Le mercredi 21 octobre 2015 21:18:26 UTC+2, Kathleen Wilson a écrit :
> FNMT has applied to include the "AC RAIZ FNMT-RCM" root certificate and 
> enable the Websites trust bit.
[...]
> The request is documented in the following bug:
> https://bugzilla.mozilla.org/show_bug.cgi?id=435736

[...]
> Document Repository: 
> https://www.sede.fnmt.gob.es/normativa/declaracion-de-practicas-de-certificacion
> CP: 
> https://www.sede.fnmt.gob.es/documents/11614/67070/dpc_componentes_english.pdf/
>  
> 
> CPS: https://www.sede.fnmt.gob.es/documents/11614/137578/dpc_english.pdf/

>From 31/10/2012, the CPS states that end-entity certificates are valid for a 
>maximum of 3 years.
However, https://crt.sh/?id=8983568 shows a TLS server certificate valid for 4 
years and delivered in 2015.

> * CA Hierarchy
> 
> ** This root has internally-operated subordinate CAs
> - "AC Componentes Informáticos" issues certificates for SSL Servers and 
> code signing.
> - "AC Administración Pública" is an updated version of the "APE CA" in 
> order to meet new requirements from Spanish Government about 
> certificates of Public Administrations.
> - "APE CA" is no longer used.
> 
> * This request is to enable the Websites trust bit.
> 
> ** From dpc_componentes_english.pdf...
> 
> 
> * EV Policy OID: Not applicable; not requesting EV treatment.
> 
> * Root Cert URL: http://www.cert.fnmt.es/certs/ACRAIZFNMTRCM.crt
> 
> * Test Website: https://www.sede.fnmt.gob.es/certificados

The SubjectAlternativeName extension of this certificate contains a 
directoryName entry, this isn't BR-compliant (see section 7.1.4.2.1 of BR 
1.3.1).

Why did you include an anyExtendedKeyUsage OID in the EKU extension, in 
addition to the serverAuth? Do you also add this OID in non TLS server 
certificates?

> * CRL
> ldap://ldapape.cert.fnmt.es/CN=CRL164,CN=AC%20Administraci%F3n%20P%FAblica,OU=CERES,O=FNMT-RCM,C=ES?certificateRevocationList
> ldap://ldapfnmt.cert.fnmt.es/CN=CRL,OU=AC%20RAIZ%20FNMT-RCM,O=FNMT-RCM,C=ES?authorityRevocationList;

There's 228 CRLs for this subCA. All are correctly restricted with a critical 
IssuingDistributionPoints extension. Good luck for OneCRL/CRLSets maintainers.
The LDAP URLs are non compliant, because of not being UTF8 (it's mandatory for 
LDAP), but I guess this isn't a problem for Mozilla's application. Anyway, any 
request returns an error because of this UTF8 problem. Change the "%F3" into 
"%C3%B3" and the "%FA" into "%C3%BA" for the URLs to work.

Looking at the CRLs content shows that a lot of certificates don't have the 
required 20bits minimum entropy (the serial number is sometimes a monotonic 
sequence). Did this practice stop? For all Sub-CAs? If yes, when?

> * OCSP
> http://ocspape.cert.fnmt.es/ocspape/OcspResponder
> http://ocspap.cert.fnmt.es/ocspap/OcspResponder

These OCSP responders give a "good" answer for a nonexistent certificate.

> * Audit: FNMT is audited annually by PWC according to the WebTrust CA 
> and WebTrust BR criteria. I exchanged email with the auditor to confirm 
> the authenticity of the audit statement at this URL:
> https://www.cert.fnmt.es/documents/11601/4379265/auditReport_en.pdf
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to