Closed
Bug 406968
Opened 16 years ago
Closed 13 years ago
ADD camerifirma EV root certificates
Categories
(CA Program :: CA Certificate Root Program, task)
CA Program
CA Certificate Root Program
Tracking
(Not tracked)
RESOLVED
FIXED
People
(Reporter: ramirom, Assigned: kwilson)
References
()
Details
(Whiteboard: EV - In FF4Beta)
Attachments
(14 files)
2.56 KB,
application/x-x509-ca-cert
|
Details | |
2.57 KB,
application/x-x509-ca-cert
|
Details | |
110.00 KB,
application/msword
|
Details | |
22.32 KB,
image/tiff
|
Details | |
120.00 KB,
application/msword
|
Details | |
2.58 KB,
application/x-x509-email-cert
|
Details | |
1015 bytes,
application/pkix-crl
|
Details | |
2.86 KB,
application/x-x509-ca-cert
|
Details | |
7.71 KB,
application/zip
|
Details | |
18.33 KB,
application/pdf
|
Details | |
1.44 KB,
application/octet-stream
|
Details | |
31.11 KB,
application/pdf
|
Details | |
9.20 KB,
application/pdf
|
Details | |
2.04 MB,
application/pdf
|
Details |
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; .NET CLR 3.0.04506) Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 6.0; es-ES; rv:1.8.1.11) Gecko/20071127 Firefox/2.0.0.11 We are already included in the CA trusted list, and we whould like to incorporate a new root keys Could you please inform me about next steps ? Reproducible: Always Steps to Reproduce: 1. 2. 3.
Updated•16 years ago
|
Assignee: nobody → hecker
Component: Security → CA Certificates
Product: Firefox → mozilla.org
QA Contact: firefox → ca-certificates
Summary: ADD new root certificate → ADD new root certificate for camerifirma
Version: unspecified → other
Updated•16 years ago
|
Severity: normal → enhancement
Reporter | ||
Comment 1•16 years ago
|
||
Please any information about this bug ? It is urgent for us to know it asap. from 2007 11 27 we have no get information. Thank you
Comment 2•16 years ago
|
||
Accepting this bug, and putting it into the queue with the other CA requests.
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true
Comment 3•15 years ago
|
||
Ramiro, This request contains no information on which to make any decision. Please see the following page, http://wiki.mozilla.org/CA:Root_Certificate_Requests and then return to this bug page and submit the information requested.
Whiteboard: information incomplete
Reporter | ||
Comment 4•15 years ago
|
||
Reporter: ramirom@camerfirma.com Product: mozilla.org Version: Other Component: CA Certificates Severity: Enhancement Platform: ALL OS: ALL Summary: Add Chambers of Commerce ROOT, Chambersign Global ROOT Description: (see below) CA Details ---------- CA Name: [AC CAmewrfirma SA] Website URL: [http://www.camerfirma.com] CA Summary: [ Commercial CA issuing certificates for Companies and representatives] [ - Primary geographical area(s) served SPAIN ] [ - Sub CA : 5 ] Audit Type (WebTrust, ETSI etc.): [WEBTRUST ] Auditor: [Ernst & Young ] Auditor Website URL: [http://www.ey.es ] Audit Document URL(s): [http://www.camerfirma.com/mod_web/acreditaciones/auditorias.html] [http:// ] URL of certificate hierarchy diagram (if available): [http://www.camerfirma.com/mod_web/repositorio/otrascas.html ] Certificate Details ------------------- (To be completed once for each root certificate; note that we only include root certificates in the store, not intermediates.) Certificate Name: [Chambers of Commerce Root - 2008] Summary Paragraph: [This Ca issue certificate for Spanish Companies representatives ] [A copy of all end entities certificate policy can be obtained in] [http://www.camerfirma.com/mod_web/repositorio/otrascas.html ] [Chambers of Commerce are used as RAs for end users registration ] Root certificate download URL (on CA website): -----BEGIN CERTIFICATE----- MIIHSTCCBTGgAwIBAgIJAMnN0+nVfSPOMA0GCSqGSIb3DQEBBQUAMIGsMQswCQYD VQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0 IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3 MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xJzAlBgNVBAMTHkdsb2JhbCBD aGFtYmVyc2lnbiBSb290IC0gMjAwODAeFw0wODA4MDExMjMxNDBaFw0zODA3MzEx MjMxNDBaMIGsMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3Vy cmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAG A1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xJzAl BgNVBAMTHkdsb2JhbCBDaGFtYmVyc2lnbiBSb290IC0gMjAwODCCAiIwDQYJKoZI hvcNAQEBBQADggIPADCCAgoCggIBAMDfVtPkOpt2RbQT2//BthmLN0EYlVJH6xed KYiONWwGMi5HYvNJBL99RDaxccy9Wglz1dmFRP+RVyXfXjaOcNFccUMd2drvXNL7 G706tcuto8xEpw2uIRU/uXpbknXYpBI4iRmKt4DS4jJvVpyR1ogQC7N0ZJJ0YPP2 zxhPYLIj0Mc7zmFLmY/CDNBAspjcDahOo7kKrmCgrUVSY7pmvWjg+b4aqIG7HkF4 ddPB/gBVsIdU6CeQNR1MM62X/JcumIS/LMmjv9GYERTtY/jKmIhYF5ntRQOXfjyG HoiMvvKRhI9lNNgATH23MRdaKXoKGCQwoze1eqkBfSbW+Q6OWfH9GzO1KTsXO0G2 Id3UwD2ln58fQ1DJu7xsepeY7s2MH/ucUa6LcL0nn3HAa6x9kGbo1106DbDVwo3V yJ2dwW3Q0L9R5OP4wzg2rtandeavhENdk5IMagfeOx2YItaswTXbo6Al/3K1dh3e beksZixShNBFks4c5eUzHdwHU1SjqoI7mjcv3N2gZOnm3b2u/GSFHTynyQbehP9r 6GsaPMWis0L7iwk+XwhSx2LE1AVxv8Rk5Pihg+g+EpuoHtQ2TS9x9o0o9oOpE9Jh wZG7SMA0j0GMS0zbaRL/UJScIINZc+18ofLx/d33SdNDWKBWY8o9PeU1VlnpDsog zCtLkykPAgMBAAGjggFqMIIBZjASBgNVHRMBAf8ECDAGAQH/AgEMMB0GA1UdDgQW BBS5CcqcHtvTbDprru1U8VuTBjUuXjCB4QYDVR0jBIHZMIHWgBS5CcqcHtvTbDpr ru1U8VuTBjUuXqGBsqSBrzCBrDELMAkGA1UEBhMCRVUxQzBBBgNVBAcTOk1hZHJp ZCAoc2VlIGN1cnJlbnQgYWRkcmVzcyBhdCB3d3cuY2FtZXJmaXJtYS5jb20vYWRk cmVzcykxEjAQBgNVBAUTCUE4Mjc0MzI4NzEbMBkGA1UEChMSQUMgQ2FtZXJmaXJt YSBTLkEuMScwJQYDVQQDEx5HbG9iYWwgQ2hhbWJlcnNpZ24gUm9vdCAtIDIwMDiC CQDJzdPp1X0jzjAOBgNVHQ8BAf8EBAMCAQYwPQYDVR0gBDYwNDAyBgRVHSAAMCow