2015年8月6日木曜日 6時52分26秒 UTC+9 Kathleen Wilson:
> SECOM has applied to enable EV treatment for the "Security Communication 
> RootCA2" root certificate that was included in NSS via Bugzilla Bug #527419.
> 
> SECOM is a Japanese commercial CA that provides SSL and client 
> certificates for e-Government and participates in several projects for 
> financial institutions to ensure the secured on-line transactions.
> 
> The request is documented in the following bug:
> https://bugzilla.mozilla.org/show_bug.cgi?id=1096205
> 
> And in the pending certificates list:
> https://wiki.mozilla.org/CA:PendingCAs
> 
> Summary of Information Gathered and Verified:
> https://bugzilla.mozilla.org/attachment.cgi?id=8641274
> 
> Noteworthy points:
> 
> * Documents are in Japanese. Translations of some sections are attached 
> to the bug.
> 
> Document Repository: https://repository.secomtrust.net/SC-Root2/index.html
> CP: https://repo1.secomtrust.net/spcpp/pfw/pfwevca/PfWEVCA-CP.pdf
> CPS: https://repository.secomtrust.net/SC-Root/SCRootCPS.pdf
> SubCA CP: https://repository.secomtrust.net/SC-Root/SCRootCP1.pdf
> non-EV SSL CP: 
> https://repo1.secomtrust.net/spcpp/pfw/pfwsr2ca/PfWSR2CA-CP.pdf
> SSL Verification Procedures: 
> https://www.secomtrust.net/service/pfw/apply/ev/1_3.html
> 
> English Translations: 
> https://bug1096205.bugzilla.mozilla.org/attachment.cgi?id=8573613
> 
> * CA Hierarchy
> This root certificate has subordinate CAs which sign end-entity 
> certificates for SSL, EV SSL, email (S/MIME), and code signing.
> Intermediate CAs are available here:
> https://www.secomtrust.net/service/pfw/apply/sr/3_2.html
> https://www.secomtrust.net/service/pfw/apply/ev/3_2.html
> There is only one (internally-operated) subordinate CA that can issue EV 
> certs, namely "SECOM Passport for Web EV 2.0 CA".
> Externally-operated subCAs are not allowed to issue EV certs.
> There is currently one externally-operated subCA, Fuji Xerox. SECOM is 
> migrating this subCA to be internally-operated by SECOM and be included 
> in SECOM's policy documentation and audit.
> 
> * All three trust bits are already enabled for this root certificate. 
> The request is to enable EV treatment.
> 
> ** The procedure that SECOM follows to verify the domain owner is the 
> same for EV and non-EV SSL certificates. The only difference is that no 
> lawyer opinion letter is used for Non-EV SSL. Translations from section 
> 4-2 of SECOM’s Verification Document describe the process by which Whois 
> is used to verify that the domain owner is the same as the certificate 
> subscriber company name.
> 
> ** Translations from Security Communication RootCA Subordinate CA 
> Certificate Policy (SCRootCP1) and PfWEVCA‐CP
> 
> 3.2 Initial identification and authentication
> 3.2.1 Method to prove possession of private key
> It is proved that the applicant has the private key as follows. 
> Certificate Signing Request, "CSR" submitted by the applicant and verify 
> that the corresponding public key contained in it is signed with private 
> key. In addition, check the fingerprint of the CSR to identify the owner 
> of the public key.
> 3.2.2 Authentication of company
> Secom authorize the authentication of the applicant company as follows. 
> By using the official documents from central or local government, 
> database provided by QIIS or QGIS, and another ways that the equal level 
> of authorization possible.
> 3.2.3 Authentication of individual
> Secom authorize the authentication of the applicant individual as 
> follows. By using the official documents from central or local 
> government, database provided by QIIS or QGIS, and another ways that the 
> equal level of authorization possible.
> 3.2.4 Information of non verified certificate user
> Not described.
> 3.2.5 Confirmation of the authority to apply
> Secom confirm that the applicant has proper right to apply the 
> certificate by the section 3.2 or 3.3 on this CP. In the case if the 
> application is made by third party, we request to give us the letter of 
> attorney.
