Thanks for highlighting.   

We'll update and come back to the Mozilla team when approved by our policy 
authority members.  I shall try to ensure we look at why we missed this 
instruction too.

Steve

Sent from my iPhone

> On 14 Aug 2014, at 00:57, Kathleen Wilson <[email protected]> wrote:
> 
>> On 8/12/14, 10:58 PM, Steve Roylance wrote:
>> Hi Kathleen,
>> 
>> I see the underlying question that you (and Matt) wanted us to answer.
>> Apologies in not being complete in my response the first time around.
>> 
>> The reason we are specific in the CPS with regards to Organizational vetting
>> (for everything other than EV) is a historical one.  Prior to the Baseline
>> Requirements we had to stipulate exactly how we validated a company as there
>> were no external standards to point towards.   Of course this has now
>> changed in that like EV we 'could' also reference the external methods
>> allowed by the Baseline Requirements, however, as we still have a number of
>> other certificate types that incorporate Organization information we
>> specifically reference the methods we use for these.  In the short term we
>> don't plan on changing the wording as we'll soon have guidelines for BR
>> based Code Signing too.
>> 
>> In response to this discussion thread I'm going to suggest to our Policy
>> Authority 2 (in charge of CP/CPS) that when BR Code Signing is released, we
>> reword the sections, referring out to EV and BR guidelines and only
>> highlight if there are differences for the remaining products.
>> 
>> As far as what we actually do for Extended Validation then we follow the
>> guidelines and therefore also the allowed alternatives and our auditors
>> verify this on a yearly basis.  If we were to incorporate actual processes
>> then we would have to sync updates to the CPS with changes to EV (Rather
>> than our internal process documents) and that makes things harder all round.
>> 
>> Does that answer your concern?
>> 
>> Note that I'm in our Singapore office today and flying back tomorrow so
>> additional responses will be delayed until Friday UK time if I didn't
>> address your concern.
>> 
>> Kind Regards
>> 
>> Steve
> 
> 
> The reason I didn't notice this before, is because I didn't notice the part 
> in CPS section 3.2.2 that said "For all Certificates other than Extended 
> Validation"
> 
> 
> I do *not* believe that simply referencing the BRs and the EV Guidelines is 
> sufficient.
> 
> For example, lets look at domain verification for SSL certs.
> 
> Baseline Requirements section 11.1.1 lists several ways in which the CA may 
> confirm that the certificate subscriber owns/controls the domain name to be 
> included in the certificate. Simply referencing section 11 of the BRs does 
> not tell us which of those options the CA uses.
> 
> Also, I don't believe that the following has changed, and I don't believe 
> that referencing BR section 11 provides sufficient information to satisfy 
> this.
> https://wiki.mozilla.org/CA:Recommended_Practices#Verifying_Domain_Name_Ownership
> "The CA's public documentation needs to provide sufficient information 
> describing the steps taken by the CA to confirm that the certificate 
> subscriber owns/controls the domain name to be included in the certificate. 
> For instance, if a challenge-response type of procedure is used, then there 
> needs to be a brief description of the process. If public resources are used, 
> then there should be a description of which public resources are used, what 
> data is retrieved from public resources, and how that data is used to verify 
> that the certificate subscriber owns/controls the domain name."
> 
> Kathleen
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to