This request from the Government of Turkey, Kamu Sertifikasyon Merkezi (Kamu SM), is to include the “TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1” root certificate, and enable the Websites trust bit. This SHA-256 root certificate will eventually replace the SHA1 “TÜBİTAK UEKAE Kök Sertifika Hizmet Sağlayıcısı - Sürüm 3” root certificate that was included via Bugzilla Bug #381974. The old root certificate expires in August, 2017.
Note that the CA has indicated that since Kamu SM is a government CA , the CA only issues certificates to government-owned domains (restricted by these TLDs: gov.tr, k12.tr, pol.tr, mil.tr, tsk.tr, kep.tr, bel.tr, edu.tr and org.tr ) and does not issue any certificates outside of Turkey. So, Mozilla may constrain this root to those domains. The request is documented in the following bug: https://bugzilla.mozilla.org/show_bug.cgi?id=1262809 And in the pending certificates list: https://wiki.mozilla.org/CA:PendingCAs Summary of Information Gathered and Verified: https://bug1262809.bmoattachments.org/attachment.cgi?id=8832967 * Root Certificate Download URL: https://bugzilla.mozilla.org/attachment.cgi?id=8738995 http://depo.kamusm.gov.tr/ssl/SSLKOKSM.S1.cer * The primary document, the SSL CP/CPS, is provided in both Turkish and English. Document Repository: http://depo.kamusm.gov.tr/ilke/ SSL CP/CPS: http://depo.kamusm.gov.tr/ilke/KamuSM_CPS/KamuSM_CPS_Tr.pdf http://depo.kamusm.gov.tr/ilke/KamuSM_CPS/KamuSM_CPS_En.pdf * CA Hierarchy: This root certificate has internally operated subordinate CAs that issue SSL end-entity certificates. * This request is to turn on the Websites trust bit. ** SSL CP/CPS section 3.2.2: Authentication of government agencies having requested OV SSL certificate from Kamu SM shall be performed by way of verification from official correspondences made between Kamu SM, relevant government agency and relevant channels of domain ownership (e.g., nic.tr). All applications made to Kamu SM shall be supported with legal documents that shall authenticate the following information and some of this information shall be included within the Subject field: …<snip>... Residence address of applicant government agency is taken as a basis in OV SSL applications. Legal status, identification information, domain name, organization representative, presence of application, CSR information and other similar information of applicant should be verified. Since the organization authentication is of high importance while issuing OV SSL certificate, all information to be included in subject field of the certificate shall be verified as set forth in CA/B Forum Baseline Requirements document. Verification procedures of Kamu SM shall be performed in compliance with the following steps: • Head office address of the government agency requesting certificate and organization representative having applied for certificate shall be verified based on the legal documents. In addition to this, that organization representative executing application procedures on behalf of the agency requesting certificate is entitled to apply for on behalf of the organization shall be verified with legal documents. • Phone numbers submitted in application documents by the organization representative having applied for certificate shall be checked whether they match with legal records or not. The organization representative having applied for certificate shall be called from phone numbers verified accordingly and is requested to verify its application. • It should be verified that e-mail address declared by organization representative having applied for certificate during application is sent by the organization representative. This verification procedure shall be confirmed by a verification e-mail sent to e-mail address of organization representative. • WHOIS records pertinent to domain name specified in certificate application shall be verified via “www.nic.tr” • As a principle, applicant should have exclusive right and authority in regard to use of relevant domain name which is included in the certificate. This exclusive right and authority must be granted by registered owner or organization of domain name. • Continuity of operation should be verified with a current official document to be submitted by organization representative or the persons authorized to issue an official document on behalf of government agencies. * EV Policy OID: Not Requesting EV treatment * Test Website: https://testssl.kamusm.gov.tr/ * CRL URLs: http://depo.kamusm.gov.tr/ssl/SSLSIL.S1.crl http://depo.kamusm.gov.tr/ssl/SSLKOKSIL.S1.crl SSL CP/CPS Section 4.9.7: CRL for end-entity certs is valid for maximum of 36 hours. * OCSP URLs http://ocspssls1.kamusm.gov.tr http://ocspsslkoks1.kamusm.gov.tr * Audit: Annual audits are performed by Information and Communications Technologies Authority (ICTA) according to the ETSI TS 102 042 v2.4.1 criteria. Audit Statement: https://bug1262809.bmoattachments.org/attachment.cgi?id=8819839 I received email from the auditor confirming the authenticity of the audit statement. Reference: https://bugzilla.mozilla.org/show_bug.cgi?id=1262809#c25 * Potentially Problematic Practices: None Noted (http://wiki.mozilla.org/CA:Problematic_Practices) This begins the discussion of the request from the Government of Turkey, Kamu Sertifikasyon Merkezi (Kamu SM), to include the “TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1” root certificate, and enable the Websites trust bit. At the conclusion of this discussion I will provide a summary of issues noted and action items. If there are outstanding issues, then an additional discussion may be needed as follow-up. If there are no outstanding issues, then I will recommend approval of this request in the bug. Kathleen _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

