Hi Kathleen,

The WT/BR audit covering this root is at 
https://www.symantec.com/content/en/us/about/media/repository/Symantec-Thawte-WTBR-2015.pdf.
 You'll find it listed as the fourth entry in the left column on page 6.

Kind regards,
Steven Medin
PKI Policy Manager, Symantec Corporation



-----Original Message-----
From: dev-security-policy 
[mailto:dev-security-policy-bounces+steve_medin=symantec....@lists.mozilla.org] 
On Behalf Of Kathleen Wilson
Sent: Monday, July 18, 2016 7:26 PM
To: [email protected]
Subject: Re: Request to enable EV for VeriSign Class 3 G4 ECC root

On 5/18/16 2:51 PM, Kathleen Wilson wrote:
> Here is a summary of this discussion so far about Symantec's request to 
> enable EV treatment for the "VeriSign Class 3 Public Primary Certification 
> Authority - G4" root certificate that was included via bug #409235, and has 
> all three trust bits enabled.
>
> 1) The "Symantec AATL ECC Intermediate CA" needs to be revoked and added to 
> OneCRL. The intermediate cert has been added to Salesforce.
> I'm assuming we may proceed with this request, as long as the cert is added 
> to OneCRL before EV treatment is actually enabled in a Firefox release.

It’s been revoked.
https://bugzilla.mozilla.org/show_bug.cgi?id=1287592


> 2) Questions were raised about wildcard certs in regards to the BRs. But it 
> sounds like for now Symantec's use of wildcard certs is not breaking any BRs.
> Question for Symantec: Are any of the issued wildcard certs EV?

Symantec responded to say that they have not issued EV wildcard certs.'

> 3) Question raised: What technical controls are in place to ensure that 
> systems which issue S/MIME certs "in this CA hierarchy" are not capable of 
> issuing an SSL server certificate?
> Answer from Symantec: We have a technical control in place for systems that 
> issue S/MIME certs in this CA hierarchy.  Our systems use static cert 
> templates from which end-entity certs are issued. Those templates include an 
> EKU value, but do not use the serverAuth or anyExtendedKeyUsage values.

Symantec's further responses: We will be stopping SHA1 ICA usage by the end of 
2016 for SMIME. We plan to use a new ICA that has a compliant EKU to issue 
SMIME certificates by the end of 2016.
For SHA-1 signed S/MIME certificates, the serial number is a 128-bit random 
number, which makes the certificate contents unpredictable.

> 4) Intermediate certificates for this root have been loaded into Salesforce, 
> and are available at the following links:
> https://wiki.mozilla.org/CA:SubordinateCAcerts
and
https://wiki.mozilla.org/CA:RevokedSubCAcerts

I believe that all of the questions/concerns raised during this discussion have 
been resolved. So I am about ready to wrap up this discussion and recommend 
approval of this request.

However, I am not finding the current WTBR audit statement for this root 
certificate.  I am finding the other Symantec audit statements in the "Roots & 
Audit Reports" tab of https://www.symantec.com/about/legal/repository.jsp
And I have exchanged email with the auditor to confirm the authenticity of the 
audit statements.

Sanjay, Please let me know which of the audit statements on the website contain 
the WTBR audit statement covering this root certificate.

Thanks,
Kathleen

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to