Le vendredi 1 novembre 2013 23:58:59 UTC+1, Kathleen Wilson a écrit :
> WoSign has applied to include the “Certification Authority of WoSign” 
> and “CA WoSign” root certificates, turn on all three trust bits for both 
> root certs, and enable EV treatment for both root certs.

[...]

> The request is documented in the following bug:
> https://bugzilla.mozilla.org/show_bug.cgi?id=851435

[...]

> * The primary documents are as follows:
> Document Repository: http://www.wosign.com/policy/cps_e.htm
> CPS (English): http://www.wosign.com/policy/WoSign-Policy-1_2_2.pdf

[...]

> * The request is to turn on all three trust bits, and enable EV treatment.

[...]

> * EV Policy OID
> Certification Authority of WoSign: 1.3.6.1.4.1.36305.2
> CA WoSign: 1.3.6.1.4.1.36305.6

Why are there 2 different OIDs for EV, under the same arc belonging to the same 
company?
Your policy only defines the .2 one.

> * Root Cert URL
> Certification Authority of WoSign: http://www.wosign.com/Root/WS_CA1_NEW.crt
> CA WoSign: http://www.wosign.com/Root/ws_ca2_new.crt

All the tested certificates have the countryName element encoded as UTF8, which 
is invalid (only PrintableString is allowed, see X.520/6.3.1). This mistake is 
repeated from the roots down to the subscriber certificates, and extends to 
OCSP responder certificates.

> * Test Website:
> Certification Authority of WoSign: https://root1evtest.wosign.com
> CA WoSign: https://root2evtest.wosign.com

The jurisdictionOfIncorporationCountryName is also declared as an UTF8String, 
it MUST be a PrintableString.

Non blocking: do you think it is really necessary to add Microsoft and Netscape 
SGC OIDs in the EKU? It's useless unless your customers have very old software 
versions *and* you alter their trust settings to grant this use to your root.

> * CRL
> Certification Authority of WoSign:
> http://ocsp1.wosign.com/ca1
> http://ocsp1.wosign.com/class4/server/ca1
> http://ocsp.wosign.com/class3/server/ca
> http://ocsp.wosign.com/class1/server/ca

I guess this was a mistake in cut/paste operation, the right URLs seem to be
   http://crls1.wosign.com/ca1.crl
   http://crls1.wosign.com/ca1-server-4.crl
   http://crls.wosign.com/server-3.crl
   http://crls.wosign.com/server-1.crl
Those 4 URLs (and the 4 ones declared below under the second root CA) return a 
CRL with a MIME type "text/plain". This must be "application/pkix-crl".

The AIA:CAIssuers URLs return objects with a MIME type equal to "text/plain" 
instead of "application/pkix-cert" or "application/pkcs7-mime" (depending on 
the real object).

> CA WoSign:
> http://crls1.wosign.com/ca2.crl
> http://crls1.wosign.com/ca2-server-4.crl
> http://crls.wosign.com/ca2-server-3.crl
> http://crls.wosign.com/ca2-server-1.crl
> CPS section 7.8: CRL Next Update: 48 hours
> 
> * OCSP
> Certification Authority of WoSign:
> http://ocsp1.wosign.com/ca1
> http://ocsp1.wosign.com/class4/server/ca1 
> http://ocsp.wosign.com/class3/server/ca 
> http://ocsp.wosign.com/class1/server/ca
> CA WoSign:
> http://ocsp2.wosign.com/ca2
> http://ocsp2.wosign.com/class4/server/ca2
> http://ocsp2.wosign.com/class3/server/ca2 
> http://ocsp2.wosign.com/class1/server/ca2

OCSP responders don't have the OcspNoCheck extension, but include this OID in 
the EKU extension. This isn't BR compliant.
Non blocking: the OCSP service doesn't react well with non URL-encoded GET 
requests (seems to close the socket with no answer).

> CPS section 4.9.9, OCSP: The current CRLs are reloaded at least every 60 
> minutes.

Does that mean that OCSP responders don't perform a database lookup and don't 
comply with BR 13.2.6 rule on non-issued certificates?

> * Audit: Annual audits are performed by Ernst & Young according to the 
> WebTrust criteria.
> Audit Report: https://cert.webtrust.org/SealFile?seal=1443&file=pdf

This audit doesn't cover the second root CA, despite the fact that is was 
conducted in January 2013 and the second root CA seems to exist since 2009.

> EV Readiness Audit Report: 
> https://bugzilla.mozilla.org/attachment.cgi?id=725294

This audit doesn't limit to the first root CA, has been performed by the same 
auditor at the same moment.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to