KAYIKwYBBQUHAgEWHGh0dHA6Ly9wb2xpY3kuY2FtZXJmaXJtYS5jb20wDQYJKoZI hvcNAQEFBQADggIBAICIf3DekijZBZRG/5BXqfEv3xoNa/p8DhxJJHkn2EaqbylZ UohwEurdPfWbU1Rv4WCiqAm57OtZfMY18dwY6fFn5a+6ReAJ3spED8IXDneRRXoz X1+WLGiLwUePmJs9wOzL9dWCkoQ10b42OFZyMVtHLaoXpGNR6woBrX/sdZ7LoR/x fxKxueRkf2fWIyr0uDldmOghp+G9PUIadJpwr2hsUF1Jz//7Dl3mLEfXgTpZALVz a2Mg9jFFCDkO9HB+QHBaP9BrQql0PSgvAm11cpUJjUhjxsYjV5KTXjXBjfkK9yyd Yhz2rXzdpjEetrHHfoUm+qRqtdpjMNHvkzeyZi99Bffnt0uYlDXA2TopwZ2yUDMd SqlapskD7+3056huirRXhOukP9DuqqqHW2Pok+JrqNS4cnhrG+055F3Lm6qH1U9O AP7Zap88MQ8oAgF9mOinsKJknnn4SPIVqczmyETrP3iZ8ntxPjzxmKfFGBI/5rso M0LpRQp8bfKGeS/Fghl9CYl8slR2iK7ewfPM4W7bMdaTrpmg7yVqc5iJWzouE4ge v8CSlDQb4ye3ix5vQv/n6TebUB0tovkC7stYWDpxvGjjqsGvHCgfotwjZT+B6q6Z 09gwzxMNTxXJhLynSC34MCN32EZLeW32jO06f2ARePTpm67VVMB0gNELQp/B -----END CERTIFICATE----- Certificate SHA1 Fingerprint (in hexadecimal): [786a74ac76ab147f9c6a3050ba9ea87efe9ace3c] Key size (for RSA, modulus length) in bits: [ 4096 ] Valid From (YYYY-MM-DD): [ 2008-08-01 ] Valid To (YYYY-MM-DD): [ 2038-07-31 ] CRL HTTP URL (if any): [http:// ] CRL issuing frequency for subordinate CA certificates: [ 180 days ] CRL issuing frequency for subordinate EE certificates: [ 180 days ] OCSP responder URL (if any): [http://ocsp.camerfirma.com ] Class: [domain-validated, identity/organizationally-validated or EV] Certificate Policy URL: [http://policy.camerfirma.com ] CPS URL: [http://policy.camerfirma.com ] Requested Trust Indicators: [ email and/or SSL and/or code signing ] URL of a sample website using a certificate chained to this root (if applying for SSL): [https:// ------------------------------------------------------------------- Certificate Name: [Global Chambersign Root - 2008] Summary Paragraph: [This Ca issue certificate for general use in all over the world ] [A copy of all end entities certificate policy can be obtained in] [http://www.camerfirma.com/mod_web/repositorio/otrascas.html ] [All kind of RA are used by this CA for End User Registration ] Root certificate download URL (on CA website): -----BEGIN CERTIFICATE----- MIIHSTCCBTGgAwIBAgIJAMnN0+nVfSPOMA0GCSqGSIb3DQEBBQUAMIGsMQswCQYD VQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0 IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3 MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xJzAlBgNVBAMTHkdsb2JhbCBD aGFtYmVyc2lnbiBSb290IC0gMjAwODAeFw0wODA4MDExMjMxNDBaFw0zODA3MzEx MjMxNDBaMIGsMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3Vy cmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAG A1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xJzAl BgNVBAMTHkdsb2JhbCBDaGFtYmVyc2lnbiBSb290IC0gMjAwODCCAiIwDQYJKoZI hvcNAQEBBQADggIPADCCAgoCggIBAMDfVtPkOpt2RbQT2//BthmLN0EYlVJH6xed KYiONWwGMi5HYvNJBL99RDaxccy9Wglz1dmFRP+RVyXfXjaOcNFccUMd2drvXNL7 G706tcuto8xEpw2uIRU/uXpbknXYpBI4iRmKt4DS4jJvVpyR1ogQC7N0ZJJ0YPP2 zxhPYLIj0Mc7zmFLmY/CDNBAspjcDahOo7kKrmCgrUVSY7pmvWjg+b4aqIG7HkF4 ddPB/gBVsIdU6CeQNR1MM62X/JcumIS/LMmjv9GYERTtY/jKmIhYF5ntRQOXfjyG HoiMvvKRhI9lNNgATH23MRdaKXoKGCQwoze1eqkBfSbW+Q6OWfH9GzO1KTsXO0G2 Id3UwD2ln58fQ1DJu7xsepeY7s2MH/ucUa6LcL0nn3HAa6x9kGbo1106DbDVwo3V yJ2dwW3Q0L9R5OP4wzg2rtandeavhENdk5IMagfeOx2YItaswTXbo6Al/3K1dh3e beksZixShNBFks4c5eUzHdwHU1SjqoI7mjcv3N2gZOnm3b2u/GSFHTynyQbehP9r 6GsaPMWis0L7iwk+XwhSx2LE1AVxv8Rk5Pihg+g+EpuoHtQ2TS9x9o0o9oOpE9Jh wZG7SMA0j0GMS0zbaRL/UJScIINZc+18ofLx/d33SdNDWKBWY8o9PeU1VlnpDsog zCtLkykPAgMBAAGjggFqMIIBZjASBgNVHRMBAf8ECDAGAQH/AgEMMB0GA1UdDgQW BBS5CcqcHtvTbDprru1U8VuTBjUuXjCB4QYDVR0jBIHZMIHWgBS5CcqcHtvTbDpr ru1U8VuTBjUuXqGBsqSBrzCBrDELMAkGA1UEBhMCRVUxQzBBBgNVBAcTOk1hZHJp ZCAoc2VlIGN1cnJlbnQgYWRkcmVzcyBhdCB3d3cuY2FtZXJmaXJtYS5jb20vYWRk cmVzcykxEjAQBgNVBAUTCUE4Mjc0MzI4NzEbMBkGA1UEChMSQUMgQ2FtZXJmaXJt YSBTLkEuMScwJQYDVQQDEx5HbG9iYWwgQ2hhbWJlcnNpZ24gUm9vdCAtIDIwMDiC CQDJzdPp1X0jzjAOBgNVHQ8BAf8EBAMCAQYwPQYDVR0gBDYwNDAyBgRVHSAAMCow KAYIKwYBBQUHAgEWHGh0dHA6Ly9wb2xpY3kuY2FtZXJmaXJtYS5jb20wDQYJKoZI hvcNAQEFBQADggIBAICIf3DekijZBZRG/5BXqfEv3xoNa/p8DhxJJHkn2EaqbylZ UohwEurdPfWbU1Rv4WCiqAm57OtZfMY18dwY6fFn5a+6ReAJ3spED8IXDneRRXoz X1+WLGiLwUePmJs9wOzL9dWCkoQ10b42OFZyMVtHLaoXpGNR6woBrX/sdZ7LoR/x fxKxueRkf2fWIyr0uDldmOghp+G9PUIadJpwr2hsUF1Jz//7Dl3mLEfXgTpZALVz a2Mg9jFFCDkO9HB+QHBaP9BrQql0PSgvAm11cpUJjUhjxsYjV5KTXjXBjfkK9yyd Yhz2rXzdpjEetrHHfoUm+qRqtdpjMNHvkzeyZi99Bffnt0uYlDXA2TopwZ2yUDMd SqlapskD7+3056huirRXhOukP9DuqqqHW2Pok+JrqNS4cnhrG+055F3Lm6qH1U9O AP7Zap88MQ8oAgF9mOinsKJknnn4SPIVqczmyETrP3iZ8ntxPjzxmKfFGBI/5rso M0LpRQp8bfKGeS/Fghl9CYl8slR2iK7ewfPM4W7bMdaTrpmg7yVqc5iJWzouE4ge v8CSlDQb4ye3ix5vQv/n6TebUB0tovkC7stYWDpxvGjjqsGvHCgfotwjZT+B6q6Z 09gwzxMNTxXJhLynSC34MCN32EZLeW32jO06f2ARePTpm67VVMB0gNELQp/B -----END CERTIFICATE----- Certificate SHA1 Fingerprint (in hexadecimal): [4abdeeec950d359c89aec752a12c5b29f6d6aa0c] Key size (for RSA, modulus length) in bits: [ 4096 ] Valid From (YYYY-MM-DD): [ 2008-08-01 ] Valid To (YYYY-MM-DD): [ 2038-07-31 ] CRL HTTP URL (if any): [http:// ] CRL issuing frequency for subordinate CA certificates: [ 180 days ] CRL issuing frequency for subordinate EE certificates: [ 180 days ] OCSP responder URL (if any): [http://ocsp.camerfirma.com ] Class: [domain-validated, identity/organizationally-validated or EV] Certificate Policy URL: [http://policy.camerfirma.com ] CPS URL: [http://policy.camerfirma.com ] Requested Trust Indicators: [ email and/or SSL and/or code signing ] URL of a sample website using a certificate chained to this root (if applying for SSL): [https://
Assignee | ||
Comment 5•15 years ago
|
||
Accepting this bug so I can proceed with the information-gathering and verification phase.