> * The third party application means that other than the company using 
> the host name described on common name of the certificate that is 
> described on the section 3.1.1.
> 
> 4.3.1 Procedures to issue certificate by CA
> Secom issues the certificate and prepares the certificate download site 
> only available for the applicant. The applicant uses a client 
> certificate or one time password along with access key to reach the 
> download site.
> 
> ** Notes from the discussion of the inclusion request
> 
> *** There are 2 types of organizations. One is the organization 
> registered in the QIIS, "Tokyo Shoko Research". The applicant 
> information is obtained from the reliable independent source. This is 
> much like an organizational credit reporting agency. Tokyo Shoko 
> Research (TSR) is a member of the D&B Worldwide Network since 2005.
> http://www.tsr-net.co.jp/en/outline.html
> 
> *** Another type is the organization not registered in the QIIS, "Tokyo 
> Shoko Rearch". This time, Secom require the organization to submit 
> "Certificate of seal impression". "Certificate of seal impression" is 
> the official document issued by the local government and only available 
> for the representative of the organization. This is the proof of the 
> real existence of the organization and there is no identity theft.
> This is commonly referred to as a "chop". It can be viewed as the same 
> thing as what was formerly required in the US for corporations before a 
> lot of the corporate-procedure streamlining went into effect, the 
> "embossed seal" which was only available to the corporate secretary.
> This chop is used for a traditional tool of business contract in Japan. 
> The proof of the chop is referred as "Certificate of seal impression". 
> "Certificate of seal impression" is issued by the Legal Affairs Bureaus 
> of Ministry of Justice. This official document is issued and available 
> only to the representative of the organization. This means that 
> possessing this official document is the proof of the representative of 
> the applicant's organization and there is no identity theft.
> 
> *** In order to validate the autority of the representative, make a 
> phone call to the organization using the telephone number from the 
> reliable independent source above, and ask switchboard for transfer to 
> the applicant's representative.
> For those organizations not registered in the QIIS..
> In stead of getting the information ourselves from QIIS directly, 
> however we get the Certificate of seal impression that is equally or 
> more reliable information source from the Legal Affairs Bureaus of 
> Ministry of Justice. The certificate of seal impression is submitted to 
> us by the representative because of the only available for the 
> representative of the organization. Possessing this official document is 
> the proof of the representative of the applicant's organization. Its 
> watermarked surface of the official document makes us securely verify 
> the original one and no copy or fraud made for the document.
> 
> 
> ** Translations of Secom Passport for Web EV service verification 
> procedures
> 
> 4-2 Verification of the domain owner
> By using Whois gateway(NIC domain reference function), we verify the 
> applied company name on domain information (the contents included in 
> CommonName) and the applicant (if the domain name use consent form is 
> submitted, it is same as the domain owner).
> The two points to check for exclusive right to use.
> For example, the applied CN is "WWW.login.secom.co.jp"
> (1) Applied company or company that exists in parents/child relation 
> with the applied company owns "secom.co.jp".
> (2) Applied company or company that exists in parents/child relation 
> with the applied company owns "login.secom.co.jp".
> In order to check for parents/child relation, we use QIIS or QGIS(EDINET).
> If we cannot find it, we ask the applicant to change the owner as same 
> as the applicant company name for WHOIS.
> If we cannot refer the owner at Whois gateway, ask the applicant for 
> registration.
> JP domain: http://whois.jprs.jp/ COM, NET, ORG domain: 
> http://www.networksolutions.com/cgi-°©‐bin/whois/whois
> 
> 4-2-1 For the domain owner is different from the applicant company In 
> order to verify the exclusive ownership, we check either document below 
> if the domain owner is third party.
> Domain name use consent form
> Lawyer opinion letter
> Points to be checked on the lawyer opinion letter is below.
> (1) It is described that the domain (secondary domain) is exclusively 
> owned by the applicant company. The domain name is described at item #5 
> on the lawyer opinion letter.
> (2) The lawyer who wrote the lawyer opinion letter is really existing 
> that is checked with 6. Check for the existence of the lawyer for 
> supplementation.
> 
> ** Translation from https://www.secomtrust.net/service/pfw/apply/ev/1_3.html
> check whether you are the owner of the domain.
> If it ends with ".JP" - JPRS WHOIS (Japan Registry Services Co., Ltd.)
> Other - InterNIC Whois Gateway (Network Solutions, Inc.)
> And if it is in the old organization information, if there is a mistake 
> in the registration information of the domain, please change to the 
> correct information contact the domain management company.
> If it is set the domain information in private, please publish the 
> domain information.
> 
> ** Translation from 
> https://www.secomtrust.net/service/pfw/apply/ev/sts_1.html
> 1. site content / operator confirmation
> In SECOM Trust Systems, and because of the certificate to prove the 
> existence of the web site, will check and review
> - The presence of the web site
> - The existence of the organization that operates the web site
> - Requesting organization information, certificate issuance destination 
> information (CSR information) and match of the organization that 
> operates the web site
> 2. Confirmation of application information / domain information / trade name
> Confirmation of domain information
> Will make sure the organization that owns the domain.
> If a third party (other than the applicant organization) owns the 
> domain, we will submit the documents in order to confirm or being used 
> consent with respect to the use of the domain. In addition, will check 
> the existence of the organization.
> 
> ** Translations of Mail Authentication Service Verification Procedure 
> provided by SECOM
> 6. procedure4. Certificate information
> Verify for DN information
> Whether or not there is a mistake on DN information.
> - Not same for company name
> - Spelling mistake
> - Domain name mistake
> - The certificate was issued with the same DN before except the case of 
> renewal or reissue.
> - Authentication by sending and receiving email.
> If it is not possible to send or receive the email, we verify the 
> applied email address by making phone call or by another ways to the 
> applicant company.
> 7. procedure5. Verification of the domain owner
> By using Whois gateway(NIC domain reference function), we verify the 
> applied company name on domain information (the contents included in 
> CommonName) and the applicant (if the domain name use consent form is 
> submitted, it is same as the domain owner).
> JP domain: http://whois.jprs.jp/
> COM, NET, ORG domain: http://www.networksolutions.com/cgi-°©‐ 
> bin/whois/whois
> 8. procedure6. Verification by phone call
> By making phone call to applicant company and make sure that the 
> applicant belongs to the company and apply for the certificate.
> 
> 
> * EV Policy OID: 1.2.392.200091.100.721.1
> 
> * Root Cert URL: https://repository.secomtrust.net/SC-Root2/SCRoot2ca.cer
> 
> * Test Website: https://pfwtest.secomtrust.net/
> 
> CRL: https://repository.secomtrust.net/SC-Root2/SCRoot2CRL.crl
> http://repo1.secomtrust.net/spcpp/pfw/pfwev2ca/fullcrl.crl
> CRL issuing frequency for subordinate end-entity certificates: 24 hours
>  From SECOM CA Service Passport for Web SR 2.0 Certificate Policy 
> (PfWSR2CA-CP.pdf), Section4.9.7: CRL is expired regardless of treatment, 
> every 24 hours
> 
> OCSP: http://ev2.ocsp.secomtrust.net/
> 
> * Audit: SECOM is audited annually by PricewaterhouseCoopers Aarata, 
> according to the WebTrust criteria.
> WebTrust CA: https://cert.webtrust.org/SealFile?seal=1717&file=pdf
> WebTrust BR: https://bugzilla.mozilla.org/attachment.cgi?id=8519802
> WebTrust EV: https://cert.webtrust.org/SealFile?seal=1717&file=pdf
> 
> This begins the discussion of the request from SECOM to enable EV 
> treatment for the "Security Communication RootCA2" root certificate that 
> is currently included in NSS.
> 
> At the conclusion of this discussion I will provide a summary of issues 
> noted and action items. If there are outstanding issues, then an 
> additional discussion may be needed as follow-up. If there are no 
> outstanding issues, then I will recommend approval of this request in 
> the bug.
> 
> Kathleen


Thank you Kathleen-san,

Out most recent the WebTrust audit report is posted at the URL below.
https://cert.webtrust.org/ViewSeal?id=1907 

Hisashi Kamo
Secom
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to