdf
|
Details | |
605.34 KB,
application/pdf
|
Details | |
215.41 KB,
application/pdf
|
Details | |
207.36 KB,
application/pdf
|
Details | |
258.66 KB,
application/pdf
|
Details | |
273.56 KB,
application/pdf
|
Details | |
247.99 KB,
application/pdf
|
Details | |
262.80 KB,
application/pdf
|
Details | |
226.45 KB,
application/pdf
|
Details | |
249.71 KB,
application/pdf
|
Details |
Assignee | ||
Comment 2•7 years ago
|
||
Assignee | ||
Comment 3•7 years ago
|
||
Assignee | ||
Comment 5•7 years ago
|
||
Assignee | ||
Comment 6•7 years ago
|
||
Assignee | ||
Comment 7•7 years ago
|
||
Assignee | ||
Comment 8•7 years ago
|
||
Reporter | ||
Comment 10•7 years ago
|
||
Assignee | ||
Updated•7 years ago
|
Assignee | ||
Updated•7 years ago
|
Assignee | ||
Comment 11•7 years ago
|
||
Reporter | ||
Comment 12•7 years ago
|
||
Reporter | ||
Comment 13•7 years ago
|
||
Reporter | ||
Comment 14•7 years ago
|
||
Reporter | ||
Comment 15•7 years ago
|
||
Reporter | ||
Comment 16•7 years ago
|
||
Assignee | ||
Comment 17•7 years ago
|
||
Assignee | ||
Comment 18•7 years ago
|
||
Assignee | ||
Comment 19•7 years ago
|
||
Assignee | ||
Comment 20•7 years ago
|
||
Reporter | ||
Comment 21•7 years ago
|
||
Reporter | ||
Comment 22•7 years ago
|
||
Reporter | ||
Comment 23•7 years ago
|
||
Reporter | ||
Comment 24•7 years ago
|
||
Assignee | ||
Comment 25•7 years ago
|
||
Assignee | ||
Updated•7 years ago
|
Comment 26•7 years ago
|
||
Reporter | ||
Comment 27•7 years ago
|
||
Reporter | ||
Comment 28•7 years ago
|
||
Reporter | ||
Comment 29•7 years ago
|
||
Assignee | ||
Comment 30•7 years ago
|
||
Comment 31•7 years ago
|
||
Assignee | ||
Comment 32•7 years ago
|
||
Assignee | ||
Comment 33•7 years ago
|
||
Assignee | ||
Updated•7 years ago
|
Comment 34•7 years ago
|
||
Assignee | ||
Comment 35•7 years ago
|
||
Comment 36•7 years ago
|
||
Comment 37•7 years ago
|
||
Comment 38•7 years ago
|
||
Comment 39•7 years ago
|
||
Assignee | ||
Comment 40•7 years ago
|
||
Comment 41•7 years ago
|
||
Assignee | ||
Comment 42•7 years ago
|
||
Comment 43•7 years ago
|
||
We have addressed the error(s) and believe we are now compliant. Please let us know if you find any other issues or have any questions.
Assignee | ||
Comment 44•7 years ago
|
||
The information for this root inclusion request is available at the following URL.
https://ccadb-public.secure.force.com/mozilla/PrintViewForCase?CaseNumber=00000275
This root inclusion request is ready for the Detailed CP/CPS Review phase, step 3 of
https://wiki.mozilla.org/CA/Application_Process#Process_Overview
so assigning this bug to Wayne.
Comment 45•6 years ago
|
||
Attaching our most recent Auditor Opinion Letters
Comment 46•6 years ago
|
||
Attaching most recent Auditor Opinion Letters.
Comment 47•6 years ago
|
||
Attaching most recent Auditor Opinion Letters.
Comment 48•6 years ago
|
||
I added the most recent opinion letters from our auditors to this bug. I'll make another post once repository site is updated with new WebTrust seals.
Comment 49•6 years ago
|
||
The seals with links to WebTrust management and auditor letters are live on our repository site. https://www.microsoft.com/pkiops/docs/repository.htm
Assignee | ||
Updated•6 years ago
|
Assignee | ||
Updated•6 years ago
|
Assignee | ||
Updated•6 years ago
|
Assignee | ||
Updated•6 years ago
|
Assignee | ||
Comment 50•6 years ago
|
||
I entered the new audits into the root inclusion case:
https://ccadb-public.secure.force.com/mozilla/PrintViewForCase?CaseNumber=00000275
Then ran Audit Letter Validation (ALV), which failed to find this SHA256 Thumbprint in the audit statement:
Root Case No. R00000633
Microsoft ECC Root Certificate Authority 2017
FEA1884AB3AEA6D0DBEDBE4B9CD9FEC8655116300A86A856488FC488BB4B44D2
I have verified that this thumbprint is not in the audit statements.