Assignee: hecker → kathleen95014
Assignee | ||
Comment 6•15 years ago
|
||
It looks like the certificate provided for the "Chambers of Commerce Root - 2008" was copied incorrectly. Instead, the "Global Chambersign Root - 2008" root has been provided twice. Please provide the correct cert. It would be even better if you could provide a link on your company website for downloading each root. If not, then copying the root into bugzilla here is fine. Thanks, Kathleen
Reporter | ||
Comment 7•15 years ago
|
||
Thank you Kathleen for your comments, Here I send to you the correct certificate Chambers of Commerce Root - 2008 ( It is faster ), sorry for the mistake -----BEGIN CERTIFICATE----- MIIHTzCCBTegAwIBAgIJAKPaQn6ksa7aMA0GCSqGSIb3DQEBBQUAMIGuMQswCQYD VQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0 IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3 MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xKTAnBgNVBAMTIENoYW1iZXJz IG9mIENvbW1lcmNlIFJvb3QgLSAyMDA4MB4XDTA4MDgwMTEyMjk1MFoXDTM4MDcz MTEyMjk1MFowga4xCzAJBgNVBAYTAkVVMUMwQQYDVQQHEzpNYWRyaWQgKHNlZSBj dXJyZW50IGFkZHJlc3MgYXQgd3d3LmNhbWVyZmlybWEuY29tL2FkZHJlc3MpMRIw EAYDVQQFEwlBODI3NDMyODcxGzAZBgNVBAoTEkFDIENhbWVyZmlybWEgUy5BLjEp MCcGA1UEAxMgQ2hhbWJlcnMgb2YgQ29tbWVyY2UgUm9vdCAtIDIwMDgwggIiMA0G CSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCvAMtwNyuAWko6bHiUfaN/Gh/2NdW9 28sNRHI+JrKQUrpjOyhYb6WzbZSm891kDFX29ufyIiKAXuFixrYp4YFs8r/lfTJq VKAyGVn+H4vXPWCGhSRv4xGzdz4gljUha7MI2XAuZPeEklPWDrCQiorjh40G072Q DuKZoRuGDtqaCrsLYVAGUvGef3bsyw/QHg3PmTA9HMRFEFis1tPo1+XqxQEHd9ZR 5gN/ikilTWh1uem8nk4ZcfUyS5xtYBkL+8ydddy/Js2Pk3g5eXNeJQ7KXOt3EgfL ZEFHcpOrUMPrCXZkNNI5t3YRCQ12RcSprj1qr7V9ZS+UWBDsXHyvfuK2GNnQm05a Sd+pZgvMPMZ4fKecHePOjlO+Bd5gD2vlGts/4+EhySnB8esHnFIbAURRPHsl18Tl UlRdJQfKFiC4reRB7noI/plvg6aRArBsNlVq5331lubKgdaX8ZSD6e2wsWsSaR6s +12pxZjptFtYer49okQ6Y1nUCyXeG0+95QGezdIp1Z8XGQpvvwyQ0wlf2eOKNcx5 Wk0ZN5K3xMGtr/R5JJqyAQuxr1yW84Ay+1w9mPGgP0revq+ULtlVmhduYJ1jbLhj ya6BXBg14JC7vjxPNyK5fuvPnnchpj04gftI2jE9K+OJ9dC1vX7gUMQSibMjmhAx hduub+84Mxh2EQIDAQABo4IBbDCCAWgwEgYDVR0TAQH/BAgwBgEB/wIBDDAdBgNV HQ4EFgQU+SSsD7K1+HnA+mCIG8TZTQKeFxkwgeMGA1UdIwSB2zCB2IAU+SSsD7K1 +HnA+mCIG8TZTQKeFxmhgbSkgbEwga4xCzAJBgNVBAYTAkVVMUMwQQYDVQQHEzpN YWRyaWQgKHNlZSBjdXJyZW50IGFkZHJlc3MgYXQgd3d3LmNhbWVyZmlybWEuY29t L2FkZHJlc3MpMRIwEAYDVQQFEwlBODI3NDMyODcxGzAZBgNVBAoTEkFDIENhbWVy ZmlybWEgUy5BLjEpMCcGA1UEAxMgQ2hhbWJlcnMgb2YgQ29tbWVyY2UgUm9vdCAt IDIwMDiCCQCj2kJ+pLGu2jAOBgNVHQ8BAf8EBAMCAQYwPQYDVR0gBDYwNDAyBgRV HSAAMCowKAYIKwYBBQUHAgEWHGh0dHA6Ly9wb2xpY3kuY2FtZXJmaXJtYS5jb20w DQYJKoZIhvcNAQEFBQADggIBAJASryI1wqM58C7e6bXpeHxIvj99RZJe6dqxGfwW PJ+0W2aeaufDuV2I6A+tzyMP3iU6XsxPpcG1Lawk0lgH3qLPaYRgM+gQDROpI9CF 5Y57pp49chNyM/WqfcZjHwj0/gF/JM8rLFQJ3uIrbZLGOU8W6jx+ekbURWpGqOt1 glanq6B8aBMz9p0w8G8nOSQjKpD9kCk18pPfNKXG9/jvjA9iSnyu0/VU+I22mlaH FoI6M6taIgj3grrqLuBHmrS1RaMFO9ncLkVAO+rcf+g769HsJtg1pDDFOqxXnrN2 pSB7+R5KBWIBpih1YJeSDW4+TTdDDZIVnBgizVGZoCkaPF+KMjNbMMeJL0eYD6MD xvbxrN8y8NmBGuScvfaAFPDRLLmF9dijscilIeUcE5fuDr3fKanvNFNb0+RqE4QG tjICxFKuItLcsiFCGtpA8CnJ7AoMXOLQusxI0zcKzBIKinmwPQN/aUv0NCB9szTq jktk9T79syNnFQ0EuPAtwQlRPLJsFfClI9eDdOTlLsn+mCdCxqvGnrDQWzilm1De fhiYtUU79nm06PcaewaD+9CL2rvHvRirCG88gGtAPxkZumWK5r7VXNM21+9AUiRg OGcEMeyP84LG3rlV8zsxkVrctQgVrXYlCg17LofiDKYGvCYQbTed7N14jHyAxfDZ d0jQ -----END CERTIFICATE-----
Assignee | ||
Comment 8•15 years ago
|
||
Assignee | ||
Comment 9•15 years ago
|
||
Assignee | ||
Comment 10•15 years ago
|
||
Attached is the initial information gathering document which summarizes the information gathered and verified so far. Within the document the information that is still needed is highlighted in yellow. I will also summarize here. 1) Please see sections 8, 9, and 10 of http://www.mozilla.org/projects/security/certs/policy/ We need a publishable statement or letter from an auditor (who meets the policy requirements) that states that they have reviewed the practices as outlined in the CP/CPS for these roots, and that the CA does indeed follow these practices and meets the requirements of one of: ETSI TS 101 456 ETSI TS 102 042 WebTrust Principles and Criteria for Certification Authorities The WebTrust audit that is posted on http://www.camerfirma.com/mod_web/acreditaciones/auditorias.html is from 2003, which is too old. 2) As per section 7 of http://www.mozilla.org/projects/security/certs/policy/ please translate the relevant text from the latest CP or CPS into English that demonstrates that reasonable measures are taken to verify the following information for end-entity certificates: a) for a certificate to be used for SSL-enabled servers, the CA takes reasonable measures to verify that the entity submitting the certificate signing request has registered the domain(s) referenced in the certificate or has been authorized by the domain registrant to act on the registrant's behalf; b) for a certificate to be used for digitally signing and/or encrypting email messages, the CA takes reasonable measures to verify that the entity submitting the request controls the email account associated with the email address referenced in the certificate or has been authorized by the email account holder to act on the account holder's behalf; c) for certificates to be used for digitally signing code objects, the CA takes reasonable measures to verify that the entity submitting the certificate signing request is the same entity referenced in the certificate or has been authorized by the entity referenced in the certificate to act on that entity's behalf; 3) Please provide text in English that describes the subordinate CAs for these roots. 4) Are there any subordinate CAs operated by third parties? For the subordinate CAs that are operated by third parties, please provide a general description and explain how the CP/CPS and audits ensure the third parties are in compliance. 5) Please identify if all SSL certs issued from these roots are OV, meaning that both the domain name referenced in the certificate is verified to be owned/controlled by the subscriber, and the value of the Organization attribute is verified to be that associated with the certificate subscriber. Are there any SSL certs issued from these roots that are only DV? Eg the Organization attribute is not verified, only the domain name is verified? 6) Can you provide URLs for the CRLs to these roots? Is there a statement in the CPS (or other relevant document that subordinate CAs must agree to) that specifies the frequency of update for the CRLs for the end-entity certificates chaining up to this root? Would you please translate the relevant text into English? There is usually a statement in the CPS to the effect that the CRL for end-entity certs is updated whenever a cert is revoked, and at least every 24 or 36 hours. 7) I’m supposed to review the CP/CPS for potentially problematic practices, as per http://wiki.mozilla.org/CA:Problematic_Practices. Would you please comment as to whether any of these are relevant? If relevant, please provide further info. 8) For testing purposes, please provide URLs to websites whose certificates chain up to these roots. Note that these can be test sites. Thanks, Kathleen
