On Thu, Oct 6, 2016 at 12:09 PM, Kathleen Wilson <[email protected]>
wrote:

> This request from Symantec is to include the following 4 root certificates
> and enable the Email trust bit for them.
>

To be clear: The request is for *only* the email trust bit to be set?

I seem to recall we had some discussion a while back about what criteria
should be applied to email CAs.  Where did we end up on that?

--Richard



> 1) Symantec Class 1 Public Primary Certification Authority - G6
> 2) Symantec Class 2 Public Primary Certification Authority - G6
> 3) Symantec Class 1 Public Primary Certification Authority - G4
> 4) Symantec Class 2 Public Primary Certification Authority - G4
> These Symantec-brand root certs will eventually replace the VeriSign-brand
> class 1 and 2 root certs that are currently included in NSS.
> The G6 root certs are SHA-256, and the G4 root certs are ECC.
>
> The request is documented in the following bug:
> https://bugzilla.mozilla.org/show_bug.cgi?id=833986
>
> And in the pending certificates list:
> https://wiki.mozilla.org/CA:PendingCAs
>
> Summary of Information Gathered and Verified:
> https://bug833986.bmoattachments.org/attachment.cgi?id=8798532
>
> * Root Certificate Download URLs:
> https://www.symantec.com/content/en/us/enterprise/
> verisign/roots/PCA_1_G6.pem
> https://www.symantec.com/content/en/us/enterprise/
> verisign/roots/PCA_2_G6.pem
> https://www.symantec.com/content/en/us/enterprise/
> verisign/roots/Symantec_Class_1_Public_Primary_
> Certification_Authority_G4.pem
> https://www.symantec.com/content/en/us/enterprise/
> verisign/roots/Symantec_Class_2_Public_Primary_
> Certification_Authority_G4.pem
>
> * The primary documents such as CP and CPS are provided in English.
>
> CA Document Repository:
> https://www.symantec.com/about/profile/policies/repository.jsp
> CP Document:
> https://www.symantec.com/content/en/us/about/media/repository/stn-cp.pdf
> CPS Document:
> https://www.symantec.com/content/en/us/about/media/repository/stn-cps.pdf
>
> * CA Hierarchy: These root certs will be used to sign Class 1 and Class 2
> subordinate CAs for SMIME and Client Auth purposes.  SubCA keys will
> operate at Symantec or Symantec Affiliate sites.
>
> * This request is to turn on the Email trust bit for these root certs.
>
> ** CP and CPS section 3.2.2: Where a domain name or e-mail address is
> included in the certificate Symantec or an Affiliate authenticates the
> Organization’s right to use that domain name either as a fully qualified
> Domain name or an e-mail domain.
>
> ** CP and CPS section 3.2.3:
> *** Class 1 -- No identity authentication.
> Limited confirmation that the certificate subscriber has access to the
> email address.
> Symantec performs a challenge-response type of procedure in which Symantec
> sends email to the email address to be included in the certificate,
> containing unpredictable information such as a randomly generated
> PIN/Password unique to the owner of the email address. The owner of the
> email address (the subscriber of the certificate) demonstrates control over
> the email address by using the information within the email, to then
> proceed with accessing a portal with the unique information sent in the
> email, to download and install the certificate.
> *** Class 2 -- Authenticate identity by:
> Manual check performed by the enterprise administrator customer for each
> subscriber requesting a certificate, “in which the subscriber receives the
> certificate via an email sent to the address provided during enrollment”
> or
> Passcode-based authentication where a randomly-generated passcode is
> delivered out-of-band by the enterprise administrator customer to the
> subscriber entitled to enroll for the certificate, and the subscriber
> provides this passcode at enrollment time
> or
> Comparing information provided by the subscriber to information contained
> in business records or databases (customer directories such as Active
> Directory or LDAP.
>
> * EV Policy OID: Not Requesting EV treatment and not requesting the
> Websites trust bit for these root certs.
>
> * Test Certs: An example cert chaining up to each root is provided as
> attachments in https://bugzilla.mozilla.org/show_bug.cgi?id=833986
>
> * CRL URLs:
> http://crl.ws.symantec.com/pca1-g6.crl
> http://crl.ws.symantec.com/pca2-g6.crl
> http://crl.ws.symantec.com/pca1-g4.crl
> http://crl.ws.symantec.com/pca2-g4.crl
>
> * Audit: Annual audits are performed by KPMG according to the WebTrust
> criteria.
> https://www.symantec.com/content/en/us/about/media/
> repository/Symantec-STN-WTCA-2015.pdf
> https://www.symantec.com/content/en/us/about/media/
> repository/1_symantec_stn_wtca_6-15-2016.pdf
>
> * Potentially Problematic Practices:
> (http://wiki.mozilla.org/CA:Problematic_Practices)
> ** Delegation of Domain / Email validation to third parties - CPS section
> 1.3.2: Third parties, who enter into a contractual relationship with
> Symantec or an affiliate, may operate their own RA and authorize the
> issuance of certificates by a STN CA. Third party RAs must abide by all the
> requirements of the STN CP, the relevant CPS and any Enterprise Service
> Agreement entered into with Symantec. RAs may, however implement a more
> restrictive practices based on
> their internal requirements.
> ** Allowing external entities to operate subordinate CAs -- CPS section
> 1.3.1: Symantec enterprise customers may operate their own CAs as a
> subordinate CA to a
> public STN PCA. Such a customer enters into a contractual relationship
> with Symantec to abide by all the requirements of the STN CP and the STN
> CPS. These subordinate CAs may, however implement more restrictive
> practices based on their internal requirements.
>
> This begins the discussion of this request from Symantec to include the
> following four Symantec-brand root certificates, and turn on the Email
> trust bit for all of them.
> 1) Symantec Class 1 Public Primary Certification Authority - G6
> 2) Symantec Class 2 Public Primary Certification Authority - G6
> 3) Symantec Class 1 Public Primary Certification Authority - G4
> 4) Symantec Class 2 Public Primary Certification Authority - G4
>
> At the conclusion of this discussion I will provide a summary of issues
> noted and action items. If there are outstanding issues, then an additional
> discussion may be needed as follow-up. If there are no outstanding issues,
> then I will recommend approval of this request in the bug.
>
> Regards
> Kathleen Wilson and Aaron Wu
>
>
>
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to