Closed Bug 511380 Opened 15 years ago Closed 10 years ago

Add NIC (India) Root CA Certificate

Categories

(CA Program :: CA Certificate Root Program, task)

task
Not set
normal

Tracking

(Not tracked)

RESOLVED WONTFIX

People

(Reporter: nic123ca, Assigned: kathleen.a.wilson)

References

Details

(Whiteboard: Public Discussion Action Items - Update CPS)

Attachments

(10 files)

User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.2) Gecko/20090729 Firefox/3.5.2 Build Identifier: 1. General information about the CA’s associated organization (i.e., the company, nonprofit organization, or government agency operating the CA) 1. Name – National Informatics Centre 2. Website URL – https://nicca.nic.in 3. Organizational type – Government 4. Primary market / customer base – Issued to subscribers in the Government, PSU, Statutory Bodies, and Govt. Registered Companies in India. 2. For each root CA whose certificate is to be included in Mozilla (or whose metadata is to be modified): 1. The name of the root CA – NIC Certifying Authority 2. The root CA certificate – https://nicca.nic.in 3. The X.509 certificate version – Version 3 4. SHA-1 fingerprint - 48 22 82 4e ce 7e d1 45 0c 03 9a a0 77 dc 1f 8a e3 48 9b bf 5. Type of signing key - RSA 6. Signing key parameters - 2048 bits 7. Valid from (YYYY-MM-DD) - Monday, July 02, 2007 12:11:59 PM 8. Valid to (YYYY-MM-DD) - Saturday, July 04, 2015 12:00:00 PM 9. A description of the PKI hierarchy rooted at or otherwise associated with this root CA certificate, including: 1. A list (or summary description) of CAs with certificates signed by this root – NICCA - Sub-CA for e-passport 2. A list of any other root CAs that have issued cross-signing certificates for this root CA- No 3. The extent and nature of contractual and technical controls exercised over subordinate CAs – Sub-CAs are created for different organizations and agencies, for ease of operations and management. Sub-CAs are created purely in a technical context, to be part of the NICCA’s technical infrastructure. The keys created for Sub-Ca are located only on NICCA’s technical infrastructure. 1. Whether or not subordinate CAs are constrained to issue certificates only within certain domains. Sub-CAs can issue Certificates only in the specified domain for which the sub-CA has been created. Agencies for whom the Sub-CAs are created have to be reflected in the corresponding certificate as ‘NICCA – Sub-CA for <name of agency for whom Sub-CA has been set up>’. 2. Whether or not subordinate CAs can create their own subordinates. No. The certificate issuing authority for the Sub-CA always remains only with NICCA. 4. The extent and nature of audits performed against subordinate CAs, including –NICCA - Sub-CA for e-passport 1. Whether or not subordinate CAs are included within the scope of any audit(s) done against the root CA. 2. Whether or not subordinate CAs are subject to third-party audits independent of any audit(s) done against the root CA. 3. The frequency at which any audit(s) for subordinate CAs are done. 10. Whether certificates are issued for any of the following purposes within the hierarchy rooted at this root CA certificate: 1. Certificates usable for enabling web or other servers to support SSL/TLS connections. Yes 2. Certificates usable for signing and encrypting email messages e.g., using S/MIME). Yes 3. Certificates usable for digitally signing executable code objects. Yes 11. If SSL certificates are issued within the hierarchy rooted at this root CA certificate: 1. Whether or not the domain name referenced in the certificate is verified to be owned/controlled by the certificate subscriber - Yes 2. Whether or not the value of the Organization attribute is verified to be that associated with the certificate subscriber - Yes 3. Whether verification of the certificate subscriber conforms to the Extended Validation Certificate Guidelines issued by the CAB Forum – Not issued 12. If email certificates are issued within the hierarchy rooted at this root CA certificate: 1. Whether or not the email account associated with the email address in the certificate is verified to be owned/controlled by the certificate subscriber – Yes verification is done 2. Whether or not the identity information in the certificate is verified to be that of the certificate subscriber - Yes verification is done 13. If code signing certificates are issued within the hierarchy rooted at this root CA certificate, whether or not the identity information in the certificate is verified to be that of the certificate subscriber – Yes verification is done 14. If EV certificates are issued within the hierarchy rooted at this root, the EV policy OID(s) associated with those EV certificates – Not issued 15. Example certificate(s) issued within the hierarchy rooted at this root, including the full certificate chain(s) where applicable – Examples will be included at the time of submission (There should be at least one example certificate for each of the major types of certificates issued, e.g., email vs. SSL vs. code signing, or EV vs. OV vs. DV. For SSL certificates this should also include URLs of one or more web servers using the certificate(s).) 