One small thing I noticed - the CA Hierarchy diagram the bug links to is
out of date:
https://bugzilla.mozilla.org/attachment.cgi?id=8660928

At a minimum, X3 and X4 now exist:
https://letsencrypt.org/certificates/

-- Eric

On Wed, Apr 20, 2016 at 4:01 PM, Kathleen Wilson <[email protected]>
wrote:

> This request by ISRG is to include the "ISRG Root X1" root certificate,
> and turn on the Websites trust bit.
>
> Internet Security Research Group (ISRG) offers server authentication
> certificates to the general public around the world.
>
> The request is documented in the following bug:
> https://bugzilla.mozilla.org/show_bug.cgi?id=1204656
>
> And in the pending certificates list:
> https://wiki.mozilla.org/CA:PendingCAs
>
> Summary of Information Gathered and Verified:
> https://bugzilla.mozilla.org/attachment.cgi?id=8727954
>
> Noteworthy points:
>
> * The primary documents are the CP and CPS, which are provided in English.
>
> Document Repository: https://letsencrypt.org/repository/
> CP: https://letsencrypt.org/documents/ISRG-CP-September-9-2015.pdf
> CPS: https://letsencrypt.org/documents/ISRG-CPS-March-16-2016.pdf
>
> * CA Hierarchy: This root signs internally-operated intermediate
> certificates which sign DV SSL certificates. In the future, there may be
> externally-operated subCAs, but the CP/CPS requires that they be audited
> annually according to the CA/Browser Forum Baseline Requirements.
> Cross-signing with "DST Root CA X3" root that is owned by IdenTrust and
> included in NSS.
> CA Hierarchy Diagram:
> https://bugzilla.mozilla.org/attachment.cgi?id=8660928
>
> * This request is to enable the Websites trust bit.
>
> ** CP section 3.2.2.2: For each Name listed in a DV-SSL Certificate, the
> CA shall confirm that, as of the date the Certificate was issued, the
> Applicant (or the Applicant's Parent Company, Subsidiary Company, or
> Affiliate, collectively referred to as "Applicant" for the purposes of this
> Section) either is the Domain Name Registrant or has
> control over the FQDN by:
> 1. Confirming the Applicant as the Domain Name Registrant directly with
> the Domain Name Registrar;
> 2. Communicating directly with the Domain Name Registrant using an
> address, email, or telephone number provided by the Domain Name Registrar;
> 3. Communicating directly with the Domain Name Registrant using the
> contact information listed in the WHOIS record's "registrant," "technical,"
> or "administrative" field;
> 4. Communicating with the Domain's administrator using an email address
> created by pre-pending "admin," "administrator," "webmaster," "hostmaster,"
> or "postmaster" in the local part, followed by the at-sign ("@"), followed
> by the Domain Name, which may be formed by pruning zero or more components
> from the requested FQDN;
> 5. Relying upon a Domain Authorization Document;
> 6. Having the Applicant demonstrate practical control over the FQDN by
> making an agreed-upon change to information found on an online Web page
> identified by a uniform resource identifier containing the FQDN; or
> 7. Using any other method of confirmation, provided that the CA maintains
> documented evidence that the method of confirmation establishes that the
> Applicant is the Domain Name Registrant or has control over the FQDN to at
> least the same level of assurance as those methods previously described.
>
> Note: For purposes of determining the appropriate domain name level or
> Domain Namespace, the registerable Domain Name is the second-level domain
> for generic top-level domains (gTLD) such as .com, .net, or .org, or, if
> the Fully Qualified Domain Name contains a 2 letter Country Code Top-Level
> Domain (ccTLD), then the domain level is whatever is allowed for
> registration according to the rules of that ccTLD.
>
> If the CA relies upon a Domain Authorization Document to confirm the
> Applicant's control over a FQDN, then the Domain Authorization Document
> must substantiate that the communication came from either the Domain Name
> Registrant (including any private, anonymous, or proxy registration
> service) or the Domain Name Registrar listed in the WHOIS. The CA must
> verify that the Domain Authorization Document was either (i) dated on or
> after the certificate request date or (ii) used by the CA to verify a
> previously issued certificate and that the Domain Name's WHOIS record has
> not been modified since the previous certificate's issuance.
>
> ** CPS section 3.2.2.2: For DV-SSL Certificates, the CA provides a secure
> means of validating the Applicant's control over, the device and domain
> name for which a Certificate is requested. The means of validating such
> ownership is consistent with the relevant CA/B Forum Baseline Requirements.
> When an Applicant applies for a DV-SSL Certificate, identification will be
> performed on the basis of demonstrating control of the Domain Name
> requested. There are several different challenges that the ACME client may
> be asked to respond to during the process, e.g. the server might challenge
> the device or Applicant to provision a record in the DNS under that Domain
> Name requested to be part of the Certificate or to provision a file on a
> web server referenced by an A record under that Domain Name. When the
> Applicant prompts the machine to submit this information, a response from
> the server will indicate whether what the Applicant provided was
> successfully verified as proof of control over the authenticated Domain
> Name or not. By providing the correct information to the response that is
> requested, the Applicant has demonstrated control over the authenticated
> Domain Name and can proceed to Issuance, retrieval, and installation of
> that DV-SSL Certificate.
>
> ** CPS section 4.2.2: The CA approves an Applicant's Certificate
> application or request from the ACME client for a DV-SSL Certificate if the
> I&A processes described in Section 3.2 and 3.3 are completed successfully.
> Certificate applications will be approved or rejected within 30 days of
> application receipt by the CA, or such other period that is compliant with
> the CA/B Forum Baseline Requirements.
> The CA terminates an Applicant registration process if:
> - The Applicant's identity (for Administrative Certificate) or
> demonstrated control of the domain as per the challenge presented to the
> ACME client, by the CA server (for DV-SSL Certificates) cannot be
> established in accordance with identity proofing requirements;
> - Not all forms necessary to establish I&A for Administrative Certificates
> are submitted on a timely basis;
> - For DV-SSL Certificates, the Applicant is unable to establish or provide
> verifiable evidence to that they are authorized to request the Certificate
> for the FQDN from the Domain Administrator in a form prescribed by the CA/B
> Forum; and/or
> - The CA is unable to verify or process the Applicant's payment
> information (where payment information is required).
>
>
> * EV Policy OID: Not requesting EV treatment
>
> * Root Certificate: https://letsencrypt.org/certs/isrgrootx1.der
>
> * Test Website: https://helloworld.letsencrypt.org/
>
> * CRL URLs:
> CRL HTTP URL: http://crl.root-x1.letsencrypt.org/
> CRL issuing frequency for subordinate end-entity certificates: We will not
> issue CRLs for end-entity certificates.
> CRL issuing frequency for subordinate CA certificates: At least once every
> six months.
>
> * OCSP URL(s)
> http://ocsp.root-x1.letsencrypt.org/
> CP section 4.10.2: OCSP responses from this service must have a maximum
> expiration time of 10 days.
>
> * Audit: Annual audits are performed by Schellman & Company, Inc.,
> according to the WebTrust criteria.
> WebTrust CA: https://cert.webtrust.org/SealFile?seal=1987&file=pdf
> WebTrust BR: https://cert.webtrust.org/SealFile?seal=1988&file=pdf
>
> *Potentially Problematic Practices:
> (http://wiki.mozilla.org/CA:Problematic_Practices)
> ** Delegation of Domain validation to third parties, and Allowing external
> entities to operate subordinate CAs -- CP section 8.1: In any event, the
> CA, RAs, CSAs, and CMAs must certify annually that they have at all times
> during the
> period in question complied with the requirements of this Policy. The CA,
> RAs, and CMAs must also state any periods of non-compliance with this
> Policy and provide reasons for non-compliance. The period during which the
> CA issues Certificates shall be divided into an unbroken sequence of audit
> periods. An audit period must not exceed one year in duration. Whichever
> scheme is chosen, it must incorporate periodic monitoring and/or
> accountability procedures to ensure that its audits continue to be
> conducted in accordance with the requirements of the scheme.
>
> This begins the discussion of this request from ISRG to include the "ISRG
> Root X1" root certificate, and turn on the Websites trust bit. At the
> conclusion of this discussion I will provide a summary of issues noted and
> action items. If there are outstanding issues, then an additional
> discussion may be needed as follow-up. If there are no outstanding issues,
> then I will recommend approval of this request in the bug.
>
> Kathleen
>
>
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>



-- 
konklone.com | @konklone <https://twitter.com/konklone>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to