Dear WoSign and Mozilla community,
The CRL downloaded on june 29th from http://crls8.wosign.com/ca8-ssl4.crl (CRL
distribution point in https://root5evtest.wosign.com certificate) has a CRL
number of "00".
It also applies for the CRL downloaded on the same date from
http://crls6.wosign.com/ca6-ssl4.crl (CRL distribution point in
https://root4evtest.wosign.com/) which has a CRL number of "00".
According to the Webtrust for CA 2.0 "CAs include a monotonically increasing
sequence number for each CRL issued by that CA." (See section 6.8 control 7).
Also see section 5.2.3 of the RFC5280 ("The CRL number is a non-critical CRL
extension that conveys a monotonically increasing sequence number for a given
CRL scope and CRL issuer").
As WoSign has the Webtrust for CA Seal, could WoSign please explain how this
control is fullfilled?
Thanks in advance.
Best regards,
J
El jueves, 4 de junio de 2015, 19:56:16 (UTC+2), Kathleen Wilson escribió:
> WoSign has applied to include the "Certification Authority of WoSign G2"
> and "CA WoSign ECC Root" root certificates, turn on all three trust bits
> for both roots, and enable EV treatment for both roots. WoSign's
> previous root certificates were included via Bugzilla Bug #851435.
>
> WoSign issues certificates to the general public in China. Their SSL
> certificates are deployed in top 10 eCommerce websites in China; for
> bank, telecom, enterprise etc.
>
> The request is documented in the following bug:
> https://bugzilla.mozilla.org/show_bug.cgi?id=1156175
>
> And in the pending certificates list:
> https://wiki.mozilla.org/CA:PendingCAs
>
> Summary of Information Gathered and Verified:
> https://bugzilla.mozilla.org/attachment.cgi?id=8606022
>
> Noteworthy points:
>
> * Documents are provided in Chinese, and the CPS has been translated
> into English.
>
> Document Repository (Chinese): http://www.wosign.com/policy/cps.htm
> CPS (English): http://www.wosign.com/policy/cps_e.htm
>
> * CA Hierarchy for the "Certification Authority of WoSign G2" root:
> The plan is to have 10 internally-operated subCAs for 3 types of
> certificates: SSL Certificate, Code Signing Certificate and Client
> Certificate.
> 1. WoSign Class 4/3/2/1 EV/OV/IV/DV SSL CA G2
> 2. WoSign Class 4/3/2 EV/OV/IV Code Signing CA G2
> 3. WoSign Class 3/2/1 Client CA G2
> Currently, one of the subCAs has been issued: WoSign Class 4 EV SSL CA G2
>
> * CA Hierarchy for the " CA WoSign ECC Root" root:
> The plan is to have 10 internally-operated subCAs for 3 types of
> certificates: SSL Certificate, Code Signing Certificate and Client
> Certificate.
> 1. WoSign Class 4/3/2/1 EV/OV/IV/DV ECC SSL CA
> 2. WoSign Class 4/3/2 EV/OV/IV ECC Code Signing CA
> 3. WoSign Class 3/2/1 ECC Client CA
> Currently, one of the subCAs has been issued: WoSign Class 4 EV ECC SSL CA
>
> * This request is to turn on all three trust bits for both roots, and to
> enable EV treatment for both roots.
>
> ** CPS section 3.2.2.1 -- Class 1
> *** Email accounts are validated by sending an electronic mail message
> with a verification code to the requested email account. The subscriber
> has to return and submit the verification code as prove of ownership of
> the email account within a limited period sufficient enough to receive
> an electronic mail message.
> *** Fully qualified domain names, typically "www.domain.com" or
> "domain.com" are validated by sending an electronic mail message with a
> verification code to one of the following administrative electronic mail
> accounts: [email protected], [email protected],
> [email protected], [email protected], [email protected]
> The subscriber has to return and submit the verification code as prove
> of ownership of the domain name within a limited period sufficient
> enough to receive an electronic mail message. Additionally the existence
> of the domain name is verified by checking the WHOIS records provided by
> the domain name registrar. If the WHOIS data contain
> an administrative email addresses, they may be offered as additional
> choices to the above mentioned electronic mail accounts.
