On 28/04/14 20:04, Kathleen Wilson wrote:
> Please respond with one of the following:
> A) Mozilla’s spreadsheet of included root certificates has the correct
> link to our most recent audit statement, and the audit statement date is
> correct.
> B) Here is the most recent audit statement for our certificates that are
> included in Mozilla’s CA program: <insert link here>
> C) We plan to send Mozilla our current audit statement by <insert date
> here>.

"... We have identified and resolved the process problem which led to us
not supplying this information in a timely manner"?

Do we want to put something in giving the mechanism by which we would
prefer to be pushed this information on a yearly basis? Is it email to you?

> 2) Send Mozilla the link to your most recent Baseline Requirements audit
> statement. Details about Mozilla's audit requirements are listed in
> section 11 of Mozilla's CA Certificate Inclusion Policy.
> 
> Please respond with one of the following:
> A) Mozilla’s spreadsheet of included root certificates has the correct
> link to our most recent Baseline Requirements audit statement.
> B) Here is the most recent Baseline Requirements audit statement for our
> certificates that are included in Mozilla’s CA program: <insert link here>
> C) We plan to send Mozilla our current Baseline Requirements audit
> statement by <insert date here>.
> D) The websites (SSL/TLS) trust bit is not enabled for our certificates
> that are included in Mozilla's CA program.

Same addendum as above, for B and/or C?

> Please respond with one of the following:
> A)  We have tested certificates in our CA hierarchy with Mozilla's new
> Certificate Verification library, and found that the certificates in our
> CA hierarchies are not impacted by the changes introduced in mozilla::pkix.
> B) We have found the following issues when testing certificates in our
> CA hierarchy with mozilla::pkix. <descriptions or Bugzilla bug numbers,
> related URLs and/or certificates>
> C) We are testing certificates in our CA hierarchy with Mozilla's new
> Certificate Verification library, and plan to send Mozilla our results
> by <insert date here, must be before June 30, 2014>.

You might note that they should particularly make sure to check EV
status, and to check chains through all currently-used intermediates.
Perhaps this could be noted on the testing page itself, though.

> 4) Check your certificate issuance to confirm that no new certificates
> will be issued with the problems listed here:
> https://wiki.mozilla.org/SecurityEngineering/mozpkix-testing#Things_for_CAs_to_Fix

If we are sending out a wiki URL, we should link to a particular
historical version so the CAs have a stable target. E.g.:

https://wiki.mozilla.org/index.php?title=SecurityEngineering/mozpkix-testing&oldid=970104

Otherwise, if that page gets edited, and they say "item 5", you might
not know what they were referring to.

> Please respond with one of the following:
> A) We have not and will not issue certificates with 

....any of...

> the problems listed
> in the mozpkix-testing#Things_for_CAs_to_Fix wiki page.
> B) We have previously issued certificates with the following problems
> listed in the mozpkix-testing#Things_for_CAs_to_Fix wiki page: <list the
> problems that needed to be fixed>. The last of those certificates expire
> <insert dates here>.

One date per problem.

> We will not issue new certificates with the
> problems listed in the mozpkix-testing#Things_for_CAs_to_Fix wiki page
> as of this date: <date when your operations will be updated, no later
> than June 30, 2014>

Does the list on that wiki page need to include the Microsoft equivalent
of the SGC EKU? Or are we not mentioning that?

Gerv


_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to