The table of in-scope CAs that is duplicated in both the Management's Assertions and the audit statements has two problems:
- incorrect SHA256 Thumbprint for Microsoft ECC Root Certificate Authority 2017
- incorrect SHA256 Thumbprint for Microsoft EV RSA Root Certificate Authority 2017
Also, did the EV audit really include the two non-EV roots? (as specified in the table in the EV Management's Assertion and audit statement)
Comment 51•6 years ago
|
||
I just discussed with auditors and we are working on uploading the correct appendices. Thanks for catching this issue. Regarding the audit scope, yes, we had all four roots audited to the same certification levels (WTCA, WTBR and WTEV). I'll post an update when the statements on WebTrust site are fixed.
Comment 52•6 years ago
|
||
This issue has been fixed. The correct statements are available on the WebTrust site.
Assignee | ||
Comment 53•6 years ago
|
||
(In reply to Jcooper from comment #52)
This issue has been fixed. The correct statements are available on the WebTrust site.
ALV passes now. Thanks.
I think I must be missing one of your WebTrust CA audit statements...
Prior WebTrust CA audit:
https://bugzilla.mozilla.org/attachment.cgi?id=9009197
Standard Audit Period Start Date: 5/1/2017
Standard Audit Period End Date: 4/30/2018
Current WebTrust CA audit:
https://www.cpacanada.ca/generichandlers/aptifyattachmenthandler.ashx?attachmentid=230016
Standard Audit Period Start Date: 11/1/2018
Standard Audit Period End Date: 12/31/2018
So there appears to be gap of auditing between 4/30/2018 and 11/1/2018.
Please advise.
Comment 54•6 years ago
|
||
Thanks, glad we got that resolved.
Our annual audit period is 5/1 to 4/30, so we are in process of closing out the audit for 5/1/2018 to 4/30/2019. That audit includes the period you note. We did an additional/concurrent Period of Time audit from 11/1/2018 to 12/31/2018 on top of the annual audit period. That is the audit that resulted in the current seals on our repository and corresponding statements on the WebTrust site.
Does that make sense?
Assignee | ||
Comment 55•6 years ago
|
||
(In reply to Jcooper from comment #54)
Thanks, glad we got that resolved.
Our annual audit period is 5/1 to 4/30, so we are in process of closing out the audit for 5/1/2018 to 4/30/2019. That audit includes the period you note. We did an additional/concurrent Period of Time audit from 11/1/2018 to 12/31/2018 on top of the annual audit period. That is the audit that resulted in the current seals on our repository and corresponding statements on the WebTrust site.
Does that make sense?
Yes. Thank you for the clarification.
Comment 56•6 years ago
|
||
I have completed a preliminary review of the information gathered and have the following comments:
- This application states that normal audit period ends on 4/30. When can you provide the audit statements for full period up to 5/1/2019?
- CPS section 3.2.4 states that OU is not verified, however, BR section 7.1.4.2.2(i) does place requirements on this field, and the CPS makes it unclear if these requirements are met.
- CPS section 3.2.5 states that Microsoft PKI Services shall verify authority for all certificate requests, and that for Domain Validated requests, this is done using one of the methods described in the BRs. Section 3.2.5 of the BRs only describes validation of authority for OV certificates using a reliable method of communication. Please confirm that Microsoft implements the method described in BR section 3.2.5 for OV certificates.
- CPS section 6.1.5 indicates that P-512 keys may be used. Please confirm that Microsoft aware that this violates section 5.1 of the Mozilla Root Store policy.
- It’s been more than a year since the CP has been updated. CPS and BR section 2 require annual updates.
- CP/CPS section 1.5.2 does not meet the BR 4.9.3 requirement to provide clear problem reporting instructions.
Would Microsoft like to make any CP/CPS updates before I begin the discussion period? I recommend resolving at least the last two comments.
Comment 57•6 years ago
|
||
Thanks for completing your preliminary review. We are in the process making changes to all CP/CPS documents with our PKI Policy Authority and should have then done in the next week or so. We should also have the audit statements available for your review in the same time frame. I'll report back shortly with updates as I have them. I agree that it makes sense to resolve these open items prior to discussion.
Updated•6 years ago
|
Comment 58•6 years ago
|
||
We have published updated CP/CPS documents that should address Wayne's observations as noted above. Please let us know if you have any questions. You can view the updated documents and the renewed WebTrust seals with links to current audit statements on our repository site
https://www.microsoft.com/pkiops/docs/repository.htm
I'll upload the audit statements to this thread as well. When are you planning to begin the discussion period?