16. Whether or not the validity of end entity and CA certificates issued within the hierarchy rooted at this root may be verified using Certificate Revocation Lists (CRLs) and, if so, the URL(s) at which the CRL(s) may be obtained – https://nicca.nic.in/crl_2783.crl 17. Whether or not the validity of end entity and CA certificates issued within the hierarchy rooted at this root may be verified using the Online Certificate Status Protocol (OCSP) and, if so, the URL(s) for the associated OCSP responder(s) – Currently not provided 18. The maximum time elapsing from the revocation of an end entity or CA certificate until CRLs and/or OCSP responders are updated to reflect that revocation – CRL updated immediately after the suspension/revocation 19. The published document(s) describing how certificates are issued within the hierarchy rooted at this root, as well as other practices associated with the root CA and other CAs in the hierarchy, including in particular the Certification Practice Statement(s) (CPS) and related documents – https://nicca.nic.in/pdf/niccacps.pdf 20. The published document(s) relating to independent audit(s) of the root CA and any CAs within the hierarchy rooted at the root. (For example, for WebTrust for CAs audits this would be the "audit report and management assertions" document available from the webtrust.org site or elsewhere.) – not publicly available Reproducible: Always
Accepting this bug, and starting the Information Gathering and Verification phase as described at https://wiki.mozilla.org/CA:How_to_apply
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true
On the NIC website I found the zip file containing the certs as follows Download Certificate Chain (NICCA & CCA certs): http://nicca.nic.in/cert/chain.zip However, I am unable to extract the files from the .zip file. I get an error about unknown compression method. Would you please attach the NIC CA root cert to this bug? Use uncompressed, .crt or .cer format.
Thank you for your email. As desired by you, I am attaching the requisite file. However, before I proceed further, I would like to give you a brief background. National Informatics Centre(NIC), is a premier IT Organisation of the Department of Information Technology, Govt. of India, has been instrumental in steering Information and Technology applications in various Government Departments at Central, State and District levels. NIC has set up the state of art Certifying Authority (NICCA) in May, 2003, under license from the Controller of Certifying Authorities (CCA). The Government of India established the CCA, under section 17 of the Information Technology (IT) Act 2000, an Act which was passed by the Indian Parliament in June 2000. The Act defines the legal and administrative framework for establishment of a Public Key Infrastructure (PKI) in the country for creating trust in the electronic environment. The CCA is the apex regulatory body to issue license to Certifying Authorities, in accordance with the provisions of the IT Act 2000. CCA has set up the The Root Certifying Authority of India (RCAI), which is at the root of trust in the hierarchical PKI established in the country. The Certifying Authorities, which meet the requisite criteria specified in the IT Act 2000, are issued licenses to operate by CCA and come under the RCAI. As on date, there are eight CAs that are operating under RCAI in India and NICCA is one of them. Having given you this brief background, I am attaching the file which contains the NICCA trust chain i.e. both the NICCA Certificate and the CCA Root Certificate. Best Regards, Prateek Kr Saha Chief Operations Manager, NICCA
Attached file NICCA certificate
I am attaching both NICCA Certificate and the CCA Root Certificate for the complete trust chain.
Attached file CCA Root Certificate
I am attaching both NICCA Certificate and the CCA Root Certificate for the complete trust chain.
It looks like “CCA India 2007” is the root certificate, and “NIC Certifying Authority” is an intermediate CA. Mozilla only includes root certificates, not intermediate CAs. An official representative of the organization that operates the CCA root will need to request inclusion of the root.
We have the technical capability to treat any CA certificate as a trust anchor, whether it's a root or not. So, in cases where a root does not qualify under Mozilla's policy, or chooses not to apply, but a subordinate CA does qualify and does apply, it is feasible for Mozilla to go ahead an approve the cert for that subordinate CA to be treated like a root in Mozilla's trusted list. Now, some policy questions arise when considering such a case. For example: 1) if a subordinate CA applies for admission to Mozilla's list, and its superior root CA does not apply, how long should Mozilla wait before deciding to go ahead and and grant trust anchor status to the subordinate? I suppose these questions are best discussed in the policy discussion group.
We've discussed this in the past and the resolution is exactly as Nelson explained it. Some concerns could be raised, but none apply to this case IIRC. Therefore this request should enter the queue for public discussion after the normal procedures.
The contents of Comment #6 & Comment #7 has to be seen in the Indian context. I would like to point out that in the Indian PKI regime, NICCA is not an intermediate CA or Sub-CA, in the real sense. This is further explained in the following lines wherein I have tried to present the Indian PKI model. Controller of Certifying Authorities (CCA) is the government Licensing and Regulatory Authority, which has been set up under the Information Technology (IT) Act 2000. The IT Act was passed by the Indian Parliament in June 2000 and defines the legal and administrative framework for establishment of a PKI in the country. The Act requires that for a Digital Signature Certificate to be valid in an Indian court of law, it has to be issued by a Certifying Authority which has been licensed to operate by the CCA. CCA has set up the The Root Certifying Authority of India (RCAI), which is at the root of trust in the well established hierarchical PKI system in the country. The CCA issues license to a Certifying Authority only after overseeing and ensuring the compliance of the “Technical Requirements” and “Operating Standards” under the IT Act 2000, by the participating CA. These standards are at par with the existing international practices and a comparison between the audit program requirements of CCA and WebTrust shows a clear equivalence. As on date, there are eight CAs that are operating under RCAI in India and NICCA is one of them. So in the Indian PKI hierarchy, CCA operates a root CA, but technically it is a licensing body whose end entity is a CA only. It may please be noted that CCA does not issue certificates to individuals. Only the licensed CAs in India issue certificates to the general public and others, in accordance with the respective CA’s CPS. The point in Comment #7 for inclusion of CCA’s Certificate is well taken. It may be reiterated here that CCA is a facilitator for the proliferation of PKI technology in India and NICCA would approach CCA in due course with a request for enrolment of CCA’s Certificate in the firefox browser.
It sounds like I should go ahead with processing this request, assuming that it will be OK for the NICCA to be a trust anchor in Mozilla. CA Hierarchy: I am not quite clear on the CA-hierarchy below the NICCA. I saw that the NICCA signs a sub-CA for e-passport, but I’m not sure what that is. Does the NICCA sign end-entity certificates directly? Are there separate sub-CAs for each verification level/class? It looks like the main use of NICCA is to sign sub-CAs for other organizations for their own internal use within the domain for which the sub-CA was created. My understanding is that all of the sub-CAs under the NICCA are operated by NICCA, and not by any other third party. Section 7 of http://www.mozilla.org/projects/security/certs/policy/ The Policy Overview section in the CPS describes how the identity of the certificate subscriber is verified depending on the class/assurance level. Class 1 Verification Process: Simply Checks for the certainty of the details given in the DSC Request Form as authenticated by Head of Office Class 2 Verification Process: Checks for the certainty of the details given in the DSC Request Form as authenticated by Head of Applicant’s Organisation, which is further authenticated by HOD/SIO/DIO/ NICCoordinator. Applicant’s Organisation utilizes various procedures to obtain evidence in respect of identity of the applicants by way of documentary evidence of one of the items under point no 8 (Identification details), resulting in stronger assurance level. Class 3 Verification Process: In addition to the verification process required for the class II certificates, the subscriber’s of class III certificates are required to be personally present with some proof of identity at NICCA/RA, for issuance of DSC. Email For section 7a of the Mozilla CA Policy there also needs to be procedures for verifying that the email address that is to be referenced in the certificate is owned/controlled by the subscriber. I could not find the text in the CPS or DSC Request Form that explains the steps taken to verify that the certificate subscriber owns/controls the email address to be referenced in the certificate. Domain (SSL) For section 7b of the Mozilla CA Policy there also needs to be procedures for SSL certs in which it is verified that the domain to be referenced in the certificate is owned/controlled by the certificate subscriber. I could not find any text in the CPS or DSC Request Form that explains the steps taken to verify that the certificate subscriber owns/controls the domain name to be referenced in the certificate. Potentially Problematic Practices: http://wiki.mozilla.org/CA:Problematic_Practices Please review the list of potentially problematic practices and identify which ones may be applicable. For those, please provide further information. Audit I believe that the auditor requirements documented in the CPS also meet the requirements of the Mozilla CA Policy. What is the frequency of the audits? I understand that the audit report itself is not publicly available. Would it be possible to get a statement from the auditor saying when the last audit was performed and stating that the audit included all of the criteria for WebTrust CA?
1. CA hierarchy NICCA has only one Sub-CA which is e-passport. Sub-CAs are allowed to be created for different organizations and agencies, for ease of operations and management. However, Sub-CAs are created purely in a technical context, to be part of the NICCA’s technical infrastructure. The keys created for Sub-CA are located only on NICCA’s technical infrastructure. Agencies for whom the Sub-CAs are created, have to be reflected in the corresponding certificate as ‘‘NICCA – Sub-CA for <name of agency for whom Sub-CA has been set up>’’. The public key of the Sub-CA key pair shall be certified by NICCA’s key, which is in turn certified by CCA. The certificate issuing authority for the Sub-CA shall remain only with NICCA. There are no separate Sub-CAs for individual verification level/class. NICCA issues certificates directly to the users and user systems. 2. E-mail E-mail verification is done by the way of sending the user-id/password to the end-user to enable the submission of the Certificate Signing Request to NICCA system. This ensures that the person who has requested for the certificate, also has the control over the e-mail mentioned in the request form. 3. Domain (SSL) The current version of the CPS which is displayed on the website is NICCA CPS ver 4.3. Depending on the requirement, the CPS is revised from time to time and the next NICCA CPS ver 4.4 is due to be published shortly. Domain name verification procedure has been elaborated and clarity to certain other sections/sub-sections of the CPS have been incorporated in the NICCA CPS ver 4.4. However, there is an elaborate procedure for obtaining both internal and external approvals for authorizing the changes in the CPS of CA. The final approved version is expected to be available in about a week’s time and the same shall be put up on the NICCA website. 4. Audit The audit of NICCA is conducted annually by CCA accredited external auditor. An internal audit is also required to be done every six months. The audit report is not publicly available but a statement from the auditor stating when the last audit was performed and that the audit included all of the criteria for WebTrust CA, can be obtained at short notice, depending upon requirement. It has been stated in comment No.9 that The CCA issues license to a Certifying Authority only after overseeing and ensuring the compliance of the “Technical Requirements” and “Operating Standards” under the IT Act 2000, by the participating CA. These standards are at par with the existing international practices and a comparison between the audit program requirements of CCA and WebTrust shows a clear equivalence.
1. CA hierarchy > NICCA has only one Sub-CA which is e-passport. Sub-CAs are allowed to be > created for different organizations and agencies, for ease of operations and > management. Would you please provide a CA Hierarchy diagram showing both the current sub-CA and (in general terms) the possible future sub-CAs? This would probably answer my questions most efficiently. Eg: Will NICCA always have only one sub-CA? What does the e-passport sub-CA sign? Which CA signs end-entity certs? The SSL cert for the website https://nicca.nic.in looks to be signed directly by the NICCA. So does the NICCA sign end-entity certs directly? > However, Sub-CAs are created purely in a technical context, to be > part of the NICCA’s technical infrastructure. The keys created for Sub-CA are > located only on NICCA’s technical infrastructure. Agencies for whom the > Sub-CAs are created, have to be reflected in the corresponding certificate > as ‘‘NICCA – Sub-CA for <name of agency for whom Sub-CA has been set up>’’. > The public key of the Sub-CA key pair shall be certified by NICCA’s key, > which is in turn certified by CCA. So, is the way that the sub-CAs are handled for the NICCA different from typical CA hierarchies? Also, I have to raise the question again about which CA should be the trust anchor in Mozilla. Should it be the CCA or the NICCA? > The certificate issuing authority for the Sub-CA shall remain > only with NICCA. So when sub-CAs are created for other organizations, the NIC will still do the verification and issuance for the end-entity certs that those sub-CAs sign. Did I understand correctly? > There are no separate Sub-CAs for individual verification level/class. So the class (verification level) of an end-entity cert is determined solely by the Policy OID within the cert? > NICCA issues certificates directly to the users and user systems. Again, I think a diagram will be very useful, because I’m confused about the purpose of the e-passport sub-CA, and which CA(s) actually sign end-entity certs. 2. E-mail > E-mail verification is done by the way of sending the user-id/password to the > end-user to enable the submission of the Certificate Signing Request to NICCA > system. This ensures that the person who has requested for the certificate, > also has the control over the e-mail mentioned in the request form. Is it done this way for all class/verification levels? Is this procedure documented in a publicly available and audited document? 3. Domain (SSL) > The current version of the CPS which is displayed on the website is NICCA CPS > ver 4.3. Depending on the requirement, the CPS is revised from time to time and > the next NICCA CPS ver 4.4 is due to be published shortly. Domain name > verification procedure has been elaborated and clarity to certain other > sections/sub-sections of the CPS have been incorporated in the NICCA CPS ver > 4.4. However, there is an elaborate procedure for obtaining both internal and > external approvals for authorizing the changes in the CPS of CA. The final > approved version is expected to be available in about a week’s time and the > same shall be put up on the NICCA website. My interpretation of the current CPS is that all three of the class/verification levels can be used for issuing SSL certs. Is this correct? Will the documented procedures for verifying the domain name be specific to class/verification levels? Or will it be the same regardless of class/verification levels? 4. Audit > The audit report > is not publicly available but a statement from the auditor stating when the > last audit was performed and that the audit included all of the criteria for > WebTrust CA, can be obtained at short notice, depending upon requirement. Yes, that would be a great help in showing that the audit meets the requirements of the Mozilla CA Policy.
