El lunes, 7 de diciembre de 2015, 22:13:52 (UTC+1), Kathleen Wilson  escribió:
> On 10/21/15 12:17 PM, Kathleen Wilson wrote:
> > FNMT has applied to include the "AC RAIZ FNMT-RCM" root certificate and
> > enable the Websites trust bit.
> >
> > Fábrica Nacional de Moneda y Timbre (FNMT) is a government agency that
> > provides services to Spain as a national CA.
> >
> > The request is documented in the following bug:
> > https://bugzilla.mozilla.org/show_bug.cgi?id=435736
> >
> > And in the pending certificates list:
> > https://wiki.mozilla.org/CA:PendingCAs
> >
> > Summary of Information Gathered and Verified:
> > https://bugzilla.mozilla.org/attachment.cgi?id=8677034
> >
> > Noteworthy points:
> >
> > * Documents are in Spanish, and some are translated into English.
> >
> > Document Repository:
> > https://www.sede.fnmt.gob.es/normativa/declaracion-de-practicas-de-certificacion
> >
> > CP:
> > https://www.sede.fnmt.gob.es/documents/11614/67070/dpc_componentes_english.pdf/
> >
> > CPS: https://www.sede.fnmt.gob.es/documents/11614/137578/dpc_english.pdf/
> >
> > * CA Hierarchy
> >
> > ** This root has internally-operated subordinate CAs
> > - "AC Componentes Informáticos" issues certificates for SSL Servers and
> > code signing.
> > - "AC Administración Pública" is an updated version of the "APE CA" in
> > order to meet new requirements from Spanish Government about
> > certificates of Public Administrations.
> > - "APE CA" is no longer used.
> >
> > * This request is to enable the Websites trust bit.
> >
> 
> 
> 
> Thanks to all of you who have contributed to this discussion so far. I 
> believe that some of the concerns that were raised have been resolved, 
> and that the remaining open concerns are as follows. Please reply if I 
> missed any other items that still need to be resolved.
> 
> 1) This root certificate has subordinate certificates that are not 
> technically constrained and not audited/disclosed according to sections 
> 8-10 of Mozilla's CA Certificate Policy. The noted subCAs are "AC FNMT 
> Usuarios" (doesn't issue server certificates) and "ISA CA" (server 
> certificates are issued exclusively to a very restricted (almost 
> private) environment). Unless there are technical constraints on the 
> intermediate CA certificates representing those subCAs which make it 
> impossible for them to issue TLS or S/MIME certificates, they are 
> in-scope for this inclusion request, because they are a potential source 
> of mis-issuance which puts users of the Mozilla trust store at risk.
> References: 
> https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/inclusion/
> https://wiki.mozilla.org/CA:CertificatePolicyV2.1#Frequently_Asked_Questions

Regarding this issues, we are working to develope an action plan to solve it.

we hope to communicate our action plan soon in this thread.




_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to