Comment 59•6 years ago
|
||
Comment 60•6 years ago
|
||
Comment 61•6 years ago
|
||
Comment 62•6 years ago
|
||
Discussion period has begun: https://groups.google.com/d/msg/mozilla.dev.security.policy/Q2k_5eGXqmA/Tp373WeNAQAJ
Comment 63•6 years ago
|
||
Hi Wayne,
Do you have any questions or concerns now that the discussion period has closed? Please advise on next steps.
Comment 64•6 years ago
|
||
The discussion period for this request has ended. I believe that all questions have been answered, so I am recommending approval of this request.
Link to the discussion: https://groups.google.com/d/msg/mozilla.dev.security.policy/Q2k_5eGXqmA/Tp373WeNAQAJ
Assignee | ||
Comment 65•6 years ago
|
||
As per Comment #64, and on behalf of Mozilla I approve this request from Microsoft Corporation to include the following root certificates:
** 'Microsoft RSA Root Certificate Authority 2017' (Websites)
** 'Microsoft ECC Root Certificate Authority 2017' (Websites)
** 'Microsoft EV RSA Root Certificate Authority 2017' (Websites), enable EV
** 'Microsoft EV ECC Root Certificate Authority 2017' (Websites), enable EV
I will file the NSS and PSM bugs for the approved changes.
Assignee | ||
Comment 66•6 years ago
|
||
I have filed bug #1582254 against NSS and bug #1582258 against PSM for the actual changes.
Comment 67•6 years ago
|
||
Kathleen: I was doing some spot checks on Mozilla policy compliance, specifically Section 5.3 of https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/
The requirement is (formatted for readability)
Intermediate certificates created after January 1, 2019, with the exception of cross-certificates that share a private key with a corresponding root certificate:
- MUST contain an EKU extension; and,
- MUST NOT include the anyExtendedKeyUsage KeyPurposeId; and,
- MUST NOT include both the id-kp-serverAuth and id-kp-emailProtection KeyPurposeIds in the same certificate.
The certificate https://crt.sh/?q=623a0d3c6e325795aadaa36599301afd90392f46519f5b238fbe22936bbd5ccc was issued by the "Microsoft EV RSA Root Certificate Authority 2017" (mentioned in Comment #65), created on 2019-05-14, and lacks an EKU. I wasn't sure whether to open a CA incident for this, considering that Bug #1582254 is not yet resolved, and the CA was not part of the Mozilla program at the time. Thoughts?
Assignee | ||
Comment 68•6 years ago
|
||
(In reply to Ryan Sleevi from comment #67)
The certificate https://crt.sh/?q=623a0d3c6e325795aadaa36599301afd90392f46519f5b238fbe22936bbd5ccc was issued by the "Microsoft EV RSA Root Certificate Authority 2017" (mentioned in Comment #65), created on 2019-05-14, and lacks an EKU. I wasn't sure whether to open a CA incident for this, considering that Bug #1582254 is not yet resolved, and the CA was not part of the Mozilla program at the time. Thoughts?
Ryan, Please proceed with creating the CA Incident bug. Thanks!
Comment 69•5 years ago
|
||
The four roots to be added to the Mozilla trusted root program are as follows:
http://www.microsoft.com/pkiops/certs/Microsoft ECC Root Certificate Authority 2017.crt
http://www.microsoft.com/pkiops/certs/Microsoft RSA Root Certificate Authority 2017.crt
http://www.microsoft.com/pkiops/certs/Microsoft EV ECC Root Certificate Authority 2017.crt
http://www.microsoft.com/pkiops/certs/Microsoft EV RSA Root Certificate Authority 2017.crt
Assignee | ||
Comment 70•5 years ago
|
||
(In reply to Julio Montano from comment #69)
The four roots to be added to the Mozilla trusted root program are as follows:
http://www.microsoft.com/pkiops/certs/Microsoft ECC Root Certificate Authority 2017.crt
http://www.microsoft.com/pkiops/certs/Microsoft RSA Root Certificate Authority 2017.crt
http://www.microsoft.com/pkiops/certs/Microsoft EV ECC Root Certificate Authority 2017.crt
http://www.microsoft.com/pkiops/certs/Microsoft EV RSA Root Certificate Authority 2017.crt
Julio, Please provide audit statements and test websites (valid, revoked, expired) for all of the new root certs.
Assignee | ||
Comment 71•5 years ago
|
||
(In reply to Kathleen Wilson from comment #70)
Julio, Please provide audit statements and test websites (valid, revoked, expired) for all of the new root certs.
Please also update section 1.1 of the CPS to include the new roots and issuing CAs.
