I believe that the discussion over Certigna's reported CAA misissuance
[1][2] has reached an end, even though some questions remain unanswered. If
anyone has additional comments or concerns about this inclusion request,
please respond by Friday 26-October. This request [3] has been in
discussion since April 2017 and I would like to bring it to a conclusion
soon.

- Wayne

[1]
https://groups.google.com/d/msg/mozilla.dev.security.policy/mVD1QoGXBOQ/EkYklywRBAAJ
[2] https://bugzilla.mozilla.org/show_bug.cgi?id=1485413
[3] https://bugzilla.mozilla.org/show_bug.cgi?id=1265683

On Wed, Sep 12, 2018 at 11:44 PM Wayne Thayer <[email protected]> wrote:

> On Tue, Sep 11, 2018 at 12:37 AM josselin.allemandou--- via
> dev-security-policy <[email protected]> wrote:
>
>> Hello,
>>
>> Thanks Wayne and Devon for your reply.
>>
>> We took the time to respond because we wanted to verify through an audit
>> that the SSL certificate requests processed since September 8th were in
>> compliance with the CA/B Forum requirements for DNS CAA record checks.
>>
>> >
> Excellent!
> >
>
>> In general, this has been the case, because we have only one case, where
>> the request was authorized by a Registration Officer, despite the alert
>> that had been raised on this subject.
>>
>> We checked the logs of the controls carried out and re-rolled these
>> controls on all the SSL certificates issued since September 8th and confirm
>> that only this certificate was the object of a failure. We have created an
>> incident as required (see URL:
>> https://groups.google.com/forum/#!topic/mozilla.dev.security.policy/mVD1QoGXBOQ)
>> for this certificate which has not yet been deployed and used by the
>> applicant. I confirm that we proceeded to the revocation of this
>> certificate which is now included in our CRL with the following serial
>> number: 476abeb2bc78d588ef4b8f27dbd25f6a (see
>> http://crl.certigna.fr/servicesca.crl).
>>
>> Note that this incident will not be able to happen again by means of our
>> new practices that automatically block and without possible bypass by the
>> RA, any certificate request for which the DNS CAA record controls induce
>> that the CA is not allowed to issue. These practices are described in the
>> latest updated versions of our CP/CPS.
>>
>> >
> I will respond to this in the separate thread for the incident report.
> >
>
>> We have updated our CPs and CPSs to address the different points reported
>> by Devon:
>> -       We clarified the roles and controls performed by the RA and the
>> DRAs;
>> -       We updated the practices implemented for the control of DNS CAA
>> records;
>> -       We have specified the conditions of generation and signature of
>> certificates by the root CA. As a reminder, these certificates are
>> exclusively reserved for the intermediary authorities of our organization
>> and are handled through Key Ceremonies involving several trusted roles
>> knowing that our root CAs are Offline, and are not intended for customers
>> request.
>>
>> Could you tell us if you would like additional information and if these
>> provided to CP/CPS are sufficient for you?
>>
>> >
> Devon confirmed to me that he is satisfied with these updates.
> >
>
>> Thanking you in advance for your help and your reply.
>>
>> Best regards
>>
>>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to