Add Hongkong Post renewal root certificate "Hongkong Post Root CA 3"
Categories
(CA Program :: CA Certificate Root Program, task)
Tracking
(Not tracked)
People
(Reporter: manho, Assigned: kathleen.a.wilson)
References
Details
(Whiteboard: [ca-approved] - in NSS 3.43, FF 67; EV-enabled in FF 68)
Attachments
(6 files, 5 obsolete files)
| Assignee | ||
Comment 6•7 years ago
|
||
| Assignee | ||
Comment 7•7 years ago
|
||
| Assignee | ||
Comment 9•7 years ago
|
||
| Assignee | ||
Comment 10•7 years ago
|
||
| Assignee | ||
Comment 11•7 years ago
|
||
Comment 12•7 years ago
|
||
| Reporter | ||
Comment 13•7 years ago
|
||
| Reporter | ||
Comment 14•7 years ago
|
||
| Reporter | ||
Comment 15•7 years ago
|
||
Comment 16•7 years ago
|
||
| Reporter | ||
Comment 17•7 years ago
|
||
| Reporter | ||
Comment 18•7 years ago
|
||
Comment 19•7 years ago
|
||
Comment 20•7 years ago
|
||
| Reporter | ||
Comment 21•7 years ago
|
||
| Reporter | ||
Comment 22•7 years ago
|
||
| Reporter | ||
Comment 23•6 years ago
|
||
A pre-production CPS for e-Cert (Server) of Hongkong Post CA is available at URL https://www.ecert.gov.hk/ev/e-Cert%20(Server)%20CPS-Eng-1.7.4.pdf. It is attached in this bug for easy reference.
| Reporter | ||
Comment 24•6 years ago
|
||
A disclosure record of WebTrust for Extended Validation SSL CA Operations for HKPCA is available at URL https://www.ecert.gov.hk/ev/Webtrust%20EV%20SSL%20Report%2020181219_FINAL%20(with%20Management%20Assertion%20Letter).pdf. It is also attached in this bug for easy reference.
| Reporter | ||
Comment 25•6 years ago
|
||
Hi Wayne, I'm sorry to say that we are under immense time pressure to issue our e-Cert (Server) by the renewed root certificate. FYI, we have already announced a root CA rollover plan at Hongkong Post CA website https://www.ecert.gov.hk/news/press/85.html. It's very important to proceed on this bug as soon as possible, so that if there is any other comments, we still have time to respond to them. Thanks you very much.
Comment 26•6 years ago
|
||
Why did the OID change to 1.3.6.1.4.1.16030.1.7.4 in the most recent draft? Will this EV CPS replace the current e-Cert Server CPS when it is published?
Also, please be aware that I will be pointing out the BR issues that remain in the current published e-Cert Server CPS (version 3) - missing revocation reasons in section 4.9.1.1, and support for certificate suspension.
| Reporter | ||
Comment 27•6 years ago
|
||
The last arc number of the OID indicates the version of CPS. The current CPS (version 3) jumped in because we have to update the period of our outsourcing contract with Hongkong Post, see section 1.2 of the CPS. In other words, this EV CPS will be the version 4 of our CPS, replacing the current CPS (version 3). And this EV CPS will contain major changes for disclosure of revocation reasons as required by BRs section 4.9.1.1, skipping out the procedural step of suspension when handling revocation request and any other comments...etc from Mozilla community. Our deadline for production of this EV CPS is 1 July 2019.
Since we have already made these changes to this EV CPS, I believe that it'll be more productive for the community to discuss this EV CPS rather than the current (but yet-to-be replaced) CPS. Anyway, while you point out the BR issues that remain in the current CPS (version 3), may I emphasize that we currently can handle all the revocation reasons as required by the BRs Section 4.9.1.1, and we do not "un-suspend" certificate as the suspension is only a procedural step prior to revocation of certificate.
| Reporter | ||
Comment 28•6 years ago
|
||
this EV CPS will contain major changes for disclosure of revocation reasons as required by BRs section 4.9.1.1, skipping out the procedural step of suspension
My typo error, "skipping out" ---> "skipping over"
Comment 29•6 years ago
|
||
Began the discussion at https://groups.google.com/d/msg/mozilla.dev.security.policy/xdiyOa5ruao/6caGQ98TDgAJ with the following post:
This request is for inclusion of the Government of Hong Kong, Hongkong
Post, Certizen Hongkong Post Root CA 3 trust anchor as documented in the
following bug: https://bugzilla.mozilla.org/show_bug.cgi?id=1464306
-
BR Self Assessment is here:
https://bug1464306.bmoattachments.org/attachment.cgi?id=8980480 -
Summary of Information Gathered and Verified:
https://bug1464306.bmoattachments.org/attachment.cgi?id=9004396 -
Root Certificate Download URL:
https://bugzilla.mozilla.org/attachment.cgi?id=8980482 -
CP/CPS:
CP: there is no CP
CPS: https://www.ecert.gov.hk/ev/e-Cert%20(Server)%20CPS-Eng-1.7.4.pdf -
This request is to include the root with the websites trust bit enabled
and EV treatment. -
EV Policy OID: 2.23.140.1.1
-
Test Websites
https://valid-ev.ecert.gov.hk/
https://expired-ev.hongkongpost.gov.hk
https://revoked-ev.hongkongpost.gov.hk -
CRL URLs:
http://crl1.hongkongpost.gov.hk/crl/RootCA3ARL.crl
http://crl1.hongkongpost.gov.hk/crl/eCertESCA3-17CRL1.crl -
OCSP URL:
http://ocsp1.hongkongpost.gov.hk -
Audit: Annual audits are performed by PricewaterhouseCoopers Hong Kong
according to the WebTrust for CA, BR, and EV audit criteria.