Attached image NICCA Hierarchy
1. CA hierarchy The diagram depicting NICCA hierarchy is attached. The SSL cert for the website https://nicca.nic.in looks to be signed directly by the NICCA. So does the NICCA sign end-entity certs directly? – Clarified in the diagram 2. E-mail NICCA issues Certificates to the subscribers in the Government, PSUs, Statutory Bodies, and Govt. Registered Companies in India. All details filled by the applicant in the DSC Application form, inclusive of E-mail, are authenticated by the “Head of Office or JS (Admn.) for Government Sector/Superior Authority for Banking Sector of Applicant/ Company Secretary of Govt. Registered Companies, ” before being formally submitted to NICCA for processing. This is given in the “Verification Process” in CPS. The procedure mentioned in Comment #11 for verification of Emails is documented and internal to NICCA and additionally ensures that the person who has requested for the certificate, also has the control over the e-mail mentioned in the request form. 3. Domain (SSL) My interpretation of the current CPS is that all three of the class/verification levels can be used for issuing SSL serts. Is this correct? – Yes Will the documented procedures for verifying the domain name be specific to class/verification levels? Or will it be the same regardless of class/verification levels? – The verification procedure will be specific to class-verification levels and is elaborated in the NICCA CPS ver-4.4, which is expected to be available in about a week’s time. 4. Audit We will submit the statement from auditor as soon as the above issues are resolved.
Thank you for the updates, I have incorporated them into my local copy of the information gathering document, which I will publish when it is completed -- after the rest of the information has been provided and reviewed: version 4.4 of the CPS and the auditor’s statement.
The updated NICCA CPS ver 4.4 is now available at the NICCA website (https: nicca.nic.in) . In this revised edition, Domain name verification procedure has been elaborated. Besides this, clarity to certain sections/sub-sections of the CPS have also been incorporated.
Thanks. It looks like the only remaining item is the auditor's statement.
Thank you for providing the auditor’s statement. The statement is signed by Debopriyo Kar, Head of Information Security Practice of CyberQ Consulting Pvt. Ltd. The email listed in the auditor’s statement is cyberq@cyberqindia.com. CyberQ is an accredited auditor as per the India Controller of Certifying Authorities (CCA), http://cca.gov.in/rw/pages/auditors.en.do When audit reports or statements are provided by the company requesting CA inclusion rather than having an audit report posted on a website such as cert.webtrust.org, the Mozilla process requires doing an independent verification of the authenticity of the audit reports or statements that have been provided. Is there a direct email address for Mr. Debopriyo Kar at cyberqindia.com? Or shall I use the cyberq@cyberqindia.com email address.
I have received email from the CCA, stating their intent to apply for inclusion of the CCA root certificate in Mozilla. Since the NICCA root (the inclusion request in this bug) is signed by the CCA root, I believe that we should proceed with processing the CCA root as the trust anchor. That would mean that this NICCA root would not be included separately within Mozilla products. When I process the CCA request, we will have to review all of the sub-CAs, so the information that has been provided in this bug will be used.
Before taking any decision to exclude NICCA’s root certificate from the Mozilla Firefox browser, we need to understand the PKI regime that is followed in India, as mentioned in Comment #9 of this bug, wherein it is explained how NICCA is not an intermediate CA or Sub-CA, in the true sense. While the requirement of such a root certificate program to include only the Root Certificate as the trust anchor and exclude all other so called intermediate CAs is understandable in a heterogeneous PKI environment, a similar Root Certificate program may not be desirable or relevant, in a country like India, which has a well established hierarchical PKI regime, with CCA as the apex regulatory body, overseeing and ensuring the compliance of the “Technical Requirements” and “Operating Standards” under the IT Act 2000, by the CAs under it’s domain. It has been pointed out earlier in Comment#7 and Comment#8 that it is technically feasible to include any CA certificate (whether root or not) as trust anchor in Firefox. It is reiterated once again that the Controller of Certifying Authorities (CCA) is the government licensing body and does not issue certificates to any end user. Let it be known and understood that inclusion of only the CCA’s certificate will not benefit even a single end user, when it comes to verification of certificates, thereby defeating the very purpose of inclusion of Root Certificates in Mozilla Firefox. Similar efforts are also being made with regard to other popular browsers where inclusion of both CCA and NICCA certificates in the same browser is underway. It may please be noted that inclusion of the Root Certificate of only CCA or only NICCA (or any of the other 7 CAs under CCA’s hierarchy for that matter), will not help the end user for verification of the certificate trust chain in the Indian PKI regime. In view of above, we therefore urge you to kindly reconsider the matter and include NICCA’s Certificate in the Mozilla Firefox browser.
