On Tue, Apr 25, 2017 at 12:14 AM, Ryan Sleevi <r...@sleevi.com> wrote:
> Gerv, > > Is there any update on https://wiki.mozilla.org/ > CA:Symantec_Issues#STRUCK:_Issue_Y:_Unaudited_ > Unconstrained_Intermediates_.28December_2015_-_April_2017.29 ? > > I'm just wanting to understand how this relates to Mozilla's PKI policy > and expectations, and better understand why you struck it. > > - The CP/CPS does not state adherence to the Baseline Requirements. > - The audit was only to "WebTrust Principles and Criteria for CAs v2.0" - > e.g. not BRs > - Seemingly excluded from scope of the audits are the following, for > https://crt.sh/?Identity=%25&iCAID=1384&exclude=expired , on the basis of > Footnote 1 in https://www.symantec.com/content/en/us/about/media/ > repository/Symantec-NFSSP-WTCA_11-30-2016.pdf > - https://crt.sh/?id=19602740 > - https://crt.sh/?id=19602709 > - https://crt.sh/?id=19602733 > - https://crt.sh/?id=19602720 > - https://crt.sh/?id=19602670 > - https://crt.sh/?id=19602679 > - https://crt.sh/?id=19602705 > - https://crt.sh/?id=19602730 > > Of critical relevance: > - If you examine the CPS that was audited, https://www.symantec. > com/content/en/us/about/media/repository/nf-ssp-pki-cps.pdf, it notes in > Appendix A.5 that the profile includes issuing certificates with dNSName > and iPAddress SANs, with the anyExtendedKeyUsage (or the presence of more > specific EKUs) > > - If you examine Symantec's statements on this matter in > https://bugzilla.mozilla.org/attachment.cgi?id=8860216 , they stated > "Under the Non-Federal SSP program, they are used to issue certificates for > Microsoft Windows domain controllers and IPSec endpoints." . A Windows > Domain controller requires that it have id-kp-serverAuth, with a dNSName > SAN ( https://support.microsoft.com/en-us/help/291010/ > requirements-for-domain-controller-certificates-from-a-third-party-ca ) > I actually missed something in https://bug1334377.bmoattachments.org/attachment.cgi?id=8860216 "With the wind-down of the SSL/TLS RA program, all authentication and issuance of certificates chaining to Class 3 CAs is done by Symantec; Google and Apple in the case of the GeoRoot sub-CAs; and customers of the Non-Federal SSP program (in this case used to issue certificates for Microsoft Windows domain controllers and IPSec endpoints). " This would imply that customers of the NF SSP program can direct and perform RA duties for the issuance of domain controller certificates, which have the full capability of TLS server certificates, as directed above. This would seem consistent with the audit findings in https://www.symantec.com/content/en/us/about/media/repository/Symantec-NFSSP-WTCA_11-30-2016.pdf which states "Symantec makes use of external registration authorities for specific subscriber registration activities for the Symantec Non-Federal SSP - Customer Specific CAs and Symantec Healthcare CA ... Our examination did not extend to the controls exercised by these external registration authorities." So the audit, the CPS, and Symantec's own statements seem to indicate that external RAs had the capability of issuing domain controller certificates, which would minimally include id-kp-serverAuth, id-kp-clientAuth, and dNSName SANs, from an intermediate that was and is enabled for TLS server authentication at the request of VeriSign ( https://bugzilla.mozilla.org/show_bug.cgi?id=515470 ) and as maintained by Symantec. > _______________________________________________ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy