This request by the Government of Japan, Ministry of Internal Affairs and 
Communications, is to include the GPKI 'ApplicationCA2 Root' certificate and 
enable the Websites trust bit. This new root certificate has been created in 
order to comply with the Baseline Requirements, and will eventually replace the 
'ApplicationCA - Japanese Government' root certificate that was included via 
Bugzilla Bug #474706. Note that their currently-included root certificate 
expires in 2017, and will be removed via Bugzilla Bug #1268219.

The request is documented in the following bug:
https://bugzilla.mozilla.org/show_bug.cgi?id=870185

And in the pending certificates list:
https://wiki.mozilla.org/CA:PendingCAs

Summary of Information Gathered and Verified:
https://bugzilla.mozilla.org/attachment.cgi?id=8673399

Noteworthy points:

* The primary documents are the Root and SubCA CP/CPS, provided in Japanese and 
English.

Document Repository (Japanese):
http://www.gpki.go.jp/apca/cpcps/index.html
Document Repository (English):
https://www2.gpki.go.jp/apca2/apca2_eng.html
Root CP/CPS:
https://www2.gpki.go.jp/apca2/cpcps/cpcps_root_eng.pdf
SubCA CP/CPS:
https://www2.gpki.go.jp/apca2/cpcps/cpcps_sub_eng.pdf

* CA Hierarchy: This root certificate has one internally-operated subordinate 
CA that issues end-entity certificates for SSL and code signing.

* This request is to turn on the Websites trust bit.

SubCA CP/CPS section 3.2.2, Authentication of organization identity
As for the application procedure of a server certificate, ... the LRA shall 
verify the authenticity of the organization to which the subscriber belongs 
according to comparing with organizations which were written in the application 
by directory of government officials that the Independent Administrative Agency 
National Printing Bureau issued.

SubCA CP/CPS section 3.2.3, Authentication of individual identity
As for the application procedure of a server certificate, ... the LRA shall 
verify the authenticity of the subscriber according to comparing with name, 
contact, etc. which were written in the application by directory of government 
officials that the Independent Administrative Agency National Printing Bureau 
issued.
The LRA also check the intention of an application by a telephone or meeting.

SubCA CP/CPS section 4.1.2, Enrollment process and responsibilities
(1) Server certificate
The subscriber shall apply accurate information on their certificate 
applications to the LRA.
The LRA shall confirm that the owner of the domain name written as a name(cn) 
of a server certificate in the application form belongs to Ministries and 
Agencies who have jurisdiction over LRA, or its related organization with the 
thirdparty databases and apply accurate information to the Application CA2(Sub).

* Mozilla Applied Constraints: This CA has indicated that the CA hierarchy may 
be constrained to the *.go.jp domain.

* Root Certificate Download URL:
https://bugzilla.mozilla.org/attachment.cgi?id=8673392
https://www.gpki.go.jp/apca2/APCA2Root.der

* EV Policy OID: Not requesting EV treatment

* Test Website:
https://www2.gpki.go.jp/apca2/apca2_eng.html

* CRL URLs:
http://dir.gpki.go.jp/ApplicationCA.crl
http://dir2.gpki.go.jp/ApplicationCA2Root.crl
http://dir2.gpki.go.jp/ApplicationCA2Sub.crl
SubCA CPS section 4.9.7: The CRL of 48-hour validity period is issued at 
intervals of 24 hours.

* OCSP URL:
http://ocsp-sub.gpki.go.jp
http://ocsp-root.gpki.go.jp

* Audit: Annual audits are performed by KPMG AZSA LLC according to the WebTrust 
criteria.
WebTrust Audit (Japanese and English in same document):
https://cert.webtrust.org/SealFile?seal=1793&file=pdf
BR Readiness Assessment: https://bugzilla.mozilla.org/attachment.cgi?id=8667814
Response to Audit Findings: 
https://bugzilla.mozilla.org/attachment.cgi?id=8667815
We will improve the issues that was pointed out in the pre-audit and submit the 
investigation report by September 2016. 

* Potentially Problematic Practices: None Noted
(http://wiki.mozilla.org/CA:Problematic_Practices)

This begins the discussion of the request from the Government of Japan to 
include the GPKI 'ApplicationCA2 Root' certificate and enable the Websites 
trust bit.

Please review this CA's request and provide feedback now, so that this CA may 
address any concerns while awaiting the results of their investigation report 
that is expected to show that the issues found during their BR audit have been 
addressed. A decision about inclusion will wait until after the investigation 
report has been provided.

Kathleen

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to