In accordance with Mozilla's policy, Mozilla should add and trust either a) the CCA root but not the NICCA intermediate, or b) the NICCA cert (trusted as if it was a root) and not the CCA root. Assuming that the NIC CA meets all of Mozilla's qualifications, then IMO, the decision should be based on whether the CCA's policies suffice to ensure that all the subordinate CAs whose certs it issues also meet Mozilla's qualifications or not. Comment 24 above suggests that the writer believes that distribution of intermediate CA certificates with the browser is the only way for them to be distributed. But in fact it is not the normal or expected way for intermediate CA certificates to be distributed. Intermediate CA certificates are expected to be distributed to the certificate subjects (the holders of the private keys) together with the subjects' own certificates. Those subject parties (e.g. SSL servers) are then expected to send out the intermediate CA certificates together with their own certificates whenever they are asked to send out their certificates. That is required by SSL/TLS.
Summary: Add NIC Certifying Authority Root Certificate → Add NIC (India) Root CA Certificate
Whiteboard: On Hold - Pending decision on CCA vs NICCA as trust anchor
Blocks: 557167
CCA submitted a request for inclusion of the root certificate in bug #557167. Upon reviewing the request I found that the hierarchy is very large: https://bugzilla.mozilla.org/show_bug.cgi?id=557167#c15 The approach that we are going to take with this CA hierarchy is as follows. 1) There will be a separate bug for each of the 7 intermediate CAs to be separately evaluated for inclusion as a trust anchor in NSS. 2) After all 7 of the intermediate CAs have been approved/included, then I will proceed with the process of evaluating the CCA root certificate for inclusion in NSS. 3) If the CCA root certificate is approved for inclusion in NSS, then the 7 intermediate CAs will be removed from NSS at the same time that the CCA root is included.
Whiteboard: On Hold - Pending decision on CCA vs NICCA as trust anchor → Information incomplete
Prateek, I have reviewed my notes for this request, and I have a few things to follow up on. 1) I have not yet confirmed the authenticity of the audit statement as per comment #21. I will need to do so. Has there been a more recent audit? 2) In regards to verification of domain name ownership/control, the CPS says "For SSL Certificates, appropriate Domain Registry shall be queried for verification of details." Based on prior root inclusion requests I know that this will not be sufficient information. We will need more detail about how the information retrieved from the Domain Registry is used to confirm that the domain name is owned/controlled by the subscriber. This information needs to be in a public and audited document, such as the CPS. 3) The CPS talks about RA's. Section 1.4 says: "These RAs have complete charge of the authentication and validation of each Subscriber within the organization." Does it mean that RAs can only issue certificates for internal use within their organization? What controls and auditing are in place to ensure that the RAs are following appropriate procedures?
1) I have not yet confirmed the authenticity of the audit statement as per comment #21. I will need to do so. Has there been a more recent audit? >Yes, conducted from 5th Feb to 22nd Feb, 2010 2) With regard to verification of domain name ownership/control, the CPS says "For SSL Certificates, appropriate Domain Registry shall be queried for verification of details." Based on prior root inclusion requests I know that this will not be sufficient information. We will need more detail about how the information retrieved from the Domain Registry is used to confirm that the domain name is owned/controlled by the subscriber. This information needs to be in a public and audited document, such as the CPS. >The procedure for retrieval of information from Domain registry and its usage >for verification of Domain name owned/controlled by the subscriber is >contained in an Audited document. NICCA adheres to the same for confirmation >of Domain names, wherever applicable. 3) The CPS talks about RA's. Section 1.4 says: "These RAs have complete charge of the authentication and validation of each Subscriber within the organization." Does it mean that RAs can only issue certificates for internal use within their organization? >This particular statement is for RAs working for a particular organisation. >It is one of the types of RA, functioning under NICCA, as is evident from the >complete text of Section 1.4 of the CPS. 4)What controls and auditing are in place to ensure that the RAs are following appropriate procedures? >Proper third party audits of RAs, by CCA accredited Auditors are conducted as >per CCA guidelines.
> New Audit -- Yes, conducted from 5th Feb to 22nd Feb, 2010 That's great. Please have the auditor create a new statement to summarize the criteria and findings of the new audit, similar to the previous one: https://bug511380.bugzilla.mozilla.org/attachment.cgi?id=405987 in order to meet the requirements of sections 8, 9, and 10 of the Mozilla CA Certificate Policy (http://www.mozilla.org/projects/security/certs/policy/) It would be good if the new statement could also summarize which certificates were included in the audit; e.g. that the audit was in regards to operations of the "NIC Certifying Authority" sub-CA, and also list it's sub-CAs that were included in the audit. >The procedure for retrieval of information from Domain registry and its usage >for verification of Domain name owned/controlled by the subscriber is >contained in an Audited document. NICCA adheres to the same for confirmation >of Domain names, wherever applicable. Please provide the url and section number where I can find this text that describes the main steps that are taken to verify that the certificate subscriber owns/controls the domain name to be included in the certificate. https://wiki.mozilla.org/CA:Recommended_Practices#Verifying_Domain_Name_Ownership > RAs -- Proper third party audits of RAs, by CCA accredited Auditors > are conducted as per CCA guidelines. Good. Is that part of the audit that was conducted from 5th Feb to 22nd Feb, 2010? If so, can the auditor also make a statement that the RA practices have also been audited?
1) Please have the auditor create a new statement to summarize the criteria and findings of the new audit, similar to the previous one: https://bug511380.bugzilla.mozilla.org/attachment.cgi?id=405987 in order to meet the requirements of sections 8, 9, and 10 of the Mozilla CA Certificate Policy. > The last Annual Audit of NICCA was conducted from 5th Feb to 22nd Feb, 2010. Scanned copy of the latest Audit Equivalency Certificate from CCA accredited third party auditor - M/s CyberQ Consultants Pvt. Ltd. is uploaded for your ready referencel. 2) It would be good if the new statement could also summarize which certificates were included in the audit; e.g. that the audit was in regards to operations of the "NIC Certifying Authority" sub-CA, and also list it's sub-CAs that were included in the audit. > Included in the statement of the latest Audit Equivalency Certificate. 3) Please provide the url and section number where I can find this text that describes the main steps that are taken to verify that the certificate subscriber owns/controls the domain name to be included in the certificate. > The procedure for retrieval of information from Domain registry and its usage for verification of Domain name owned/controlled by the subscriber is contained in an Audited document under General Section category of NICCA Documentation. NICCA adheres to the same for confirmation of Domain names wherever applicable. The text of this document inter-alia includes the following : The SSL Certificate is issued after properly verifying the Domain Name. The applicant is required to send a physical copy of DSC Application form with full details of the Custodian of the Server, Department to which the server belongs, Ministry, Official address and Contact Number etc. In the Application form, the Server related details viz. IP Address, URL/Domain name and Physical Location of the Server etc. are also furnished. Before issuing SSL certificate, NICCA ensures the correctness of the furnished information by making NSLOOKUP query / WHOIS Lookup query as applicable, and in case of any doubt, communicating with the applicant and resolving the matter over phone, email or personal interaction. 4) Good. Is that part of the audit that was conducted from 5th Feb to 22nd Feb, 2010? If so, can the auditor also make a statement that the RA practices have also been audited? > Included in the statement of the latest Audit Equivalency Certificate. As per CCA guidelines, RAs are audited along with the Annual CA audit on a sample basis with the stipulation that any new RA has to be compulsorily audited.
As per Mozilla practice, I have sent email to the auditor to confirm the authenticity of the audit statement that has been attached to this bug. > The procedure for retrieval of information from Domain registry and its usage > for verification of Domain name owned/controlled by the subscriber is > contained in an Audited document under General Section category of NICCA > Documentation. NICCA adheres to the same for confirmation of Domain names > wherever applicable. The text of this document inter-alia includes the > following Please provide the url to this particular document.
I have exchanged email with a representative of CyberQ Consulting Pvt. Ltd., who has confirmed the authenticity of the Audit Equivalency Certificate that was attached in Comment #30.
Whiteboard: Information incomplete → Information confirmed complete
This request is near the top of the queue for public discussion: https://wiki.mozilla.org/CA:Schedule#Queue_for_Public_Discussion I will post a comment in this bug when I begin the discussion.
