On 02/18/16 21:40, Erwann Abalea wrote: > Bonsoir, > > Le mercredi 10 février 2016 00:15:11 UTC+1, Charles Reiss a écrit : >> On 02/09/16 20:07, Kathleen Wilson wrote: >>> This request by DocuSign (OpenTrust/Keynectis/Certplus) is to >>> include the following root certificates, turn on the Websites and >>> Email trust bits for all of them, and enable EV treatment for all >>> of them. These new certs will eventually replace the 'Certplus >>> Class 2' root certificate that was included via Bugzilla Bug >>> #335392. + Certplus Root CA G1 - (SHA512, RSA4096) + Certplus >>> Root CA G2 - (SHA384, ECC) + OpenTrust Root CA G1 - (SHA256, >>> RSA4096) + OpenTrust Root CA G2 - (SHA512, RSA4096) + OpenTrust >>> Root CA G3 - (SHA384, ECC) >>> >>> Previously the company was known as Keynectis, with the Certplus >>> and OpenTrust brands, issuing certs to public or private >>> corporations, associations. >>> >>> Ownership changed November 3, 2015, from Keynectis to DocuSign >>> France, which was acquired by DocuSign Inc. The root keys >>> remained at the same physical location operated by the same team. >>> During the transfer of activity, all past agreements/contracts >>> and so on remain available. People linked to this activity were >>> also transferred to the new company. >>> >>> The request is documented in the following bug: >>> https://bugzilla.mozilla.org/show_bug.cgi?id=1025095 >>> >>> And in the pending certificates list: >>> https://wiki.mozilla.org/CA:PendingCAs >>> >>> Summary of Information Gathered and Verified: >>> https://bugzilla.mozilla.org/attachment.cgi?id=8692112 >>> >>> Noteworthy points: >>> >>> * The primary documents are the RCA CP, SSL CP, and EV CPS. >>> Documents are provided in French and some are translated into >>> English. >>> >>> Document Repository (French): http://www.OpenTrust.com/PC >>> Document Repository (English): >>> https://www.opentrustdtm.com/security-policies/?lang=en RCA - >>> Root Certificate Authorities - CP (English): >>> https://www.opentrustdtm.com//wp-content/uploads/2015/03/OpenTrust_DMS_RCA-Program_OpenTrust_CP-v-1.2s2.pdf >> >> >> >>> My reading of section 8.1 of the CP is that if CA is >> - _not_ technically constrained (as defined by Mozilla); and - not >> "issuing SSL certificates" (e.g. a CA lacking any EKU or name >> constraints that only issues certificates to individuals), then, it >> can be audited only by auditors who do not meet Mozilla's >> definition of an independent auditor. (8.2 allows internal auditors >> to be only "sufficiently organizationally separated from that >> entity to provide an unbiased, independent evaluation", which seems >> like it could include a CA employee.) Is this correct? > > For CAs not issuing TLS certificates, an internal audit is performed, > as permitted by Mozilla's definition of an independent auditor. See > Mozilla Inclusion Policy version 2.2, items 11, 12, 13, and 14.
Mozilla's definition of independent auditor requires that the auditor " not [be] affiliated with the CA as an employee or director". I assume that this will be the case for subCAs for which an internal audit is performed by virtue of the audit being performed employees of the parent CA, a different company. I don't believe having CAs audit their unconstrained subCAs is within the spirit of Mozilla's policy (since a sufficiently non-compliant subCA is an existential risk to the parent CA) though it is probably technically in conformance. I assume you believe the internal audit fits the third option of item 14's second requirement: "the party is bound by law, government regulation, and/or a professional code of ethics to render an honest and objective judgement regarding the CA" (since I imagine you aren't going to be disclosing your financial relationship with external subCAs). Can you identify what law, regulation, or code of ethics is involved? [snip] > >> Section 9.3.3 of this CP states in part: "PKI components must not >> disclose certificate or certificate-related information to any >> third party unless authorized by this policy" while section 9.4.3 >> states: "Any and all information within a certificate is inherently >> public information and shall not be considered confidential >> information." >> >> What is the 'certificate information' contemplated by section 9.3.3 >> that is not contained within a certificate? > > Certificate-related information that are protected by privacy laws, > such as telephone numbers, copies of ID cards, passwords or PIN > numbers exchanged between the customer and the CA/RA. Event logs are > also confidential. In the event of serious certificate misissuance, what information about those certificates and how they were issued will DocuSign be able to share with the public? _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