Reporter | ||
Comment 11•15 years ago
|
||
Ok Kathleen, thak you, I will prepare the answers to your requirementes as soon as posible. Regards
Reporter | ||
Comment 12•15 years ago
|
||
auditor letter about AC Camerfirma webtrust process
Assignee | ||
Comment 13•15 years ago
|
||
Thank you for the letter from the auditor. When was this audit performed? As part of our standard process, I will need to independently contact Ernst & Young to verify the audit and letter. Thanks, Kathleen
Reporter | ||
Comment 14•15 years ago
|
||
crl distribution point for roots certificates. crl.camerfirma.com/root_chambers_2008.crl crl.camerfirma.com/root_chambersign_2008.crl
Reporter | ||
Comment 15•15 years ago
|
||
This audit has been performed in October 2008. Sorry I didm´t realize that I whouldn´t answer your question. Please can you tell me when more or less this roots will be included in your trusted list ? Regards Ramiro (In reply to comment #13) > Thank you for the letter from the auditor. When was this audit performed? > > As part of our standard process, I will need to independently contact Ernst & > Young to verify the audit and letter. > > Thanks, > Kathleen
Reporter | ||
Comment 16•15 years ago
|
||
Assignee | ||
Comment 17•15 years ago
|
||
Thank you for the information. For each root, we will need either a test cert or (preferably) a website whose ssl cert chains up to the root. This will be used for testing purposes. Mozilla policy is that when the CA provides the audit report, I need to independently contact the auditing company to verify the authenticity of the audit report. I have found that my email address confuses the auditors, so would you please ask the auditor (Marc Martinez Marce) to look for and reply to my email? It will likely get forwarded to him by the E&Y Webmaster.
Reporter | ||
Comment 18•15 years ago
|
||
Ok, I will try to prepare soon a SSL certificate from each hierarchy. Please try to contact Marc again by email Marc.MartinezMarce@es.ey.com regards Ramiro
Assignee | ||
Comment 19•15 years ago
|
||
The auditor has responded to my inquiry and has verified the authenticity of the audit report provided by the CA.
Reporter | ||
Comment 20•15 years ago
|
||
Kathleen I have receive a complaint from our auditors about the audit report publication that I have send to you. This reports is not a real audit but a confirmation letter about the audit process for you personal knowlege. Please could you withdrow this document from public. I will send to you the final report in a few days. regards Ramiro (In reply to comment #19) > The auditor has responded to my inquiry and has verified the authenticity of > the audit report provided by the CA.
Assignee | ||
Comment 21•15 years ago
|
||
I have removed the link to the auditor's letter from the pending list in http://www.mozilla.org/projects/security/certs/pending/ Would you also like to remove it from the attachments to this bug?
Reporter | ||
Comment 22•15 years ago
|
||
I think it is enough, thank you very much Ramiro
Reporter | ||
Comment 23•15 years ago
|
||
This is a SSL certificate issued to a http server for test use.
Reporter | ||
Comment 24•15 years ago
|
||
Hi here enclised to this message can be found a SSL end user test certificate from our new roots "Chambers of Commerce ROOT 2008". In short time we will send another end user certificate from the other hierarchy "Chambersign GLobal ROOT 2008"
Updated•15 years ago
|
Attachment #368235 -
Attachment description: AC Camerfirma new roots SSL certificate → SSL server certificate which chains to AC Camerfirma new roots
Attachment #368235 -
Attachment mime type: application/octet-stream → application/x-x509-email-cert
Updated•15 years ago
|
Attachment #339338 -
Attachment mime type: application/octet-stream → application/msword
Comment 25•15 years ago
|
||
Comment on attachment 368235 [details] SSL server certificate which chains to AC Camerfirma new roots The cert in this attachment is issued by Issuer: CN=Camerfirma Corporate Server - 2009, L=Madrid (see current address at https://www.camerfirma.com/address), serialNumber=A82743287, O=AC Camerfirma S.A., C=ES That issuer cert is not presently attached to this bug, and without it, one cannot establish that this cert was issued by either of the proposed new root certs.
Assignee | ||
Comment 26•15 years ago
|
||
Hi Ramiro, I get the same result as Nelson when I import the newly attached cert. It looks like we'll also need the cert for the SSL intermediate CA. Would you also please send us the new audit report? Thanks, Kathleen
Reporter | ||
Comment 27•15 years ago
|
||
This is the intermediate CA certificate from "Chambers of Commerce ROOT 2208" that issue certificates in a multi-policy technique for SSL web sites and "electronic seal"
Reporter | ||
Comment 28•15 years ago
|
||
Hi Kathleen I will provide to you with the new audit report in a few days. I am still wainting to receiving the the final report from the auditors. Regards Ramiro
Comment 29•15 years ago
|
||
Comment on attachment 368295 [details]
Intermediate CA's CRL
This is a CRL for the intermediate CA, not the CA cert.
Attachment #368295 -
Attachment description: Intermediate CA → Intermediate CA's CRL
Attachment #368295 -
Attachment mime type: application/octet-stream → application/pkix-crl
Reporter | ||
Comment 30•15 years ago
|
||
This is the intermediate CA certificate from "Chambers of Commerce ROOT 2208" that issue certificates in a multi-policy technique for SSL web sites and "electronic seal"
Reporter | ||
Comment 31•15 years ago
|
||
Sorry it was a mistake.
Updated•15 years ago
|
Attachment #368496 -
Attachment mime type: application/octet-stream → application/x-x509-ca-cert
Reporter | ||
Comment 32•15 years ago
|
||
Reporter | ||
Comment 33•15 years ago
|
||
Hi here enclosed I send an end user certificate from the Chambersign Global ROOT hierarchy and the complete certificate chain. Regards
Reporter | ||
Comment 34•15 years ago
|
||
Hi Kathleen it is only left from us providing the final audit report, isn´t it
Assignee | ||
Comment 35•15 years ago
|
||
Yes, this request is pending the audit report, then it can be added to the queue for public discussion.