WebTrust: https://www.cpacanada.ca/webtrustseal?sealid=2405
BR: https://www.cpacanada.ca/webtrustseal?sealid=2406
EV:
https://www.ecert.gov.hk/ev/Webtrust%20EV%20SSL%20Report%2020181219_FINAL%20(with%20Management%20Assertion%20Letter).pdf
I’ve reviewed the CPS, BR Self Assessment, and related information for
inclusion of the Certizen Hongkong Post Root CA 3 that is being tracked in
this bug and have the following comments:
==Good==
This root is relatively new, has continuous BR audit coverage, and appears
to have only signed certificates for the required test websites.
==Meh==
- The first EV audit was a point-in-time dated March 31, 2018 [1]. Given
that EV certificates for the test sites were issued in May 2018, one can
argue that EVGL section 17.4 required a period-of-time audit to have been
completed in October rather than December as was the case. However, it has
been common for CAs to argue that certificates for test websites don’t
count and I have not yet published clear guidance on this issue. - There is no document referenced as a CP. Hongkong Post says that the
document is a combined CP/CPS. - In 2016, it was discovered that Hongkong Post was issuing SHA-1
certificates with non-random serial numbers that could be used for TLS in
Firefox [2] [3]. The problem was resolved by adding the problematic
intermediate certificate to OneCRL. - The CPS permits external RAs, but according to Appendix E, there are none
at present. I would prefer that the CPS clearly state that domain
validation functions are never delegated. - Hongkong Post has attached unpublished versions 2 and 3 of their CPS to
the bug that differ from the published versions 2 and 3 in their
repository. The latest version “4” is marked as a “Pre-production CPS”.
They state that “…we cannot issue EV certificate to customers until
Mozilla, or at least some other root certificate programs, have granted EV
treatment to our root certificate. So, we do not yet publish the CPS in
order to avoid confusion to customers.”
==Bad==
- Fairly recent misissuance under the currently included Hong Kong Post
Root CA 1: O and OU fields too long [4]. These certificates have all been
revoked, but no incident report was ever filed. - CPS section 3.4 indicates that certificates may be suspended. This would
violate BR 4.9.13. This has been corrected in the “Pre-production” CPS but
not the current CPS for their existing root [5]. - CPS section 4.9.1 does not appear to include all the revocation reasons
required by BR 4.9.1.1. This has been corrected in the “Pre-production” CPS
but not the current CPS for their existing root [5].
This begins the 3-week comment period for this request [6].
I will greatly appreciate your thoughtful and constructive feedback on the
acceptance of this root into the Mozilla CA program.
- Wayne
[1] https://bug1464306.bmoattachments.org/attachment.cgi?id=8980478
[2]
https://groups.google.com/forum/#!msg/mozilla.dev.security.policy/Ng99HcqhZtI/bkcimGlECAAJ
[3] https://bugzilla.mozilla.org/show_bug.cgi?id=1267332
[4]
https://crt.sh/?caid=7319&opt=cablint,zlint,x509lint&minNotBefore=2017-01-01
[5] https://www.ecert.gov.hk/product/cps/ecert/img/server_cps_en3.pdf
[6] https://wiki.mozilla.org/CA/Application_Process
| Assignee | ||
Comment 30•6 years ago
|
||
Note that the information currently in the CCADB for this request is here:
https://ccadb-public.secure.force.com/mozilla/PrintViewForCase?CaseNumber=00000314
| Reporter | ||
Comment 31•6 years ago
|
||
Hi Wayne,
I think this root inclusion request had been in public discussion phase for some time. I thank you and the Mozilla community for the comments.
Would you consider moving on to next stage of the process?
- Man
Comment 32•6 years ago
|
||
I summarized the status and requested any final public comments by 20-February.
| Reporter | ||
Comment 33•6 years ago
|
||
As there is no further questions from the community, can we proceed to next stage?
I'm hoping that this Hongkong Post Root CA 3 with website trust bit enabled, and EV treatment (EV Policy OID: 2.23.140.1.1), could catch up the next release of Firefox, if possible.
Thanks you very much.
Comment 34•6 years ago
|
||
The discussion for this request is here: https://groups.google.com/d/msg/mozilla.dev.security.policy/xdiyOa5ruao/6caGQ98TDgAJ
I recommend approval of this inclusion request.
Updated•6 years ago
|
| Assignee | ||
Comment 35•6 years ago
|
||
This request is now in step 10: intent to approve has been stated, last call before approval.
https://wiki.mozilla.org/CA/Application_Process#Process_Overview
The information for this request is here:
https://ccadb-public.secure.force.com/mozilla/PrintViewForCase?CaseNumber=00000314
| Assignee | ||
Comment 36•6 years ago
|
||
On behalf of Mozilla, I approve this request from Hongkong Post Certification Authority (HKPCA) to include the following root certificate:
** 'Hongkong Post Root CA 3' (Websites); EV
I will file the NSS and PSM bugs for the approved changes.
| Assignee | ||
Comment 37•6 years ago
|
||
I have filed bug #1532753 against NSS and bug #1532757 against PSM for the actual changes.
| Assignee | ||
Updated•6 years ago
|
| Assignee | ||
Updated•6 years ago
|
Updated•3 years ago
|
Description
•