On Tue, Sep 11, 2018 at 12:37 AM josselin.allemandou--- via
dev-security-policy <[email protected]> wrote:

> Hello,
>
> Thanks Wayne and Devon for your reply.
>
> We took the time to respond because we wanted to verify through an audit
> that the SSL certificate requests processed since September 8th were in
> compliance with the CA/B Forum requirements for DNS CAA record checks.
>
> >
Excellent!
>

> In general, this has been the case, because we have only one case, where
> the request was authorized by a Registration Officer, despite the alert
> that had been raised on this subject.
>
> We checked the logs of the controls carried out and re-rolled these
> controls on all the SSL certificates issued since September 8th and confirm
> that only this certificate was the object of a failure. We have created an
> incident as required (see URL:
> https://groups.google.com/forum/#!topic/mozilla.dev.security.policy/mVD1QoGXBOQ)
> for this certificate which has not yet been deployed and used by the
> applicant. I confirm that we proceeded to the revocation of this
> certificate which is now included in our CRL with the following serial
> number: 476abeb2bc78d588ef4b8f27dbd25f6a (see
> http://crl.certigna.fr/servicesca.crl).
>
> Note that this incident will not be able to happen again by means of our
> new practices that automatically block and without possible bypass by the
> RA, any certificate request for which the DNS CAA record controls induce
> that the CA is not allowed to issue. These practices are described in the
> latest updated versions of our CP/CPS.
>
> >
I will respond to this in the separate thread for the incident report.
>

> We have updated our CPs and CPSs to address the different points reported
> by Devon:
> -       We clarified the roles and controls performed by the RA and the
> DRAs;
> -       We updated the practices implemented for the control of DNS CAA
> records;
> -       We have specified the conditions of generation and signature of
> certificates by the root CA. As a reminder, these certificates are
> exclusively reserved for the intermediary authorities of our organization
> and are handled through Key Ceremonies involving several trusted roles
> knowing that our root CAs are Offline, and are not intended for customers
> request.
>
> Could you tell us if you would like additional information and if these
> provided to CP/CPS are sufficient for you?
>
> >
Devon confirmed to me that he is satisfied with these updates.
>

> Thanking you in advance for your help and your reply.
>
> Best regards
>
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to