Assignee | ||
Comment 36•15 years ago
|
||
Bug #485894 was created to request that these two roots, Chambers of Commerce Root – 2008 and Global Chambersign Root – 2008, be EV-enabled. I am closing that bug as a duplicate of this bug, and updating this bug to reflect that this request is also for EV-enablement. Taking into account this update, here is the information that is needed for this request: 1) OCSP max expiration time as per http://www.cabforum.org/EV_Certificate_Guidelines_V11.pdf Section 26(b): “If the CA provides revocation information via an Online Certificate Status Protocol (OCSP) service, it MUST update that service at least every four days. OCSP responses from this service MUST have a maximum expiration time of ten days.” 2) Updated hierarchies including the EV intermediate CAs. 3) EV policy OID(s) as per http://www.cabforum.org/EV_Certificate_Guidelines_V11.pdf 4) Example websites with EV certs chaining up to these roots. 5) CP/CPS with EV information. 6) Translations into English of the sections of CP/CPS and/or RA Operating Manual having to do with verification of identity/organization, domain name ownership, and email address ownership. 7) WebTrust CA and WebTrust EV audits
Summary: ADD new root certificate for camerifirma → ADD camerifirma EV root certificates
Whiteboard: information incomplete → EV, information incomplete
Reporter | ||
Comment 38•15 years ago
|
||
Hi Kathleen, here you are our webtrust certification. I think this completes the process. Now I will prepare out CPS and Policies to follow with the EV recognition process. https://cert.webtrust.org/ViewSeal?id=874 Regards Ramiro
Reporter | ||
Comment 39•15 years ago
|
||
Please Kathleen can you give me information in advance about what browser version will include our root certificates ? It is really important for us to know it Thank you
Assignee | ||
Comment 40•15 years ago
|
||
I have been waiting for response to my inquiries in Comment #36. Also, would you please provide a translation into English of the WebTrust CA audit? Did you have a WebTrust EV audit performed? If so, would you please provide the url to the audit report? I cannot predict what release these CAs will be included in. First we need to complete the Information Gathering and Verification phase, and then we need to complete the Public Discussion phase. These are described in https://wiki.mozilla.org/CA:How_to_apply
Reporter | ||
Comment 41•15 years ago
|
||
Hi Kathleen, thank you for your quick answer. We are at the moment running our EV audit, so I prefer if it is posible to include both CAs root as soon as possible even though this means a no EV flag, we are really in a hurry with this. Afterwards, can we activate them as EV or just include a new CA for EV certificatres ?. Best Regards Ramiro
Assignee | ||
Comment 42•15 years ago
|
||
Attaching the updated Information Gathering document to reflect that EV is no longer requested at this time. Please review this document for accuracy and completeness. Please provide the following information as soon as possible: 1) URLs to websites whose SSL certs chain up to these roots. (may be test sites) 2) Translations into English of the sections of CP/CPS and/or RA Operating Manual having to do with verification of identity/organization, domain name ownership, and email address ownership. Note that this request has been added to the queue for public discussion at https://wiki.mozilla.org/CA:Schedule#Queue_for_Public_Discussion The status column indicates where we are in the queue, which is the request whose status is “In First Discussion”. Most first discussions take one to two weeks. Since the discussions are dependent on volunteers reviewing and commenting on the requests, I try to limit the first discussions to one active discussion at a time. If your EV audit is completed before your public discussion begins, then we can include the EV enablement request at that time, as long as all of the information listed in Comment #36 has been provided.
Reporter | ||
Comment 43•14 years ago
|
||
Hi Kathleen here you are the two things you asked me for: website whose SSL cert chains up to this root. Need url to a website whose SSL cert chains up to this root. https://server1.camerfirma.com:8081/ https://server2.camerfirma.com:8082/ Translations into English of the sections of CP/CPS and/or RA Operating manual having to do with verification of identity/organization, domain name ownership, and email address ownership. From: CPS V3.1.2 3.1.8 Personal and Organization identity Authentication and his relationship. SSL Certificates Section: Certificate subscript identity existence is validated against the Internet Domains Data Bases. Afterwards the organization existence associates with this domain must be checked against the Companies Register Data Bases (Spanish Chambers of Commerce Data Base). Finally the RA operator will send the certificate to the administrative contact and technical contact included in the Internet domain data base. From the Operating Manual v1.0 Digital Certificate Generation Process. (section) From the RA application we get: URL to be certified, Organization Vat number identification, Digital certificate validity Applicant mail address. Before approve the request we must: Be assured of the organization existence, by means of one of these methods: a) Spanish Administration TAX Data Base. b) Chambers of Commerce Data Base. c) Spanish Companies Register Data Base. Be assured that the certificates is paid Be assured that the domain exists and is linked with the organization previously verified consulting the Internet Domain Data Bases. http://www.networksolutions.com http://www.gandi.net http://www.interdomain.com http://www.nic.es http://www.nominalia.com
Assignee | ||
Comment 44•14 years ago
|
||
Thank you for the information. > website whose SSL cert chains up to this root. Need url to a website whose SSL > cert chains up to this root. > https://server1.camerfirma.com:8081/ > https://server2.camerfirma.com:8082/ https://server1.camerfirma.com:8081/ The CRL Distribution Point of the SSL cert for https://server1.camerfirma.com:8081/ provides two urls: http://crl.camerfirma.com/camerfirma_cserver-2009.crl http://crl1.camerfirma.com/camerfirma_cserver-2009.crl The CRL Distribution Point of the SSL cert for https://server2.camerfirma.com:8082/ also provides two urls: http://crl.camerfirma.com/racer-2009.crl http://crl1.camerfirma.com/racer-2009.crl NextUpdate for all of these urls is 3 months. CPS version 3.1.1 section 4.5.9: Certification Authority will issue a new CRL immediately after a change in the CRL content and at least once a day in case of no change is produced. If the CRLs are issued at least once a day, should the NextUpdate be closer to a day? When I don’t enforce OCSP, both of the test sites work fine in Firefox. However, when I enforce OCSP in Firefox, I get the following error for both sites: Invalid OCSP signing certificate in OCSP response. (Error code: sec_error_ocsp_invalid_signing_cert) Would you please try this, to see if you get the same error. If you do get the error, please see if you can resolve. One possibility is that the signing cert does not chain up to the root, which is one of the potentially problematic practices. > From: CPS V3.1.2 What is the url for V3.1.2 of the CPS? > From the Operating Manual v1.0 Is the Operating Manual a publicly available document? If so, please provide the URL. Is the Operating Manual included in the audit?
Reporter | ||
Comment 45•14 years ago
|
||
> website whose SSL cert chains up to this root. Need url to a website whose SSL > cert chains up to this root. > https://server1.camerfirma.com:8081/ > https://server2.camerfirma.com:8082/ https://server1.camerfirma.com:8081/ The CRL Distribution Point of the SSL cert for https://server1.camerfirma.com:8081/ provides two urls: http://crl.camerfirma.com/camerfirma_cserver-2009.crl http://crl1.camerfirma.com/camerfirma_cserver-2009.crl The CRL Distribution Point of the SSL cert for https://server2.camerfirma.com:8082/ also provides two urls: http://crl.camerfirma.com/racer-2009.crl http://crl1.camerfirma.com/racer-2009.crl NextUpdate for all of these urls is 3 months. CPS version 3.1.1 section 4.5.9: Certification Authority will issue a new CRL immediately after a change in the CRL content and at least once a day in case of no change is produced. If the CRLs are issued at least once a day, should the NextUpdate be closer to a day? Yes, at the moment these CAs are not issuing certificates so we keep a CRL for 3 month, when we begin to issue certificates we will issue a dayly CRL. When I don’t enforce OCSP, both of the test sites work fine in Firefox. However, when I enforce OCSP in Firefox, I get the following error for both sites: Invalid OCSP signing certificate in OCSP response. (Error code: sec_error_ocsp_invalid_signing_cert) Would you please try this, to see if you get the same error. If you do get the error, please see if you can resolve. One possibility is that the signing cert does not chain up to the root, which is one of the potentially problematic practices. Yes, we will include this new CAs in our OCSP responder to avoid this problem. > From: CPS V3.1.2 What is the url for V3.1.2 of the CPS? it is no published yet, surelly we will publish the v3.1.4 instead. Anyway no changes have benn made in this point. > From the Operating Manual v1.0 Is the Operating Manual a publicly available document? If so, please provide the URL. No is an internal document. Is the Operating Manual included in the audit? Yes.
Assignee | ||
Comment 46•14 years ago
|
||
Thanks.
>> when I enforce OCSP in Firefox, I get the following error for both sites:
>> Invalid OCSP signing certificate in OCSP response.
>> (Error code: sec_error_ocsp_invalid_signing_cert)
> Yes, we will include this new CAs in our OCSP responder to avoid this problem.
Please let me know when the change has happened.