> If subscriber can't receive email from the above 6 email account, he/she
> can choose to do the website control validation that the subscriber must
> upload a website control validation code file to the
> website root directory to finish the website control validation.
> WoSign performs additional sanity and fraud prevention checks as
> outlined in section 3.1.6. Wild card domain names like "*.domain.com"
> are not issued in the Class 1 level.
> WoSign SSL certificate support IDN domain in Chinese and other
> languages, so Wosign makes a reasonable check for similar sounding and
> looking names to prevent possible abuse which is applied also to non-IDN
> names such as PAYPA1.COM, MICR0S0FT.COM etc. and all IDN domain
> also need the domain ownership verification by system same as normal
> non-IDN domains
>
> ** CPS section 3.2.2.2 - Class 2
> The verification process of personal identities of subscribers are
> performed manually. The WoSign CA validates without any reasonable
> doubt that the following details are correct: First and last name;
> Residence, Address; State or Region; Country
> .... Email control validation is performed as in Class 1.
>
> ** CPS section 3.2.2.3 - Class 3
> The verification process of organizations implies same level identity
> validation of the subscriber (responsible person) and are performed
> manually. WoSign validates without any reasonable doubt that the
> following details are correct: Registered organization name; Address;
> State or Region; Country
> .... Domain and email control validation is performed as in Class 1.
> Domain control may also be established through verification of the WHOIS
> records and matching subscriber information.
>
> ** CPS section 3.2.2.4 - Class 4
> for EV SSL Certificate and EV Code Signing Certificate for organizations
> are performed according to the validation procedures and requirements of
> the for EV SSL Certificate Guidelines and EV Code Signing Certificate
> Guidelines, as published by the CA/Browser Forum.
>
> ** CPS section 3.2.4: Validation of authority: WoSign confirms and
> verifies that the subscriber is duly authorized to represent the
> organization and obtain the certificate on their behalf by obtaining an
> authorization statement and by contacting the authorizer.
>
> * EV Policy OID: 1.3.6.1.4.1.36305.2
>
> * Root Cert URLs
> http://www.wosign.com/root/WS_CA1_G2.crt
> http://www.wosign.com/root/ws_ecc.crt
>
> * Test Websites
> https://root4evtest.wosign.com/
> https://root5evtest.wosign.com/
>
> * CRL
> http://crls6.wosign.com/ca6.crl
> http://crls6.wosign.com/ca6-ssl4.crl
> http://crls8.wosign.com/ca8.crl
> http://crls8.wosign.com/ca8-ssl4.crl
> CPS 7.8: CRL Next Update: 5 days
>
> * OCSP
> http://ocsp6.wosign.com/ca6
> http://ocsp6.wosign.com/ca6/ssl4
> http://ocsp8.wosign.com/ca8
> http://ocsp8.wosign.com/ca8/ssl4
>
> * Audit: WoSign is audited annually by Ernst&Young (EY) according to the
> WebTrust audit criteria.
> WebTrust CA: https://cert.webtrust.org/SealFile?seal=1843&file=pdf
> WebTrust BR: https://cert.webtrust.org/SealFile?seal=1860&file=pdf
> WebTrust EV: https://cert.webtrust.org/SealFile?seal=1842&file=pdf
>
> * Potentially Problematic Practices -- None noted
> (http://wiki.mozilla.org/CA:Problematic_Practices)
>
> This begins the discussion of the request from WoSign to include the
> "Certification Authority of WoSign G2" and "CA WoSign ECC Root" root
> certificates, turn on all three trust bits for both roots, and enable EV
> treatment for both roots.
>
> At the conclusion of this discussion I will provide a summary of issues
> noted and action items. If there are outstanding issues, then an
> additional discussion may be needed as follow-up. If there are no
> outstanding issues, then I will recommend approval of this request in
> the bug.
>
> Kathleen
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy