2015年8月26日水曜日 4時29分37秒 UTC+9 Ryan Sleevi:
> On Wed, August 5, 2015 2:51 pm, Kathleen Wilson wrote:
> >  SECOM has applied to enable EV treatment for the "Security Communication
> >  RootCA2" root certificate that was included in NSS via Bugzilla Bug
> >  #527419.
> >
> >  SECOM is a Japanese commercial CA that provides SSL and client
> >  certificates for e-Government and participates in several projects for
> >  financial institutions to ensure the secured on-line transactions.
> >  This begins the discussion of the request from SECOM to enable EV
> >  treatment for the "Security Communication RootCA2" root certificate that
> >  is currently included in NSS.
> >
> >  At the conclusion of this discussion I will provide a summary of issues
> >  noted and action items. If there are outstanding issues, then an
> >  additional discussion may be needed as follow-up. If there are no
> >  outstanding issues, then I will recommend approval of this request in
> >  the bug.
> 
> Hi Kathleen,
> 
> I've attempted to separately review this inclusion request and examine the
> CP and CPS.
> 
> Overall, this was the most difficult review, given the lack of
> availability of the policy documentation in English. While I attempted to
> use Google Translate for most of it, I think it may be noteworthy to
> consider requiring CAs to provide translated versions of their documents
> in a future update of the Mozilla inclusion policy.
> 
> The most recent audit information for SECOM that I can find is not the
> 1717 seal you indicated, but Seal #1907,
> https://cert.webtrust.org/SealFile?seal=1907&file=pdf
> 
> In examining that seal, we see that there are a variety of CP/CPSes
> provided as part of in scope for the audit. Relevant to this discussion,
> it appears, is the "Security Communications Root CA2 Certification
> Practice Statement" [1], the "Security Communications Root CA2 CA
> Certificate Policy" [2], and the "SECOM Passport for Web EV 2.0 CA" CP [3]
> and [4].
> 
> Given that the SECOM Root CA2 is already included in Mozilla's Root
> Program, I attempted to focus my efforts on reviewing documents [3] and
> [4], as they were deemed most relevant for EV enablement.
> 
> While there are a several positive things noted within the CP/CPS,
> overall, I'm concerned about the lack of information provided that makes
> it difficult to impossible for the community to reliably inspect SECOM's
> conformance to the relative policies, and leaves ambiguity with respect to
> Mozilla's own ability to ensure that SECOM is operating in the public
> interest.
> 
> Given that [3] largely defers to [4] for most sections, I will focus my
> primary comments on [4], and then circle back.
> 
> https://repo1.secomtrust.net/spcpp/pfw/pfwevca/PfWEVCA-CP.pdf
> 
> Good things:
> - Section 1.5.2 provides contact information for the public in the event
> of the need to revoke a certificate immediately. This is quite useful for
> relying parties and members of the public to raise concern, and many CAs
> make this difficult to find.
> - Section 7.1 provides an exhaustive list of the certificate profile,
> fields, and values. This sort of documentation is what ideally all members
> of the Mozilla Root Store would provide, and provides ways for the public
> to detect non-conformance to the profile specified.
> 
> Mixed things:
> - While Section 4.1 indicates that SECOM will examine CAA records, as
> required by version 1.2.0 of the Baseline Requirements (as adopted by
> Ballot 125), SECOM does not list which CAA records it will process or what
> it would do if they mismatch. This may be seen as an incomplete adherence
> to the Baseline Requirements, but I would rather see it as a reasonable
> confusion related to expectations. An ideal resolution for this would be
> for SECOM to indicate what CAA records it will expect to find (if CAA is
> present) in order to issue, and what SECOM's process and procedures will
> be for CAA records that fail to meet that (e.g. to deny the request, to
> treat it as a High-Value request, to require some form of extended
> validation, to allow a notarized letter on company letterhead to override,
> etc)
> 
> Bad things:
> - Section 2.2 of the CP fails to provide information in the repository for
> testing certificates issued by these roots. While SECOM's audit was
> conducted against the WebTrust SSL BRs 1.1 (themselves based on the CA/B
> Forum's SSL BRs 1.1), this was required in Appendix C (normatively) of the
> BRs, and has been incorporated in Section 2.2 of the BRs 1.3.0 (providing
> a model policy for CAs to adopt). I consider this a major issue of
> non-conformance, although it may be remediated relatively easily.
> - Section 3.2.2 fails to comprehensively explain how domain name
> validation works. This is unquestionably the most important part of a CAs
> operation, and I had difficulty finding any such information provided in
> any of the attested-to documents by the auditors. While Auditors are,
> unfortunately, not required to examine the CP/CPS of CAs for conformance
> to the BRs, this makes it difficult for the public to independently
> verify.
> 
>   Your own efforts in the tracking bug appear to have lead to documents
> [5] and [6], which were translated in brief in your original email.
> However, I could not find any reference to these documents being
> incorporated into the CP/CPS. This is quite concerning, because changes
> may be made to these documents inconsistent with respect to the
> requirements of [7], notably that CAs update Mozilla when policies and
> business practices change. It also suggests that these documents may be
> exempted from the change control procedures required by the Baseline
> Requirements.
> 
>   To me personally, this represents a significant risk to the community,
> and thus represents a major issue. Remediation for this should be to
> comprehensively document the name validation and issuance verification
> steps within the CA's CP/CPS, without reference to external
> documentation, so that it may be validated by members of the public and
> so that expectations regarding changes are clear. We've already seen one
> CA be confused by such expectations (CNNIC, with respect to issuing
> subordinate CAs), and I would be loathe to see another. This will
> require a CP/CPS update, and I believe it's best to defer acceptance
> until that's been completed and reviewed again during a public comment
> period.
> - Section 4.4.3 would potentially prohibit SECOM from publishing
> information about certificates they issue using Certificate Transparency,
> although I applaud them for clarifying in [3] that all information
> presented in certificates is treated as non-confidential. I consider this
> a minor issue worth noting, but not requiring remediation.
> - Section 4.9.7 fails to clearly document the frequency of OCSP
> publications or of the validity periods of the OCSP responses. I consider
> this a major issue, but which may be easily remediated.
> - Section 6.1.7 indicates the keyEncipherment usage, but that may be
> inconsistent with the usage of EC keys. This is likely a minor issue, and
> easily remediated, but may highlight some confusion on SECOM's part about
> RFC 5280.
> - Section 7.1.1 is somewhat inconsistent with respect to the SHA-1
> signatures. While the other policy documentation indicates support for
> SHA-2 signatures, it would seem non-conforming to their stated policies
> for them to issue such certificates. I consider this a major issue that
> the auditor should have flagged (as to inconsistent documentation).
> - Section 7.3 fails to document an OCSP profile, as required. Other
> documentation refers back to this section, so it's clearly insufficient.
> 
> 
> https://repo1.secomtrust.net/spcpp/pfw/pfwevca/PfWEVCA-CPS.pdf
> 
> Good things:
> - As noted before, the CPS notes that the information contained within a
> certificate is non-confidential, which is a positive step for CAs to note.
> 
> Bad things:
> - The CPS was last updated in 2012. This suggests that SECOM may not be
> following the changes in the Baseline Requirements. There is also
> ambiguity with respect to the expectations of the BRs and annual
> publications of such documents, and whether or not annual updates are
> required.
> 
> 
> Overall, I'm quite concerned about the inability to find (public)
> documentation as to the practices of this CA. I recognize that the
> information gathering process can be difficult, especially when language
> barriers exist, but this also makes it difficult for members of the public
> to independently evaluate the trustworthiness and conformance to Mozilla's
> policies.
> 
> The inconsistencies within the documents, and the absence of information,
> also represents a concern. While I can understand that the WebTrust Audit
> Criteria do not require an auditor to independently examine the CP/CPS
> (unfortunately), this does raise concern about the thoroughness and
> attentiveness of the audit.
> 
> I would like to recommend that the inclusion request be deferred until
> sufficient information is incorporated into the CP and CPS, as Mozilla has
> demonstrated in the past the expectation of CAs to adhere to those stated
> policies (c.f. CNNIC) and has documented requirements related to the
> update, notification, and change of those policies (c.f. [7]). After
> completing their updated documentation, I think it's reasonable to have
> another public review phase related to these updates.
> 
> For SECOM's benefit, it may help to examine the CA/Browser Forum SSL
> Baseline Requirements 1.3.0 [8], which provides a model RFC
> 3647-compatible enumeration of the Baseline Requirements expectations. By
> examining their CP/CPS in this light, it would assist SECOM's management
> that they have implemented and documented conformance to the SSL Baseline
> Requirements.
> 
> While I would not request a new audit to the updated policies, I also
> think it would be important to ensure that the next audit (eta June 2016)
> would ensure SECOM's adherance to the updated policies.
> 
> 
> [1] https://repository.secomtrust.net/SC-Root/SCRootCPS.pdf
> [2] https://repository.secomtrust.net/SC-Root/SCRootCP1.pdf
> [3] https://repo1.secomtrust.net/spcpp/pfw/pfwevca/PfWEVCA-CPS.pdf
> [4] https://repo1.secomtrust.net/spcpp/pfw/pfwevca/PfWEVCA-CP.pdf
> [5] https://www.secomtrust.net/service/pfw/apply/ev/1_3.html
> [6] https://www.secomtrust.net/service/pfw/apply/ev/sts_1.html
> [7]
> https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/maintenance/
> [8] https://cabforum.org/wp-content/uploads/CAB-Forum-BR-1.3.0.pdf


Dear Ryan-san,

The SECOM CP and CPS have been translated into English and attached to
https://bugzilla.mozilla.org/show_bug.cgi?id=1096205

CP (English): https://bugzilla.mozilla.org/attachment.cgi?id=8674034
CPS (English): https://bugzilla.mozilla.org/attachment.cgi?id=8674035

The answers for Ryan-san questions are as follows.

> - While Section 4.1 indicates that SECOM will examine CAA records, as 
> required by version 1.2.0 of the Baseline Requirements (as adopted by Ballot 
> 125), SECOM does not list which CAA records it will process or what it would 
> do if they mismatch.
> This may be seen as an incomplete adherence to the Baseline 
> Requirements, but I would rather see it as a reasonable confusion 
> related to expectations.
 Secom ignores CAA at this moment.

> - Section 2.2 of the CP fails to provide information in the repository 
> for testing certificates issued by these roots.
 We will provide test web pages for revoked and expired in addition to the 
valid page.

> - Section 3.2.2 fails to comprehensively explain how domain name 
> validation works. 
 This is explained at the URL below.
https://www.secomtrust.net/service/pfw/apply/ev/1_3.html
https://www.secomtrust.net/service/pfw/apply/ev/sts_1.html
In order to clarify, we will add it in the CP how domain name validation works.

> - Section 4.9.7 fails to clearly document the frequency of OCSP publications 
> > or of the validity periods of the OCSP responses.
 We will add it in the CP.

> - Section 6.1.7 indicates the keyEncipherment usage, but that may be 
> inconsistent with the usage of EC keys.
 Because in section 6.1.5 subscriber's key algorithm is RSA but nothing else, 
it cannot be EC.  So there is no inconsistency.

> - Section 7.1.1 is somewhat inconsistent with respect to the SHA-1 
> signatures. While the other policy documentation indicates support for
> SHA-2 signatures, 
 "Table 7.1-3 SECOM Passport for Web EV 2.0 CA Server Certificate Profile" is 
described for SHA-2 signature.
"Table 7.1-1 SECOM Passport for Web EV CA Server Certificate Profile" is 
described for SHA-1 signature.

> - Section 7.3 fails to document an OCSP profile, as required. Other 
> documentation refers back to this section, so it's clearly insufficient.
 "Table 7.1-4 SECOM Passport for Web EV 2.0 CA OCSP Server Certificate Profile" 
is described for SHA-2 signature.
"Table 7.1-2 SECOM Passport for Web EV CA OCSP Server Certificate Profile" is 
described for SHA-1 signature.

Thank you for your time and consideration.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to