Kathleen Wilson於 2016年9月17日星期六 UTC+8上午5時00分39秒寫道:
> This request from Government of Taiwan, Government Root Certification 
> Authority (GRCA), is to include their Government Root Certification Authority 
> root certificate, and turn on the Websites and Email trust bits. This root 
> cert will eventually replace the previous GRCA root certificate that was 
> included via Bugzilla Bug #274106.
> 
> The request is documented in the following bug:
> https://bugzilla.mozilla.org/show_bug.cgi?id=1065896
> 
> And in the pending certificates list:
> https://wiki.mozilla.org/CA:PendingCAs
> 
> Summary of Information Gathered and Verified: 
> https://bugzilla.mozilla.org/attachment.cgi?id=8708619
> 
> * Root Certificate Download URL:
> http://grca.nat.gov.tw/repository/Certs/GRCA2.cer
> 
> * The primary documents are provided in Chinese. The CP and CPS have been 
> translated into English. 
> 
> CA Document Repository: http://grca.nat.gov.tw/01-06.html
> GCA CPS(intermediate that can issue SSL certs): 
> http://gca.nat.gov.tw/download/Government_Certification_Authority_Certification_Practice_Statement_V1.8.pdf
> GPKI CP: http://grca.nat.gov.tw/download/GPKI_CP_eng_v1.7.pdf
> GRCA (Root) CPS: http://grca.nat.gov.tw/download/GRCA_CPS_eng_v1.4.pdf
> 
> * CA Hierarchy: Diagram of CA Hierarchy: http://grca.nat.gov.tw/
> All subordinate CAs are operated by Taiwan Government organizations. 
> GCA is responsible for signing certificates for government agencies. This is 
> the only intermediate cert that can issue SSL certs.
> XCA is responsible for signing certificates for organizations;
> MOICA is responsible for signing certificates for citizens;
> MOEACA is responsible for signing certificates for corporations; and
> HCA is responsible for signing certificates for health agencies.
> 
> * This request is to turn on the Email and Websites trust bits.
> 
> ** GCA CPS section 3.1.11
> (1) IC card certificate
> Upon obtaining the certificate IC card, subscriber may propose writing its 
> email address onto the certificate.
> Upon filing application online with certificate IC card by subscriber, the 
> GCA will check its digital signature as authentication of subscriber’s 
> identity, and send the email verification letter to the certificate email 
> address.
> Subscriber shall use the verification letter content reply system to verify 
> it truly owns and controls the email address.
> (2) Non-IC card certificate
> If required, subscriber may jointly apply for non-IC card certificate and 
> simultaneously writing email address onto certificate.
> Aside from checking certificate application information, the GCA shall also 
> send the email verification letter on writing the email address onto the 
> certificate.
> Subscriber shall use the verification letter content reply system to verify 
> it truly owns and controls the email address.
> 
> ** GCA CPS section 3.1.12
> The GCA should follow the General Application procedure as set forth in 
> section 3.1.8 for authenticating the organization is true when subscriber 
> applies for SSL Certificate. Also, the GCA may use following method to check 
> that the host domain name truly exists and belongs to the registered under 
> the applicant.
> - Government WHOIS host-government Chinese/English domain name registration 
> systems (hhtps://rs.gsn.gov.tw)
         ^^^^^the correct URL is https://rs.gsn.gov.tw 


> - TWNIC Whois Database (http://whois.twnic.net.tw)
> 
> * EV Policy OID: Not Requesting EV treatment
> 
> * Test Website: https://gcaweb.nat.gov.tw/GCAEE/GCAPriApply/GCAPriApply.html
> 
> * CRL URLs:
> http://grca.nat.gov.tw/repository/CRL2/CA.crl
> http://gca.nat.gov.tw/repository/GCA4/CRL2/complete.crl
> The value of nextUpdate is set to 24 hours later than the issuing time 
> (thisUpdate).
> CP section 4.4.9: For Level 2, CRL issued at least every 3 days. For level 3 
> and level 4, CRL issued at least once a day. For Test Level and Level 1 CRL 
> Issuance Frequency is not specified.
> 
> * OCSP URL:
> http://gca.nat.gov.tw/cgi-bin/OCSP2/ocsp_server.exe
> OCSP responses from this service have a maximum expiration time of two hours
> 
> * Audit: Annual audits are performed by KPMG according to the WebTrust 
> criteria.
> WebTrust CA: https://cert.webtrust.org/SealFile?seal=2050&file=pdf
> WebTrust BR: https://cert.webtrust.org/SealFile?seal=2051&file=pdf
> 
> * Potentially Problematic Practices: None Noted
> (http://wiki.mozilla.org/CA:Problematic_Practices) 
> 
> This begins the discussion of this request from the Government of Taiwan to 
> include their Government Root Certification Authority root certificate, and 
> turn on the Websites and Email trust bits. At the conclusion of this 
> discussion I will provide a summary of issues noted and action items. If 
> there are outstanding issues, then an additional discussion may be needed as 
> follow-up. If there are no outstanding issues, then I will recommend approval 
> of this request in the bug.
> 
> Kathleen

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to