Comment 72•5 years ago
|
||
Microsoft is ready to include 2 new roots at this time, as the 2 EV roots we were hoping to include have been impacted by Covid-19 prioritizations.
The 2 roots we would like included now are:
http://www.microsoft.com/pkiops/certs/Microsoft ECC Root Certificate Authority 2017.crt
http://www.microsoft.com/pkiops/certs/Microsoft RSA Root Certificate Authority 2017.crt
Here is the information for each Root.
• Microsoft ECC Root Certificate Authority 2017
o Test Websites
Valid - http://acteccroot2017.pki.microsoft.com/
Revoked - http://rvkeccroot2017.pki.microsoft.com/
Expired - http://expeccroot2017.pki.microsoft.com/
o Audit Statements
WTCA
• https://www.microsoft.com/pkiops/docs/Content/seals/Microsoft%20WTCA%20Indp%20Acct%20Opinion%20and%20Mgmt%20Assertion%20Dec%202019%20-%20Final%20-%20SECURED.pdf
WTEV
• https://www.microsoft.com/pkiops/docs/Content/seals/Microsoft%20WTEV%20SSL%20Indp%20Acct%20Opinion%20and%20Mgmt%20Assertion%20Dec%202019%20-%20Final%20-%20SECURED.pdf
WTBR
• https://www.microsoft.com/pkiops/docs/Content/seals/Microsoft%20WTBR%20Indp%20Acct%20Opinion%20and%20Mgmt%20Assertion%20Dec%202019%20-%20Final%20-%20SECURED.pdf
o CPS with Roots and Issuing CA’s
https://www.microsoft.com/pkiops/Docs/Content/policy/Microsoft_PKI_Services_CPS_v3.1.4.pdf
• Microsoft RSA Root Certificate Authority 2017
o Test Websites
Valid - http://actrsaroot2017.pki.microsoft.com/
Revoked - http://rvkrsaroot2017.pki.microsoft.com/
Expired - http://exprsaroot2017.pki.microsoft.com/
o Audit Statements
WTCA
• https://www.microsoft.com/pkiops/docs/Content/seals/Microsoft%20WTCA%20Indp%20Acct%20Opinion%20and%20Mgmt%20Assertion%20Dec%202019%20-%20Final%20-%20SECURED.pdf
WTEV
• https://www.microsoft.com/pkiops/docs/Content/seals/Microsoft%20WTEV%20SSL%20Indp%20Acct%20Opinion%20and%20Mgmt%20Assertion%20Dec%202019%20-%20Final%20-%20SECURED.pdf
WTBR
• https://www.microsoft.com/pkiops/docs/Content/seals/Microsoft%20WTBR%20Indp%20Acct%20Opinion%20and%20Mgmt%20Assertion%20Dec%202019%20-%20Final%20-%20SECURED.pdf
o CPS with Roots and Issuing CA’s
https://www.microsoft.com/pkiops/Docs/Content/policy/Microsoft_PKI_Services_CPS_v3.1.4.pdf
Please Note:
• All Microsoft PKI Services Governance, Audit and CA information can be found in our PKI Repository located here (https://www.microsoft.com/pkiops/docs/repository.htm).
• In December of 2019 our WTBR audit included a Modified Opinion related to an audit log issue that was disclosed in Bugzilla Bug 1602999 (https://bugzilla.mozilla.org/show_bug.cgi?id=1602999). The bug is now resolved, and the issue is fixed. We just concluded another WTBR audit period with our auditors (1/1/20 – 4/30/20) that is on track , as of this writing, for a clean opinion and that audit letter will be available in late June.
Assignee | ||
Comment 73•5 years ago
|
||
(In reply to John Mason from comment #72)
Microsoft is ready to include 2 new roots at this time, as the 2 EV roots we were hoping to include have been impacted by Covid-19 prioritizations.
The 2 roots we would like included now are:
http://www.microsoft.com/pkiops/certs/Microsoft ECC Root Certificate Authority 2017.crt
http://www.microsoft.com/pkiops/certs/Microsoft RSA Root Certificate Authority 2017.crt
I have filed bug #1641716 against NSS to include the 2 non-EV root certificates.
I have also updated the root inclusion case:
https://ccadb-public.secure.force.com/mozilla/PrintViewForCase?CaseNumber=00000275
Assignee | ||
Updated•5 years ago
|
Assignee | ||
Updated•3 years ago
|
Assignee | ||
Comment 74•3 years ago
|
||
Since this request has not been updated in 2 years, I'm going to do the following:
-
Change the title and Whiteboard to represent that only the 2 non-EV root certificates were added.
-
Close this request as resolved/fixed.
Microsoft may open a new request to include their EV root certificates if they are inclined to do so.
Updated•3 years ago
|
Description
•