Microsoft will use the CAB Forum OID 2.23.140.1.1 for EV.

Unless a CA has an existing EV policy OID associated with root(s) in our
program, we have been strongly encouraging the use of the CAB Forum OID.

This request is past the 3-week minimum discussion period. If no
significant comments are posted, I will close it on Tuesday 10-September.

- Wayne

On Mon, Aug 19, 2019 at 2:57 AM Daniel Marschall via dev-security-policy <
[email protected]> wrote:

>
> Hello,
>
> Is there an EV Policy OID assigned? I can't find it.
>
> - Daniel
>
>
> Am Mittwoch, 14. August 2019 00:42:44 UTC+2 schrieb Wayne Thayer:
> > This request is for inclusion of the Microsoft RSA Root Certificate
> > Authority 2017, Microsoft ECC Root Certificate Authority 2017, Microsoft
> EV
> > RSA Root Certificate Authority 2017, and Microsoft EV ECC Root
> Certificate
> > Authority 2017 trust anchors as documented in the following bug:
> > https://bugzilla.mozilla.org/show_bug.cgi?id=1448093
> >
> > * BR Self Assessment is
> > https://bugzilla.mozilla.org/attachment.cgi?id=8989260
> >
> > * Summary of Information Gathered and Verified:
> >
> https://ccadb-public.secure.force.com/mozilla/PrintViewForCase?CaseNumber=00000275
> >
> > * Root Certificate Download URL:
> > https://www.microsoft.com/pkiops/docs/repository.htm
> >
> > * CP/CPS:
> > ** CP:
> >
> https://www.microsoft.com/pkiops/Docs/Content/policy/Microsoft_PKI_Services_CP_v3.1.2.pdf
> > ** CPS:
> >
> https://www.microsoft.com/pkiops/Docs/Content/policy/Microsoft_PKI_Services_CPS_v3.1.3.pdf
> >
> > * This request is to include the roots with the websites trust bit
> enabled,
> > and with EV treatment.
> >
> > * Test Websites
> > ** Valid: https://actrsaevroot2017.pki.microsoft.com/,
> > https://actrsaroot2017.pki.microsoft.com/,
> > https://acteccevroot2017.pki.microsoft.com/,
> > https://acteccroot2017.pki.microsoft.com/
> > ** Expired: https://exprsaevroot2017.pki.microsoft.com/,
> > https://exprsaroot2017.pki.microsoft.com/,
> > https://expeccevroot2017.pki.microsoft.com/,
> > https://expeccroot2017.pki.microsoft.com/
> > ** Revoked: https://rvkrsaevroot2017.pki.microsoft.com/,
> > https://rvkrsaroot2017.pki.microsoft.com/,
> > https://rvkeccevroot2017.pki.microsoft.com/,
> > https://rvkeccroot2017.pki.microsoft.com/
> >
> > * CRL URLs:
> > ** ECC:
> >
> http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Root%20Certificate%20Authority%202017.crl
> > ** RSA:
> >
> http://www.microsoft.com/pkiops/crl/Microsoft%20RSA%20Root%20Certificate%20Authority%202017.crl
> > ** EV ECC:
> >
> http://www.microsoft.com/pkiops/crl/Microsoft%20EV%20ECC%20Root%20Certificate%20Authority%202017.crl
> > ** EV RSA:
> >
> http://www.microsoft.com/pkiops/crl/Microsoft%20EV%20RSA%20Root%20Certificate%20Authority%202017.crl
> >
> > * OCSP URL:http://ocsp.msocsp.com
> >
> > * Audit: Annual audits are performed by BDO according to the WebTrust for
> > CA, BR, and EV audit criteria.
> > ** WebTrust for CA:
> https://bugzilla.mozilla.org/attachment.cgi?id=9083810
> > ** BR: https://bugzilla.mozilla.org/attachment.cgi?id=9083812
> > ** EV: https://bugzilla.mozilla.org/attachment.cgi?id=9083813
> >
> > I’ve reviewed the CP, CPS, BR Self Assessment, and related information
> for
> > inclusion of the Microsoft roots that are being tracked in this bug and
> > have the following comments:
> >
> > ==Good==
> > * A root key generation ceremony audit report has been provided [1].
> >
> > ==Meh==
> > * CPS section 3.2.4 stated that OU is not verified, however, BR section
> > 7.1.4.2.2(i) does place requirements on this field, and the CPS made it
> > unclear if these requirements are met. This was clarified in the latest
> > version of the CPS.
> > * CPS section 3.2.5 stated that Microsoft PKI Services shall verify
> > authority for all certificate requests, and that for Domain Validated
> > requests, this is done using one of the methods described in the BRs.
> > Section 3.2.5 of the BRs only describes validation of authority for OV
> > certificates using a reliable method of communication. This was clarified
> > in the latest version of the CPS.
> > * CPS section 6.1.5 indicated that P-512 keys may be used, which would
> > violate Mozilla policy. This was corrected in the latest version of the
> CPS.
> > * The content-type header in CRL responses is not set to
> > 'application/pkix-crl' but to 'application/octet-stream' (RFC 5280,
> section
> > 4.2.1.13). Microsoft explanation: the reason for the content-type being
> set
> > to octet-stream is that we use a content upload service at Microsoft that
> > hosts different types of content. All of the content in the service is
> > hosted in Azure’s BLOB storage and the content type by default is octet
> > stream. This has not been an issue because the browsers will resolve the
> > file type based on the extension in the file name. It should also be
> noted
> > that the RFC 5280 shows SHOULD rather than MUST.
> >
> > ==Bad==
> > * It had been more than a year since the CP was updated when I reviewed
> > this request. CPS and BR section 2 require annual updates. The CP was
> > updated on 5-August.
> > * CP/CPS section 1.5.2 did not meet the BR 4.9.3 requirement to provide
> > clear problem reporting instructions. This was corrected in the latest
> > versions of the CP and CPS.
> > * A number of unrevoked certificates chaining to the Microsoft RSA Root
> > Certificate Authority 2017 have recently been issued with BR violations
> [2]
> >
> > This begins the 3-week comment period for this request [3].
> >
> > I will greatly appreciate your thoughtful and constructive feedback on
> the
> > acceptance of these roots into the Mozilla CA program.
> >
> > - Wayne
> >
> > [1] https://bug1448093.bmoattachments.org/attachment.cgi?id=8986854
> > [2]
> >
> https://crt.sh/?caid=109424&opt=cablint,zlint,x509lint&minNotBefore=2019-05-01
> > [3] https://wiki.mozilla.org/CA/Application_Process
>
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to