Reporter | ||
Comment 47•14 years ago
|
||
Hi Kathleen this OCSP issue is taking us more time than expected. I hope this problen doesn´t delay our accreditation, does it ? best regards Ramiro
Assignee | ||
Comment 48•14 years ago
|
||
No. Everything else is complete, so you're still in the queue for public discussion: https://wiki.mozilla.org/CA:Schedule#Queue_for_Public_Discussion There are 12 requests ahead of yours, and each request takes at least one to two weeks. So it'll be a while before your request enters into public discussion.
Comment 49•14 years ago
|
||
Kathleen, are you saying that this CA can be admitted to the root CA list even while this OCSP problem remains outstanding?
Comment 50•14 years ago
|
||
Obviously not and it would be a waste of time. The CA should be put into the queue after having all outstanding issues verifiable solved.
Reporter | ||
Comment 51•14 years ago
|
||
OK Kathleen we will priorize this task to have this problem resolve as soon as posible. Thank you for your quick answer. Ramiro
Assignee | ||
Comment 52•14 years ago
|
||
> Kathleen, are you saying that this CA can be admitted to the root
> CA list even while this OCSP problem remains outstanding?
No, I'm saying that according to the queue for public discussion it will be at least 3 months before this request can get into public discussion. As long as the OCSP issue is fixed before then, it will not delay the discussion.
Reporter | ||
Comment 53•14 years ago
|
||
Hi Kathleen, We think the OCSP problem is already resolved. Please can you confirm this ?
Assignee | ||
Comment 54•14 years ago
|
||
I just tried it again, and it's still failing for me. For both of the test websites https://server1.camerfirma.com:8081/ https://server2.camerfirma.com:8082/ They work when I don't have OCSP enforced. However, if I go to Tools->Options->Validation and select the box for "When an OCSP server connection fails, treat the certificate as invalid" then reload the page for one of the test websites, I get the error Invalid OCSP signing certificate in OCSP response. (Error code: sec_error_ocsp_invalid_signing_cert) Does it work for you?
Reporter | ||
Comment 55•14 years ago
|
||
We have included the new CA root certificates in our OCSP responder and this works fine when I select in Tools->Options->Validation "validate if a OCSP server is found" or "validate all certificates with ocsp.camerfirma.com"...but, yes, I can reproduce this error when I select "When an OCSP server connection fails, treat the certificate as invalid". Maybe because of the basic constrains extention in the certificate which is signing the OCSP response. It is mark as a end user certificate. Can you inform me about the certificate extention value are you expecting ?
Reporter | ||
Comment 56•14 years ago
|
||
This certificate is needed to validate the AC Camerfirma OCSP responses.
Reporter | ||
Comment 57•14 years ago
|
||
Kathleen please try to include the Intermediate CA in the certificate store. As happend in SSL conexion the OCSP responses have a intermediate CA. If this works we should include the ca intermediate certificate in the ocsp responses. regards Ramiro
Reporter | ||
Comment 58•14 years ago
|
||
I have found this remark in the Mozila wiki section. Does That means that we can not sign the ocsp responses with a certificate diferent from the Ca who has issued the certificate ??. Regards "OCSP Responses signed by a certificate under a different root: When an OCSP responder URL is included in end-entity certificates, Firefox 3 will by default attempt to check the certificate’s status via OCSP. If the OCSP signer certificate is not the certificate of the CAthat issued the certificate in question and is not issued by the CAthat issued the certificate in question the OCSP check will fail with an NSS error code for OCSP, such as SEC_ERROR_OCSP_UNAUTHORIZED_REQUEST or SEC_ERROR_OCSP_UNAUTHORIZED_RESPONSE."
Reporter | ||
Comment 59•14 years ago
|
||
Kathleen can you try https://www.camerfirma.com this website is signed by the actual root keys and the ocsp response is signed as the Mozilla rules states. regards
Comment 60•14 years ago
|
||
Ramiro, please read RFC 2560, sections 2.2, 2.6, 3.2 and 4.2.2.2. These define the requirements for the OCSP response signer's certificate and certificate chain. NSS enforces these requirements exactly.
Reporter | ||
Comment 61•14 years ago
|
||
Kathleen Crystal clear. We are going to issue a new certificate to sign OCSP responses signed by the CA who issue the SSL certificate, I hope this solve the problem. Thank you
Reporter | ||
Comment 62•14 years ago
|
||
Kathleen can you try again https://www.camerfirma.com if this works, we will include this solution in the new keys OCSP responder. Regards
Assignee | ||
Comment 63•14 years ago
|
||
Yes, I can now go to https://www.camerfirma.com when I have OCSP enforced.
Reporter | ||
Comment 64•14 years ago
|
||
OK, Kathleen we will nown configure the ocsp responder for the new CAs in orther to check correctly the test URL. I will let you know it when it was ready. Thank you
Reporter | ||
Comment 65•14 years ago
|
||
Kathleen, there is any way to force an OCSP cache cleaning in firefox ??
Comment 66•14 years ago
|
||
> [is there] any way to force an OCSP cache cleaning in firefox ??
Restart the browser.
Reporter | ||
Comment 67•14 years ago
|
||
Hi Kathleen, we have made changes in the OCSP responder for https://server1.camerfirma.com:8081 ...etc Please can you check it? We get different responses; we think is because of the browser cache. We restart the browser but we found the same responses. There is another way to get assured that the cache is cleaned?
Assignee | ||
Comment 68•14 years ago
|
||
I am still getting OCSP errors when I try the test sites, even though I had cleared my cache and restarted Firefox. I even deleted all of the Camerfirma CAs and re-imported them. I found that the test websites are not set up to auto-discover their hierarchy, and I had to manually import the intermediate CAs. Can you also fix this? I think it's a webserver configuration. https://server1.camerfirma.com:8081/ For this website to load I had to manually import the “Camerfirma Corporate Server - 2009” intermediate CA. https://server2.camerfirma.com:8082/ For this website to load I had to manually import the “AC Camerfirma - 2009” intermediate CA and the “RACER - 2009” intermediate CA. For both sites when I enforce OCSP and reload the page I get the following error: Secure Connection Failed An error occurred during a connection to server2.camerfirma.com:8082. security library: invalid arguments. (Error code: sec_error_invalid_args)
Reporter | ||
Comment 69•14 years ago
|
||
Kathleen we have included the intermediate CA in our server. Please can you check the test URL again ? Thank you Rergards Ramiro
Assignee | ||
Comment 70•14 years ago
|
||
Both test websites work now, even when I enforce OCSP.
Whiteboard: EV, information incomplete → EV - Information Confirmed Complete
Assignee | ||
Comment 71•14 years ago
|
||
Ramiro, Camerfirma’s root inclusion request is almost to the top of the queue for public discussion. https://wiki.mozilla.org/CA:Schedule#Queue_for_Public_Discussion From Comment #41: “We are at the moment running our EV audit…” If the EV audit has completed, please post a url to the audit statement (or attach it to this bug). This will allow us to include EV enablement in this same request. Also, do you happen to have a more recent WebTrust CA audit report? The one I have is from late 2008, so just over a year old. In Comment #45: “at the moment these CAs are not issuing certificates so we keep a CRL for 3 months, when we begin to issue certificates we will issue a daily CRL.” Is this still the case?
Reporter | ||
Comment 72•14 years ago
|
||
Hi Kathleen we have finished out EV audit, we are right now waiting the auditor statement. I have planned to send it to you next week. Yes, our current webtrust audit is from 2008. We are starting the renewal process. Yes, The CAs do not issue certificates at the moment, we are planning a controlled substitution from the actual CA during this year. Regards Ramiro
Reporter | ||
Comment 73•14 years ago
|
||
Hi Kathleen here you are the link to the auditor statement. Sorry, only available in spanish so far. http://docs.camerfirma.com/mod_web/usuarios/pdf/Informe_agrupado_Camerfirma_WebTrust_EV.pdf regards Ramiro
Assignee | ||
Comment 74•14 years ago
|
||
> Yes, our current webtrust audit is from 2008. We are starting the renewal process. OK > Yes, The CAs do not issue certificates at the moment, we are planning a controlled substitution from the actual CA during this year. OK > we have finished our EV audit Great! If you would like to included ev-enablement in this request, please provide the following: 1) The URL(s) to the Policy documentation for EV-enabled certificates. 2) Translation of the text from the corresponding CP/CPS that describes the organization and domain name validation procedures for EV-enabled certificates. 3) The EV Policy OID 4) A test website whose EV SSL certificate chains up to the root. (for each root) 5) Translation of the text from the corresponding CP/CPS relating to EV guidelines for CRLs: "CRLs MUST be updated and reissued at least every seven days, and the nextUpdate field value SHALL NOT be more ten days;" 6) Translation of the text from the corresponding CP/CPS relating to EV guidelines for OCSP: “If the CA provides revocation information via an Online Certificate Status Protocol (OCSP) service, it MUST update that service at least every four days. OCSP responses from this service MUST have a maximum expiration time of ten days.” 7) Translation of the EV audit report into English (I can't seem to copy-paste the text from the audit report you provided, so I can't use Google-Translate.) 8) Is the EV audit report going to be posted on cert.webtrust.org? If not, I'll have to independently contact the auditor to confirm the authenticity of the audit report, so I'll need an email address to the appropriate person at Ernst & Young.
Reporter | ||
Comment 75•14 years ago
|
||
Hi Kathleen I going to answer some of your questions : Points 1),2),5),6),7) I will prepare it Point 3) We issue a comomn OID for Chambers of Commerce ROOT 2008 EV = 1.3.6.1.4.1.17326.10.14.2.*.* and for Chambersign GLobal ROOT 2008 EV= 1.3.6.1.4.1.17326.10.8.12.*.* In both hierarquies we use the last 2 digits for identify the Private Key management: 1.1 Private key generated stored in a software device and generated by the CA 1.2 Private key generated stored in a software device and generated by the User 2.1 Private key generated stored in a SSCD device and generated by the CA 2.2 Private key generated stored in a SSCD device and generated by the User Point 4) You can use the links I previosly sent to you https://server1.camerfirma.com:8081/ https://server2.camerfirma.com:8082/ Point 8) Ernst&Young contact Ángel Izquierdo Esteban Telf: +34 91 572 7273 | Fax: +34 91 572 7460 Mail: Angel.IzquierdoEsteban@es.ey.com Regards Ramiro
Assignee | ||
Comment 76•14 years ago
|
||
Thank you for the information. I will contact the auditor. For the EV Policy OIDs, is it ever the case that the ending two digits will be anything but 1.2 for EV SSL certificates?
Reporter | ||
Comment 77•14 years ago
|
||
the 1.2 is the most usual option, is it a EV requirement ? Sorry the Policy OID marked with EV is the end user certificate policy OID or the Root Certificate policy OID ?
Assignee | ||
Comment 78•14 years ago
|
||
For some reason I have the following in my InfoGathering Document in regards to the Potentially Problematic Practice about CAs generating key-pairs for subscribers: "AC Camerfirma only accept PKCS10 request for SSL certificates." So then it would seem that 1.1 and 2.1 would not be relevant for SSL certs.
Reporter | ||
Comment 79•14 years ago
|
||
Hi Kathleen you are right. the relevants ones are 1.2 and 2.2, the keys are generated by the user in a sofware environment or a SSCD environment. Regards
Reporter | ||
Comment 80•14 years ago
|
||
Hi Kathleen our audit report in english. http://docs.camerfirma.com/mod_web/usuarios/pdf/Informe_agrupado_Camerfirma_EV_English.pdf Regards
Assignee | ||
Comment 81•14 years ago
|
||
I have received email from the auditor confirming that Ernst & Young did indeed issue the auditor’s statement at the URL in Comment #73. The auditor also confirmed that this audit statement covers the “Chambers of Commerce Root - 2008” and “Global Chambersign Root – 2008” roots and their corresponding CA hierarchies.
Assignee | ||
Comment 82•14 years ago
|
||
Hi Ramiro, Do you have updates in regards to the following items from Comment #74? 1) The URL(s) to the Policy documentation for EV-enabled certificates. 2) Translation of the text from the corresponding CP/CPS that describes the organization and domain name validation procedures for EV-enabled certificates. 5) Translation of the text from the corresponding CP/CPS relating to EV guidelines for CRLs: "CRLs MUST be updated and reissued at least every seven days, and the nextUpdate field value SHALL NOT be more ten days;" 6) Translation of the text from the corresponding CP/CPS relating to EV guidelines for OCSP: “If the CA provides revocation information via an Online Certificate Status Protocol (OCSP) service, it MUST update that service at least every four days. OCSP responses from this service MUST have a maximum expiration time of ten days.” Regards, Kathleen
Reporter | ||
Comment 83•14 years ago
|
||
Sorry for the delay Kathleen. I will send this info to you in a couple of days. Regards
Reporter | ||
Comment 84•14 years ago
|
||
Hi Kathleen Point 1 ----------------------------------- http://www.camerfirma.com/mod_web/usuarios/pdf/PC_Camerfirma_Corporate_Server_EV_1_0.pdf Point 2 ----------------------------------- 4.3 Cretificate issuing process. a) Before starting the issuing process, the AC should inform the subscriber of the terms and conditions for the use of the certificate. b) The AC should transmit this information through a perdurable communication channel, capable of being transmitted electronically and in a comprehensive language. c) The AC should check: • The existence of the organization, checking in public registries. • Checking the identity of the applicant or authorized person through supporting documents. The documentation will be handled personally in an AC Camerfirma registration office. Physical presence could be substituted for an online application signed with a valid and recognized certificate and for those other options approved by the current legislation. • That the organization has the control in the uses of the domain through consultation in the registries of domain. d) The applicant’s address and other contact details should be facilitated. e) The AC should comply with all the requirements imposed by the data protection legislation. Point 5 ------------------------------ 4.5.8 Emission frequency of CRL´S. The AC will provide the certificate revocation information through the CRL. The AC will publish and update the CRL at least once weekly and keeping it published for 10 days. Point 6 -------------------------------- 4.5.10 Availability of the online revocation status checking. The AC provides an online certificate status consultation service based in the OCSP protocol. This service will be updated at least every 4 days. The OCSP responses to this service should have a valid period of 10 days.
Assignee | ||
Comment 85•14 years ago
|
||
Assignee | ||
Comment 86•14 years ago
|
||
I am now opening the first public discussion period for this request from AC Camerfirma to add two root certificates: “Chambers of Commerce Root – 2008” and “Global Chambersign Root – 2008”. The request is to enable all three trust bits for both roots. The request is to also enable EV for both roots. For a description of the public discussion phase, see https://wiki.mozilla.org/CA:How_to_apply#Public_discussion Public discussion will be in the mozilla.dev.security.policy newsgroup and the corresponding dev-security-policy@lists.mozilla.org mailing list. http://www.mozilla.org/community/developer-forums.html https://lists.mozilla.org/listinfo/dev-security-policy news://news.mozilla.org/mozilla.dev.security.policy The discussion thread is called “Camerfirma Root Inclusion Request” Please actively review, respond, and contribute to the discussion. A representative of the CA should promptly respond directly in the discussion thread to all questions that are posted.
Whiteboard: EV - Information Confirmed Complete → EV - In Public Discussion
Comment 87•14 years ago
|
||
I have reviewed the information above and cannot see any concerns. I initially saw the 180 day CRL for end entity certificates as a problem, however this seems to have been addressed later in the application and considering the Firefox preference to use OCSP this should be fine. Kind Regards Steve Roylance (GlobalSign)
Comment 88•14 years ago
|
||
Steve, discussions are held at the mailing list, not in the bug. Would you mind adding your comments at the dev-security-policy@lists.mozilla.org list where the actually action (should) happen? :-)
Assignee | ||
Comment 89•14 years ago
|
||
The public discussion for this request is now closed. This request from Camerfirma is to add two root certificates (“Chambers of Commerce Root – 2008” and “Global Chambersign Root – 2008”) and enable all three trust bits for both roots. The request is to also enable EV for both roots. The discussion resulted in the following action items. ACTION Camerfirma: Update the CP/CPS documents to provide more specific information about how the domain registration services databases are used to verify that the certificate subscriber owns/controls the domain name to be included in the certificate. Post link to the updated CPS in this bug. ACTION Kathleen: After Camerfirma updates this bug with a link to the updated CPS, confirm that the clarifications were added as per the discussion. Then post recommendation for approval in this bug.
Whiteboard: EV - In Public Discussion → EV - Public Discussion Action Items - Update CPS
Reporter | ||
Comment 90•14 years ago
|
||
Hi Kathleen sorry for the delay. A new version of our CPS is published http://www.camerfirma.com/mod_web/usuarios/politicas/CPS_V_3_2_1.pdf Regards Ramiro
Assignee | ||
Comment 91•14 years ago
|
||
Attached is the translation of section 3.1.8 of the updated CPS. I have confirmed that the updates that were recommended during the discussion have been incorporated. This completes Camerfirma's action item as per comment #89. I will proceed with posting my recommendation to approve this request.
Assignee | ||
Comment 92•14 years ago
|
||
This request has been evaluated as per sections 1, 5 and 15 of the official CA policy at http://www.mozilla.org/projects/security/certs/policy/ Here follows a summary of the assessment. If anyone sees any factual errors, please point them out. To summarize, this assessment is for the request from Camerfirma to add two root certificates: “Chambers of Commerce Root – 2008” and “Global Chambersign Root – 2008”. The request is to enable all three trust bits for both roots. The request is to also enable EV for both roots. Section 4 [Technical]. I am not aware of any technical issues with certificates issued by Camerfirma, or of instances where they have knowingly issued certificates for fraudulent use. If anyone knows of any such issues or instances, please note them in this bug report. Section 6 [Relevancy and Policy]. Camerfirma appears to provide a service relevant to Mozilla users: they are a Regional CA in Spain, and the CA for Chambers of Commerce in Spain Policies are documented in the documents published on their website and listed in the entry on the pending applications list. The main documents of interest are the CPS and the CP for each type of certificate. The documents are in Spanish, and English translations of parts of the documents have been provided. Camerfirma Document Repository: http://policy.camerfirma.com/ CPS: http://www.camerfirma.com/mod_web/usuarios/politicas/CPS_V_3_2_1.pdf CP for Express Corporate Server: http://policy.camerfirma.com/politicas/PC_Camerfirma_Express_Corporate_Server_1_0_1.pdf CP for Corporate Server EV: http://www.camerfirma.com/mod_web/usuarios/pdf/PC_Camerfirma_Corporate_Server_EV_1_0.pdf CP for Code Signing: http://policy.camerfirma.com/politicas/PC_Camerfirma_CodeSign_1_0_1.pdf Section 7 [Validation]. Camerfirma appears to meet the minimum requirements for subscriber verification, as follows: * Email: Camerfirma’s process for requesting and issuing encryption certificates requires communication via the email address to be included in the certificate. For signing end user certificates physical presence is required, id card and an authorisation of a enterprise representative. All other communications are made by means of email. * Code: Camerfirma requires identification of the subscribing company and its representative as described in the CPS and in the CP for Code Signing. * SSL: Camerfirma verifies domain control by comparing the data in the certificate application with the data retrieved from a public database of Internet domains as listed in section 3.1.8 of the CPS. Email is also sent to the administrative and technical contacts of the domain to be included in the certificate, as found from querying a publicly available Internet domains database. * EV SSL: Camerfirma verifies the organization identity and the organization’s ownership/control of the domain name as per section 3.1.8 of the CPS and as per the CP for Corporate Server EV. * EV Policy OID: Camerfirma requests two EV Policy OIDS for each root. ** Chambers of Commerce Root – 2008 *** 1.3.6.1.4.1.17326.10.14.2.1.2 for non SSCD keys and *** 1.3.6.1.4.1.17326.10.14.2.2.2 for SSCD keys ** Global Chambersign Root – 2008 *** 1.3.6.1.4.1.17326.10.8.12.1.2 for non SSCD keys and *** 1.3.6.1.4.1.17326.10.8.12.2.2 for SSCD keys ** If testing determines that it is problematic to have two EV Policy OIDs for a root, then Camerfirma would choose to use the non SSCD keys OID. Section 8-10 [Audit]. Camerfirma is audited by Ernst & Young according to the WebTrust CA and WebTrust EV criteria. The WebTrust CA audit report from the end of 2008 is posted on the webtrust.org website (https://cert.webtrust.org/ViewSeal?id=874). The WebTrust EV audit that was completed in 2009 was provided by Camerfirma. I exchanged email with the auditor at Ernst & Young, and the auditor confirmed that the WebTrust EV audit statement is authentic and that it covers these two roots. Spanish: http://docs.camerfirma.com/mod_web/usuarios/pdf/Informe_agrupado_Camerfirma_WebTrust_EV.pdf English: http://docs.camerfirma.com/mod_web/usuarios/pdf/Informe_agrupado_Camerfirma_EV_English.pdf Section 13 [Certificate Hierarchy]. http://www.camerfirma.com/mod_web/repositorio/otrascas.html * The “Chambers of Commerce Root – 2008” root will have internally-operated subordinate CAs: Express Corporate Server for SSL certificates; Corporate Server EV; CodeSign; TSA for Time Stamping process that issues TSU certificates; and AC Camerfirma, Certificados Camerales which issues certificates for end entities (Enterprise certificates for employees and representatives). ** Chambers of Commerce act as RAs for end user registration. * The “Global Chambersign Root – 2008” root will have internally-operated subordinate CAs that issue certificates for general use globally. There is currently an intermediate CA called AC Camerfirma which signed a sub-CA called RACER. This 2nd level Intermediate CA issues certificates for citizens and enterprise employees and representatives. ** Other companies act as RAs for end user registration. Other: * CRL: ** Chambers of Commerce Root – 2008 ARL: http://crl.camerfirma.com/root_chambers_2008.crl ** End-entity CRL for server certs: http://crl.camerfirma.com/camerfirma_cserver-2009.crl ** Global Chambersign Root – 2008 ARL: http://crl.camerfirma.com/root_chambersign_2008.crl ** End-entity CRL for server certs: http://crl.camerfirma.com/racer-2009.crl ** NextUpdate for the end-entity CRLs for both roots is currently 3 months. “at the moment these CAs are not issuing certificates so we keep a CRL for 3 months, when we begin to issue certificates we will issue a daily CRL.” ** CP Server EV section 4.5.8: The CA will publish and update the CRL at least once weekly and keeping it published for 10 days. * OCSP: http://ocsp.camerfirma.com ** CP Server EV section 4.5.10 This service will be updated at least every 4 days. The OCSP responses to this service should have a valid period of 10 days. Based on this assessment I intend to approve this request from Camerfirma to add the “Chambers of Commerce Root – 2008” and “Global Chambersign Root – 2008” root certificates, enable all three trust bits for both roots, and enable EV for both roots.
Whiteboard: EV - Public Discussion Action Items - Update CPS → EV - Pending Approval
Assignee | ||
Comment 93•14 years ago
|
||
To the representatives of Camerfirma: Thank you for your cooperation and your patience. To all others who have commented on this bug or participated in the public discussion: Thank you for volunteering your time to assist in reviewing this CA request. As per the summary in Comment #92, and on behalf of the Mozilla project I approve this request from Camerfirma to include the following root certificates in Mozilla, with trust bits set as indicated, and to enable EV for both roots. * Chambers of Commerce Root - 2008 (web sites, email, code signing) * Global Chambersign Root - 2008 (web sites, email, code signing) I will file the NSS and PSM bugs to effect the approved changes.
Whiteboard: EV - Pending Approval → EV - Approved - awaiting NSS and PSM
Assignee | ||
Comment 94•14 years ago
|
||
I have filed bug 562395 against NSS and bug 562399 against PSM for the actual changes.
Reporter | ||
Comment 95•13 years ago
|
||
Thank you so much for your work Kathleen. Best Regards Ramiro
Assignee | ||
Updated•13 years ago
|
Whiteboard: EV - Approved - awaiting NSS and PSM → EV - In FF4Beta - awaiting PSM
Assignee | ||
Updated•13 years ago
|
Status: ASSIGNED → RESOLVED
Closed: 13 years ago
Resolution: --- → FIXED
Whiteboard: EV - In FF4Beta - awaiting PSM → EV - In FF4Beta
Comment 96•7 years ago
|
||
EV audit info
Updated•7 years ago
|
Product: mozilla.org → NSS
Updated•11 months ago
|
Product: NSS → CA Program
You need to log in
before you can comment on or make changes to this bug.
Description
•