Open Bug 1449941 Opened 5 years ago Updated 22 days ago

Add Fina Root CA certificate


(CA Program :: CA Certificate Root Program, task, P4)



(Not tracked)



(Reporter: pma, Assigned: bwilson)


(Whiteboard: [ca-verifying])


(3 files)

40.39 KB, application/vnd.openxmlformats-officedocument.wordprocessingml.document
157.36 KB, application/pdf
47.67 KB, application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
      No description provided.
Acknowledging receipt of this root inclusion request. I have a huge backlog of CA updates/requests to review, so this has been added to my list. I will update this bug when I begin information verification of this request as per step #2 of our process:

In the meantime, please attach your completed BR Self Assessment to this bug.
Ever confirmed: true
Whiteboard: [ca-verifying] - Need BR Self Assessment
Attached is the information that has been verified for this request. Within the document search for "NEED" to find where further information is needed from the CA.

In particular:

1) The Audit Statements do not properly specify the audit period start and end dates, and the SHA-256 fingerprints of each root and intermediate certificate that was in scope.

Audit period is NOT the same as the dates that the audit was performed.
Sections 3.1.3 and 3.1.4 of
Audit Period: In a period-of-time audit, the period between the first day (start) and the last day of operations (end) covered by the auditors in their engagement. (This is not the same as the period of time when the auditors are on-site at the CA.) The coverage rules and maximum length of audit periods are defined in section 8.1.

2) If requesting the Email (S/MIME) trust bit, then the CP and/or CPS must explain how the CA confirms that the certificate requester owns/controls the email address to be included in the certificate.
Furthermore, In the Qualified and Non-Qualified CP/CPS documents, section 3.2.4 says that e-mail address is not verified. 

3) Need the URLs to the 3 test websites as per section 2.2 of the CA/Browser Forum's Baseline Requirements: "At a minimum, the CA SHALL host separate Web pages using Subscriber Certificates that are (i)valid, (ii) revoked, and (iii) expired."

4) Provide Test Results for
-- Revocation testing:
-- BR Lint Test:
-- X.509 Lint Test:

5) Attach your CA's BR Self Assessment to this bug
Whiteboard: [ca-verifying] - Need BR Self Assessment → [ca-verifying] - KW Comment #2 2018-08-17

The documentation supporting your application for root inclusion appears to be out of date and needs to be updated. The most current CP/CPS that we have is version 2.4, published June 10, 2019, and the most recent audit is dated June 24, 2019.

Flags: needinfo?(pma)
QA Contact: kwilson
Assignee: kwilson → bwilson
Whiteboard: [ca-verifying] - KW Comment #2 2018-08-17 → [ca-verifying] - BW Comment #3 2020-08-27

Also, CA needs to provision three test websites equipped with certificates - one valid, one expired, and one revoked.
If requesting enablement of the email trust bit, then CPS needs to describe how CA will verify the email address with a challenge-response mechanism.

The CA has provided the three test websites (verified) and their current CP/CPS (needs review). The ETSI accreditations on Fina's website have a date of 27/06/2019 (outdated) and do not include the SHA2 hash of the CA certificates and are not hosted on the Bureau Veritas website, as required. The CA will need to remediate this issue before we can proceed with our review.

Whiteboard: [ca-verifying] - BW Comment #3 2020-08-27 → [ca-verifying] - BW Comment #5 2020-08-31

Sent email to CA re: still waiting for updated attestation letter accessible from Bureau Veritas website.

Priority: -- → P4

In correspondence with Bureau Veritas regarding ALV processing, there was an issue with the audit dates in a table format that could not be processed by the ALV, so they are fixing the format of the attestation letter.

Do you have an estimate for when you'll be posting an updated CP and CPS to your repository?
Are the last CP and CPS from 25 September 2020 (version 1.6)?
While updating your CP and CPS, please complete and submit the Compliance Self-Assessment - see and the template, here:

Whiteboard: [ca-verifying] - BW Comment #5 2020-08-31 → [ca-verifying] - BW Comment #8 2021-09-22

(In reply to Ben Wilson from comment #8)

Do you have an estimate for when you'll be posting an updated CP and CPS to your repository?
Are the last CP and CPS from 25 September 2020 (version 1.6)?
While updating your CP and CPS, please complete and submit the Compliance Self-Assessment - see and the template, here:

On September 24, 2021 in in our repository we have published new versions of CP and CPS documents for OVCP certificates (Certificates for Website Authentication), version 1.7, effective date 25 September 2021 . Before that the last version of the documents was 1.6 from 25 September 2020.

We plan to conduct the compliance self-assessment during this week and send you the completed form in early October.

Still awaiting the Compliance Self-Assessment document.

Redirect a needinfo that is pending on an inactive user to the triage owner.
:kwilson, since the bug has recent activity, could you have a look please?

For more information, please visit auto_nag documentation.

Flags: needinfo?(pma) → needinfo?(kwilson)

We are working on Compliance Self-Assessment document that includes BR v. 1.8.3 and Mozilla Root Store Policy v. 2.8 and we are close to its completion. We plan to send Completed Compliance Self-Assessment form within one day.
In the past, we have been very busy on other projects so that's the reason for this delay.

Flags: needinfo?(kwilson)

This Excel file contains Fina's compliance self-assessment and my review of the Fina CPS, version 1.7.

Whiteboard: [ca-verifying] - BW Comment #8 2021-09-22 → [ca-ready-for-discussion 2022-07-08]

Additionally, Fina needs test websites with certificates that reference smaller CRLs. The current one is > 6MB and takes too long to download.

Whiteboard: [ca-ready-for-discussion 2022-07-08] → [ca-verifying] BW 2022-07-08

To proceed, I need:
1 - CPS that describes the email verification process for the issuance of SMIME certificates
2 - Changes to the Fina OCSP responder so that it doesn't send unnecessary CA certificates as part of the OCSP response ( gives error "Valid signature but response includes an unnecessary certificate chain"
3 - Resolution of issues identified by
4 - Updates to CPS based on review of compliance self assessment (Comment 13)
5 - Value justification (Comment 14)

Whiteboard: [ca-verifying] BW 2022-07-08 → [ca-cps-review] BW 2022-07-13
Summary: Add "Fina Root CA" root certificate → Add Fina Root CA certificate
Severity: normal → S3
Product: NSS → CA Program

Applicant also needs to update its root information with an "Add/Update Root Request" in the CCADB (including information about root CA key generation).

Whiteboard: [ca-cps-review] BW 2022-07-13 → [ca-verifying]
You need to log in before you can comment on or make changes to this bug.