Dear Gerv,
Given that some of these are BR requirements, why were these controls not in 
place already? 
==> Some of these controls are already in place (such as the field CN and 
Subject Alternative Name that does not contain a private IP address). 
In addition to that NDCA has implemented a procedure for the RA operators which 
include these sections:
1-      Validation of the Organization  

-       In case of a commercial  and private organization: The RA operator 
checks the web site http://www.registre-commerce.tn. Then, he inserts the Tax 
Identification Number to verify the existence of the organization.

-       In the case of a public organization : The RA operator checks the web 
site http://www.infojort.com. Then, he inserts the Tax Identification Number to 
verify the existence of the organization.
2-      Domain Validation :
For the National domains, the RA operator checks the web site of the Tunisian 
Internet Agency which is responsible of the management of the national domain 
".tn" and the IP addressing in Tunisia ( http://whois.ati.tn ).
For the international domains, the RA operator checks the international whois.
In both cases, the RA operator checks if the domain name is the property of the 
applicant.
3-      CSR Validation
The RA operator checks the CSR with this URL  
https://cryptoreport.websecurity.symantec.com/checker/views/csrCheck.jsp





4-      Validation of the technical data included in the CSR: The RA operator 
checks :

Digital Signature Algorithm: SHA256
Key Algorithm: RSA
Key Size: 2048

5-      Validation of the data inserted in the CSR against the data filled in 
the form  :
Common name:
Organization:
Organizational unit:
City/locality:
State/province:
Country:
6-      Validation of the email : The RA operator checks if the email is in 
this form:
[email protected]
[email protected]
[email protected]
[email protected]
7-      Validation of the information related to the legal person and the 
subscriber  
8-      Phone Call to the webmaster of the server
Moreover, the NDCA is now implementing a new Managed PKI platform which will be 
in production by the end of September 2017.  For the moment, the only 
improvement done, is the printing of all the subject alternative names in the 
certificate for the RA operators, in addition to the other fields (CN, O, OU, 
mail) in such a way that they can visually check all the fields before the 
delivery of the certificate.

From what date would you say that your CA has been compliant with the CAB Forum 
Baseline Requirements? 
==> The TunRootCA2 and TunServerCA2 passed two successive external audit 
performed by LSTI. The last audit took place from 27th to 30th September 2016 
in applying the relevant ETSI Technical Specifications ETSI TS 102042v2.4.1. 
The audit was performed by LSTI as a full audit. This audit confirms the 
validity of the certificate N° 11140 issued on November 2015 and valid until 
November 2018. The next full audit will be performed from 11th to 15th of 
September 2017.

When will these improvements be implemented? And, given that these are only 
four possible ways a certificate can be messed up, what other checks are going 
to be implemented at the same time? 
==> These improvements have already been implemented by our service provider 
during this week. The tests will be done from 14th to 25th of August 2017.  The 
beginning of production is planned for the end of September after the audit.
We already have other checks besides those four in our information system such 
as checking the fields in the CSR. These checks are already implemented.
Olfa
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to