I am now opening the first public discussion period for this request from National Informatics Centre (NIC) to add the “NIC Certifying Authority” root certificate and enable all three trust bits. For a description of the public discussion phase, see https://wiki.mozilla.org/CA:How_to_apply#Public_discussion Public discussion will be in the mozilla.dev.security.policy newsgroup and the corresponding dev-security-policy@lists.mozilla.org mailing list. http://www.mozilla.org/community/developer-forums.html https://lists.mozilla.org/listinfo/dev-security-policy news://news.mozilla.org/mozilla.dev.security.policy The discussion thread is called “NIC Root Inclusion Request” Please actively review, respond, and contribute to the discussion. A representative of NIC must promptly respond directly in the discussion thread to all questions that are posted.
Whiteboard: Information confirmed complete → In public discussion
> A representative of NIC must promptly respond directly in the discussion > thread to all questions that are posted. Two questions have been posted for a few days now. A representative of this CA must post a response to the questions in the discussion ASAP.
The first round of discussion about this request from National Informatics Centre (NIC) to add the “NIC Certifying Authority” root certificate and enable all three trust bits has been closed. The discussion resulted in action items for NIC to update their CPS as follows. 1) Add text to Section 3.1.6, Authentication of Organization Identity, to describe the minimum steps that the RA must take to perform this authentication. If this information is already provided in another document (e.g. from CCA), then please directly reference that information in this section, so that it is clear the steps that must be followed. 2) Add text to describe the minimum steps that must be taken to verify that the certificate subscriber owns/controls the domain name to be included in the certificate. When the domain name is already registered with NIC, how does the RA use the information from the NIC database to confirm that the information provided by the subscriber is accurate and that the subscriber owns/controls that domain name? When whois is used, what information is used from whois, and how is that information used to confirm that the subscriber owns/controls that domain name? 3) Add text to section 6.1.2 in regards to “NICCA itself does not generate Private Key for the end users. We send crypto device having no keys on it, which carries users personal information printed on it. End users generate their own keys at their place. In case user find some problem, they can visit NICCA office for generating their key pairs. … End users with the help of web interface logins to NICCA site and generate key pairs on the crypto device at their place.” 4) Update section 4.4.1 to be more in line with the Mozilla CA Certificate Policy in regards to revocation. According to section 2 of http://www.mozilla.org/projects/security/certs/policy/MaintenancePolicy.html there are certain circumstances where the CA must revoke a certificate. The CPS language should reflect that the CA is required to revoke in the listed circumstances (rather than at the CA's discretion). Please add a comment to this bug when the CPS has been updated. Then I will confirm the completion of these action items, and start a second round of discussion in mozilla.dev.security.policy. Thanks, Kathleen
Whiteboard: In public discussion → Public Discussion Action Items - Update CPS
NICCA has published CPS Addendum dated 10 Jan 2013 under repository Certficate Practice Statement as shown below. "CPS Addendum dated 10 Jan 2013 for enrolling Root Certificate under MOZILLA [.pdf]" Manoj Kumar Kulshreshth Chief Operations Manager, NICCA
I apologize for the delay in my response. My work on root inclusion requests was postponed for a while. I will have to review and update my notes on this request. I have added this to my to-do list. In the meantime, please respond to the recent CA Communication. https://wiki.mozilla.org/CA:Communications#January_10.2C_2013
Attached are my current notes on this request. The items highlighted in yellow indicate where further information or clarification is needed. Please also add a comment to this bug to indicate NIC CA's response to the recent CA Communication: https://wiki.mozilla.org/CA:Communications#January_10.2C_2013
In light of the recent misissued certificates issued by this organization (http://googleonlinesecurity.blogspot.com/2014/07/maintaining-digital-certificate-security.html) it should be clear that this request must be rejected and this organization permanently barred from root inclusion.
From the inactivity here, it seems like NIC India are not currently interested in pursuing this application. But if it is revived, then the incident you note, and NIC India's reactions to it and the level of transparency they display in the days afterwards, will certainly be a topic of conversation. Gerv
http://googleonlinesecurity.blogspot.com/2014/07/maintaining-digital-certificate-security.html "The intermediate CA certificates held by NIC were revoked on July 3" So I think it's safe to assume that this particular inclusion request may be closed.
Status: ASSIGNED → RESOLVED
Closed: 10 years ago
Resolution: --- → WONTFIX
Product: mozilla.org → NSS

Can the process of adding the Indian CA be reinitiated and the Indian CA be part of the Trust Root?

In India as per the Legislation, only Indian CA is valid and they do not recognize Foreign CA.

Product: NSS → CA Program
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: