On Thu, Apr 21, 2016 at 8:00 PM, Rick Andrews <[email protected]>
wrote:

> On Wednesday, April 20, 2016 at 12:47:58 PM UTC-7, Charles Reiss wrote:
> > On 04/13/16 23:12, Kathleen Wilson wrote:
> > > Request to enable EV for VeriSign Class 3 G4 ECC root
> > >
> > > This request by Symantec is to enable EV treatment for the "VeriSign
> > > Class 3 Public Primary Certification Authority - G4" root certificate
> > > that was included via bug #409235, and has all three trust bits
> > > enabled.  Symantec is a major commercial CA with worldwide operations
> > > and customer base.
> > >
> > > The request is documented in the following bug:
> > > https://bugzilla.mozilla.org/show_bug.cgi?id=833974
> > >
> > > And in the pending certificates list:
> > > https://wiki.mozilla.org/CA:PendingCAs
> > >
> > > Summary of Information Gathered and Verified:
> > > https://bugzilla.mozilla.org/attachment.cgi?id=8734043
> > >
> > > Noteworthy points:
> > >
> > > * The primary documents are the CP and CPS, which are provided in
> > > English.
> > >
> > > Document Repository:
> > > https://www.symantec.com/about/profile/policies/repository.jsp
> > > CP:
> > >
> https://www.symantec.com/content/en/us/about/media/repository/stn-cp.pdf
> > > CPS:
> >
> https://www.symantec.com/content/en/us/about/media/repository/stn-cps.pdf
> > >
> > > * CA Hierarchy: This root signs internally-operated SubCAs which
> > > issue OV and EV SSL certificates, as well as Code Signing
> > > certificates. S/MIME certs may also be issued in this CA hierarchy.
> >
> > "Symantec AATL ECC Intermediate CA" is an unconstrained subCA
> > (https://crt.sh/?caid=13519) of this
> > root, albeit one with a certificate policy OID that should prohibit it
> > from receiving EV treatment:
> > - Why was this subCA not included in the disclosure attached to
> > https://bugzilla.mozilla.org/show_bug.cgi?id=1019864 ?
> > - Where and since when was this subCA disclosed in compliance with
> > Mozilla's policies?
> > - What CP/CPSes apply to this subCA?
> > - Presumably this subCA is not meant to be used for TLS server
> > certificates, so why is it not technically constrained from doing so?
>
> Symantec AATL ECC Intermediate CA was never intended for issuing SSL/TLS
> certificates. It has never been used and will not be used in the future for
> SSL/TLS. As such, it hasn't been disclosed to date.


That is not the criterion, Rick.  The criterion is "capable of being used
to issue new certificates":

"""
All certificates that are capable of being used to issue new certificates,
and which directly or transitively chain to a certificate included in
Mozilla’s CA Certificate Program, MUST be operated in accordance with Mozilla’s
CA Certificate Policy
<https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/>
and MUST either be *technically constrained* or be *publicly disclosed and
audited.*
"""

So until that CA is constrained, disclosed+audited, or revoked, the G4 root
is out of compliance with Mozilla's policy.  If you have any more of these
around, please make sure include them in your upcoming disclosures.

--Richard



> We are planning to revoke the Symantec AATL ECC Intermediate CA and
> provide it along with the "Revoked" list of ICAs to Mozilla in the coming
> month.
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to