One thing leaps out at me immediately: these "test certificates". They appear to be issued from the same CA as the regular certificates, but s3.2 states, "In case of test certificates they may be issued remotely *without the necessity to verify the subscriber's identity". That seems... bad. *Really* bad.
I'm also a little concerned about the last sentence of s4.9.9 (dealing with OCSP responders) -- at least, I'm assuming that italics sentence in the header of 4.9.10 isn't supposed to be a header. I don't think that being able to take down your OCSP service for fours hours every week really constitutes an acceptable level of service. - Matt On Tue, Sep 23, 2014 at 05:49:17PM -0700, Kathleen Wilson wrote: > Krajowa Izba Rozliczeniowa (KIR) S.A. has applied to include the > “SZAFIR ROOT CA” root certificate and enable all three trust bits. > > KIR S.A. is a private corporation in Poland which currently mainly > issues qualified certificates for general public and plans to issue > non-qualified certificates (e.g. SSL certificates). KIR S.A. is an > automated clearing house in Poland and its core business is > clearings, and has built numerous business relationships within > banking sector. Therefore, KIR S.A. is aiming to expand its sales in > services such as SSL and VPN certificates. KIR S.A. has another line > of products called PayByNet, and has created a vast network of > relationships within online stores that KIR S.A. can leverage to > create customer base for trusted non-qualified certificates. > > The request is documented in the following bug: > https://bugzilla.mozilla.org/show_bug.cgi?id=817994 > > And in the pending certificates list: > http://www.mozilla.org/projects/security/certs/pending/ > > Summary of Information Gathered and Verified: > https://bugzilla.mozilla.org/attachment.cgi?id=8441701 > > Noteworthy points: > > * The primary documents, the CP and CPS, are provided in both > English and Polish. > > Document Repository: > http://elektronicznypodpis.pl/en/information/documents-and-agreements > CPS: > http://www.elektronicznypodpis.pl/files/doc/certification_practice_statement.pdf > CP: http://elektronicznypodpis.pl/files/doc/certification_policy.pdf > > * CA Hierarchy: There is currently one internally-operated > subordinate-CA which issues 6 types of end-user certificates: > - Standard certificate - For protection of information sent > electronically, using mainly e-mail, for authorizing access to > systems, customer authentication in SSL connections. It allows > signing and encrypting data in an electronic form and authenticating > subscribers. > - Code signing certificate > - VPN certificate > - SSL certificate > - Test certificate - For testing co-operation of the certificate > with solutions used or developed by a recipient of certification > services or a subscriber. > - ELIXIR certificate - For protecting information sending within > ELIXIR and EuroELIXIR systems. This kind of certificates are issued > only for Participants of ELIXIR and EuroELIXIR systems. > > * The request is to enable all three trust bits. > > ** CPS section 3.2, Initial Identity Validation: Depending on the > type of certificate the procedure of certificate issuance may be > different and is relative to a specific certification policy. > To receive a certificate it is necessary for the subscriber who is a > natural person or an authorised representative of the recipient of > certification services to present: > 1) an identification card (or its photocopy depending on the type of > certificate); > 2) documents confirming rights to the domain (optionally, relative > to the certificate type); > 3) a file with the certificate request (if the pair of keys is > generated individually by the subscriber). > KIR S.A. may expect presentation of other documents, in case > entering data other than the subscriber's first name and surname and > the PESEL or NIP number into the certificate is requested. > > ** CPS section 3.2.2: Identification and authentication of entities > other than a natural person is the case when data of such entity is > included in the data for the certificate for the issuance of which > it applies to KIR S.A., or data included in the certificate contains > information about such entity, e.g. the name of the Internet domain. > Depending on the type of certificate, identification shall be > performed on the basis of documents sent by the recipient of > certification services or data disclosed in the Agreement and in the > order. > The manner of confirming such data depends on the type of > certificate. For this purpose KIR S.A. may request sending > additional documents, check the data of the recipient of > certification services in commonly accessible registers and > services, obtain a card of signatures of persons authorised to > represent the recipient of certification services. > Issuance of the certificate may also require a personal meeting of a > person authorised to represent a specific entity with an authorised > representative of KIR S.A. > Wishing to authenticate other data recording which in the > certificate a specific entity requests, KIR S.A. may ask for: > 1) placing data indicated by KIR S.A. in a target server by the > subscriber acting to order of a legal person, which is to verify the > rights to the Internet domain; > 2) providing answer to a query sent by KIR S.A. to an e-mail address > placing of which in the certificate a legal person demands. > > ** CPS section 3.2.5. Checking Rights to Receive Certificate > The recipient of certification services signs an agreement with KIR > S.A. for the provision of certification services. Authorised > representatives also sign data for the certificate included in the > order for a specific subscriber. Thus, pursuant to an agreement they > confirm the subscriber's right to use the certificate in which the > data of the entity they represent is included. > The right to represent an entity by such persons is checked by KIR > S.A. in the course of identification and authentication. > > ** CP section 2.1, Standard certificate: These certificates may be > used for securing electronic mail and for logging into the systems > or services, authorising the subscriber during establishment of > secure connections. > In the process of issuing this type of certificates the operator KIR > S.A. shall verify the subscriber’s identity and the right to obtain > such certificate. The certificate is delivered to the subscriber > most often with a pair of keys generated on a carrier defined by the > subscriber. Data included in the certificate allows identifying the > subscriber that uses the certificate. > > ** CP section 2.2: Certificates for signing codes are used for > confirming authenticity and origins of binary codes. Based on the > data included in the certificate it is possible for define the > author or an entity that provides the code for a program or > application. > In the process of issuing this type of certificates the operator KIR > S.A. shall verify the subscriber’s identity and the right to obtain > such certificate and shall confirm reliability of the data entered > into the certificate. > > ** CP section 2.4: An SSL certificate allows confirming authenticity > of www servers and setting up secure connections using SSL and TSL > protocols. A certificate may contain data of a single www server or > associated servers within a single domain. > In the process of issuing this type of certificates the operator KIR > S.A. shall verify the subscriber’s identity and its right to obtain > a certificate. The process may also include verification, whether > the server or domain are held by the recipient of certification > services. > > ** CP section 2.5: Test certificate -- These certificates are used > for checking co-operation with the system or the subscriber’s IT > solution. > In the process of issuing this type of certificates the operator KIR > S.A. shall verify the subscriber’s right to obtain such certificate. > In case, when test certificate is to serve to examine the > possibility of setting up secure connections, then process includes > also verification, if www server or domain are at the disposal of > recipient of certification services. > > * EV Policy OID: Not requesting EV treatment > > * Test Website: https://ssl.elektronicznypodpis.pl > > * OCSP: http://ocsp.elektronicznypodpis.pl > > * Audit: Annual audits are performed by Ernst&Young according to the > WebTrust CA and BR criteria. The WebTrust seal file contains two > audit statements: WebTrust CA and WebTrust BR. > https://cert.webtrust.org/SealFile?seal=1681&file=pdf > > * Potentially Problematic Practices – None Noted > (http://wiki.mozilla.org/CA:Problematic_Practices) > > This begins the discussion of the request from KIR S.A. to include > the “SZAFIR ROOT CA” root certificate and enable all three trust > bits. At the conclusion of this discussion I will provide a summary > of issues noted and action items. If there are outstanding issues, > then an additional discussion may be needed as follow-up. If there > are no outstanding issues, then I will recommend approval of this > request in the bug. > > Kathleen > > -- > dev-security-policy mailing list > dev-security-policy@lists.mozilla.org > https://lists.mozilla.org/listinfo/dev-security-policy > -- I still can't see a wasp without thinking "400K 1W" -- Derek Potter, uk.misc _______________________________________________ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy