This request is for inclusion of the Google Trust Services R1, R2, R3, and
R4 roots as documented in the following bug:
https://bugzilla.mozilla.org/show_bug.cgi?id=1325532

Google’s application states:
Google is a commercial CA that will provide certificates to customers from
around the world.  We will offer certificates for server authentication,
client authentication, email (both signing and encrypting), and code
signing.  Customers of the Google PKI are the general public.  We will not
require that customers have a domain registration with Google, use domain
suffixes where Google is the registrant, or have other services from Google.

* BR Self-Assessment:
https://bug1325532.bmoattachments.org/attachment.cgi?id=8943360

* Summary of Information Gathered and Verified:
https://bug1325532.bmoattachments.org/attachment.cgi?id=8965095

* Root Certificate Download URL:
** R1: https://pki.goog/gtsr1.crt
** R2: https://pki.goog/gtsr2.crt
** R3: https://pki.goog/gtsr3.crt
** R4: https://pki.goog/gtsr4.crt

* CP/CPS:
** CP: https://pki.goog/GTS-CP-1.5.pdf
** CPS: https://pki.goog/GTS-CPS-2.3.pdf

* This request is to turn on the Websites trust bit (reference comment #29
in the bug). EV treatment has not been requested.
** EV Policy OID: N/A

* Test Websites:
** R1: https://good.r1demo.pki.goog https://revoked.r1demo.pki.goog
https://expired.r1demo.pki.goog
** R2: https://good.r2demo.pki.goog https://revoked.r2demo.pki.goog
https://expired.r2demo.pki.goog
** R3: https://good.r3demo.pki.goog https://revoked.r3demo.pki.goog
https://expired.r3demo.pki.goog
** R4:

* CRL URLs:
** R1: http://crl.pki.goog/gtsr1/gtsr1.crl
** R2: https://crl.pki.goog/gtsr2/gtsr2.crl
** R3: https://crl.pki.goog/gtsR3/gtsr3.crl
** R4: https://crl.pki.goog/gtsR4/gtsr4.crl

* OCSP URLs:
** R1: http://ocsp.pki.goog/gstr1
** R2: https://ocsp.pki.goog/gstr2
** R3: https://ocsp.pki.goog/gstr3
** R4: https://ocsp.pki.goog/gstr4

* Audit: Annual audits are performed by Ernst & Young according to the
WebTrust for CA and BR audit criteria.
** WebTrust: https://cert.webtrust.org/SealFile?seal=2346&file=pdf
** BR: https://cert.webtrust.org/SealFile?seal=2347&file=pdf

I’ve reviewed the CP and CPS, BR Self Assessment, and related information
for the Google Trust Services inclusion request that is being tracked in
this bug and have the following comments:

==Good==
* Google has supplied a key generation ceremony audit report [1]
* Other than the disclosed intermediates and required test certificates, no
issuance has been detected from these roots.
* Section 1.4.2 of the CPS expressly forbids the use of Google certificates
for “man-in-the middle purposes”
* Appendix C of the current CPS indicates that Google limits the lifetime
of server certificates to 365 days.

==Meh==
* These 4 roots were created by GlobalSign and then transferred to Google.
A lengthy discussion regarding the transfer [2] occurred, primarily focused
on existing GlobalSign roots that were purchased rather than these new
roots. However, I believe the following concerns are relevant:
** From the transfer on 11-August 2016 through 8-December 2016, at the time
it would not have been clear what, if any, policies applied to these new
roots. The applicable CPS during that period [3] makes no reference to
these roots. Google does state in their current CPS that these roots were
operated according to that CPS.
** From the transfer on 11-August 2016 through the end of Google’s audit
period on 30-September, 2016, these roots were not explicitly covered by
either Google’s audit nor GlobalSign’s audit. However, since Google had
valid WebTrust audits during that period, I believe this is no different
than a CA creating a new root. A counter-argument is that Google prior to
the transfer was not operating publicly-trusted roots and thus should have
undergone a point-in-time audit as if they were a new CA.

The discussion was concluded with the following statement:

> > https://wiki.mozilla.org/CA:RootTransferPolicy#Change_in_Legal_Ownership
>
> With these changes and the filing of
> https://bugzilla.mozilla.org/show_bug.cgi?id=1347882 , I consider this
> particular discussion RESOLVED. This means Mozilla plans to take no action
> against GTS based on what has been discovered and discussed. It doesn't
> mean people can't continue to make suggestions about improvements to our
> process, citing this situation.
>

* Earlier this year, Google’s OCSP service was down for over 2 days [4].
During that time, concerns with Google’s incident reporting mechanism were
raised, but it is not clear that there was ever a policy violation. Google
supplied a fairly detailed incident report.
* The CP is so heavily derived from the BRs that it provides almost no
useful information. It includes repeated references to things that “the CA”
should or must do without clearly identifying Google as “the CA”.

==Bad==
NOTE: the issues listed below were addressed by Google after I reported
them, but I am reporting them in the  “bad” state in which I originally
found them.
* Version 2.2 of the CPS stated that domain validation method 1 was
performed for OV certificates. It did not state how domain validation is
performed for DV certificates. In addition to the fact that method #1 is
banned after 1-August, I do not believe this meets Mozilla policy section
2.2: “The CA's CP/CPS must clearly specify the procedure(s) that the CA
employs…”. Google has fixed this issue in CPS version 2.3, although it only
references BR section numbers to “clearly specify the procedures”.
* Section 6.1.1 of version 2.2 of the CPS can be interpreted to state that
the Google CA generates key pairs for its subscribers in violation of
Mozilla policy section 5.2. CPS version 2.3 has corrected this issue.
* The certificate profiles in CPS version 2.2 Appendix A indicated that TLS
certificates can be valid for up to 39 months. Google updated this to a max
validity period of 365 days in version 2.3.

This begins the 3-week comment period for this request [5].

I will greatly appreciate your thoughtful and constructive feedback on the
acceptance of these roots into the Mozilla CA program.

- Wayne

[1] https://bug1325532.bmoattachments.org/attachment.cgi?id=8844282
[2]
https://groups.google.com/d/msg/mozilla.dev.security.policy/1PDQv0GUW_s/oxDWH07VDgAJ
[3]
https://static.googleusercontent.com/media/pki.google.com/en//GIAG2-CPS-1.4.pdf
[4]
https://groups.google.com/d/msg/mozilla.dev.security.policy/MMO3HSYghwQ/XLRuxWtJAwAJ
[5] https://wiki.mozilla.org/CA/Application_Process
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to