WISeKey has applied to include the "OISTE WISeKey Global Root GB CA" root certificate, turn all all three trust bits, and enable EV treatment. This SHA-256 root cert will eventually replace WISeKey's SHA-1 root cert that was included in NSS via Bugzilla Bug #371362.

WISeKey provides worldwide eSecurity services based or related to electronic identities and digital certificates. There’s no focus on a particular region or customer profile.

The request is documented in the following bug:
https://bugzilla.mozilla.org/show_bug.cgi?id=1172819

And in the pending certificates list:
https://wiki.mozilla.org/CA:PendingCAs

Summary of Information Gathered and Verified:
https://bugzilla.mozilla.org/attachment.cgi?id=8640737

Noteworthy points:

* Documents are provided in English.

CA Document Repository: http://www.wisekey.com/repository
CPS: https://cdn.wisekey.com/uploads/images/WKPKI.DE001-OWGTM-PKI-CPS.v2.3-CLEAN.pdf

* CA Hierarchy
There is currently one Policy CA signed by this SHA-256 root cert, and the one Policy CA currently has three active issuing CAs. CA hierarchy diagrams for both the SHA-1 and SHA-256 root certs are provided in section 1.3.1 of the CPS. CPS section 1.3.1.2: “OWGTM Policy CA G1” is a Certification Authority subordinated to the “OWGTM Root CA GB”. This CA issue certificates for “Issuing CAs” (Certification Authorities that issue certificates for End Entities) dedicated to specific entities and/or purposes, but this CA itself does not issue certificates to end entities.
“OWGTM Policy CA G1” can sign:
- WISeKey Qualified Issuing CAs
- Partner's Qualified Issuing CAs
- WISeKey Advanced Issuing CAs
- Partner's Advanced Issuing CAs
- WISeKey Standard Issuing CAs
- Partner's Standard Issuing CAs
At this moment, there aren’t externally operated SubCAs under the new SHA-256 root, but this is supported as stipulated in WISeKey's CPS. For the existing SHA-1 root cert's hierarchy, there’s a limited number of CAs operated by external companies, which enforce name constraints. In particular, the currently active SubCAs are: Government of Seychelles (constrained to *.gov.sc), and The Bancorp Inc. (constrained to *.wise-corp.co, *.thebancorp.com, *.wisecorp.us and *.wise-­‐ corp.us)

* This request is to turn on all three trust bits, and to enable EV treatment.

** CPS section 3.2.2, 3.2.3, 3.2.5: This information is specified in Annex C: Identity Validation Policies
CPS section 12 == Annex C

** CPS section 12.2.1 -- Personal Certificates
Standard -- ID Data Verified: Basic data is verified such as the email address; or in the case of an organisation ownership of the domain names in the certificate, with responsibility to verify the individual entities to which certificates are issued.
Method of Verification:
- Bounce back email verification procedure proving access to the email account is accepted. - Database (such as existing HR, or IDM) of organisation, with details of organisation's users.
- Commonly accepted business methods of identity verification.
Advanced -- May be done through database of identity data that is well maintained and was created based on face to face or direct verification using official ID documents. Qualified -- Face to face or direct verification but may be done through database of identity data that is well-maintained and was created based on face to face or direct verification using primary ID documents.

** CPS section 12.2.2:
CertifyID Standard SSL Certificate: The identification data included in the certificate are verified according to the Baseline Requirements made public by the CA/Browser Forum. (For more information, see section 14 "Annex E: Notes on validation methods for SSL and Code Signing certificates")

** CPS section 12.2.2:
CertifyID Advanced EV SSL Certificate: The identification data included in the certificate are verified according to the Baseline Requirements made public by the CA/Browser Forum. (For more information, see section 14 "Annex E: Notes on validation methods for SSL and Code Signing certificates")

** CPS section 12.2.4:
CertifyID Code Signing and CertifyID EV Code Signing Certificates: The identification data included in the certificate are verified according to the Extended Validation Requirements made public by the CA/Browser Forum. (For more information, see section 14 “Annex E: Notes on validation methods for SSL and Code Signing certificates”)

** CPS section 14.1.2 and 14.2.2
For the Fully-Qualified Domain Name listed as SAN in a Certificate, the Agent shall confirm that, as of the date the Certificate was issued, the Applicant either is the Domain Name Registrant or has control
over the FQDN by any of the following:
1. Communicating directly with the Domain Name Registrant using the contact information listed in
the WHOIS record’s “registrant”, “technical”, or “administrative” field;
2. Communicating with the Domain’s administrator using an email address created by pre-pending ‘admin’, ‘administrator’, ‘webmaster’, ‘hostmaster’, or ‘postmaster’ in the local part, followed by the at-sign (“@”), followed by the Domain Name, which may be formed by pruning zero or more
components from the requested FQDN;
3. Relying upon a Domain Authorization Document (See Note); or
4. Having the Applicant demonstrate practical control over the FQDN by making an agreed-upon change to information found on an online Web page identified by a uniform resource identifier containing the FQDN. Note: If the CA relies upon a Domain Authorization Document to confirm the Applicant’s control over a FQDN, then the Domain Authorization Document MUST substantiate that the communication came from either the Domain Name Registrant (including any private, anonymous, or proxy registration service) or the Domain Name Registrar listed in the WHOIS.

** CPS section 14.4 - Verification process for CertifyID
Code Signing Certificates
*** CPS section 14.4.1.2 -- Verification of Individual Identity
If an individual requests the certificate, the Agent must request a proof of Identity to accompany the certificate request. The accepted method requires receiving a copy of a National ID, Drivers License or
Passport.
*** CPS section 14.4.1.3 -- Verification of Organization Identity
If the organization name is present in the certificate, the Agent must verify the identity of the Applicant using documentation provided by, or through communication with, at least one of the following: 1. A government agency in the jurisdiction of the Applicant’s legal creation, existence, or recognition (i.e. chamber of commerce, official commerce registry...); 2. A third party database that is periodically updated and considered a Reliable Data Source;
3. A site visit by the Agent; or
4. An Attestation Letter.


* EV Policy OID: 2.16.756.5.14.7.4.8

* Root Cert URL: http://public.wisekey.com/crt/owgrgbca.crt

* Test Website: https://goodevssl.wisekey.com/

* CRL: http://public.wisekey.com/crl/owgrgbca.crl
http://public.wisekey.com/crl/wcidpgbca1.crl
http://public.wisekey.com/crl/wcidagbca2.crl

* OCSP: http://ocsp.wisekey.com/
http://ocsp2.wisekey.com

* Audit: WISeKey is audited annually according to the WebTrust audit criteria. I have exchanged email with representatives of Auren (the auditor) to confirm the authenticity of the audit statement.
https://cdn.wisekey.com/uploads/documents/WISeKey-WebTrust-Audit-Report-2015.pdf?6ecb07

* Potentially Problematic Practices -- None noted
(http://wiki.mozilla.org/CA:Problematic_Practices)

This begins the discussion of the request from WISeKey to include the "OISTE WISeKey Global Root GB CA" root certificate, turn all all three trust bits, and enable EV treatment.

At the conclusion of this discussion I will provide a summary of issues noted and action items. If there are outstanding issues, then an additional discussion may be needed as follow-up. If there are no outstanding issues, then I will recommend approval of this request in the bug.

Kathleen




_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to