Hi, Watson ,

    Please see in lines.

[email protected] 在 2021年8月5日 星期四下午1:20:15 [UTC+8] 的信中寫道:

> On Tue, Aug 3, 2021 at 8:00 AM Ben Wilson <[email protected]> wrote: 
> > 
> > Chunghwa Telecom 
> > 
> > This is to announce the beginning of the public discussion phase of the 
> Mozilla root CA inclusion process for Chunghwa Telecom’s request to include 
> the HiPKI Root CA - G1 Certificate in the root store as an TLS/SSL-only 
> root CA. See 
> https://wiki.mozilla.org/CA/Application_Process#Process_Overview, (Steps 
> 4 through 9). 
> > 
>
> I have a number of questions related to statements in the CP and CPS 
> that hopefully can be cleared up. There's a number of small 
> infelicities,likely due to my misunderstanding or ignorance. 


>
> The CP refesr to security levels from 1 to 4. However any CA can 
> issue a certificate for any domain name: is there a minimum security 
> level CAs will be obliged to meet for signing?


First of all, we have defined 4 identity assurance levels (IAL), not 
security levels, in HiPKI CP like NIST SP800-63, and each subscriber 
certificate will have a CP OID defined by CABF and may have an identity 
assurance level(IAL) OID arc in it. 

>From HiPKI CP, Section 1.2: 

If any part is not regulated under the documents of CA/Browser Forum, the 
rule of assurance level 1 is applicable for CAs that issue DV TLS/SSL 
certificates, and the rule of assurance level 3 is applicable for CAs that 
issue EV and OV TLS/SSL certificates. For CAs that issue self-signed, 
self-issued, and cross-certified certificates, the rule of assurance level 
4 is always applicable.

As you can see in Sections 3.2.2 and 3.2.5 of HiPKI CP, we will made the 
authentication of organization identity and validation of authority prior 
to the issuance of any certificates. In practice, CP OIDs and certificate 
profile are set for each CA as a mean of asserting compliance with our 
HiPKI CP. 
 

>
>
> In section 6.6. of the CP 2 it's stated that level 4 means Webtrust 
> security practices must be followed, but then in section 8 it says 
> that a compliannce audit with Webtrust must be conducted for every 
> Level 2 or higher CA. These seem at odds to me.


Thank you for your comments, we found that a paragraph was missed in 
Section 6.6.2 after translation from original and a typo was happened in 
Section 8.  

Here is the changes to these two paragraph: 

(a)   In Section 6.6.2, 

We will add “(4) CAs shall perform security management controls that comply 
with WebTrust for CA” in the right column corresponding Assurance Level 1 
to 3. 

(b)   In Section 8, 

“The CA that issues assurance level 2 or higher certificates ...”  

will be changed to 

“The CA that issues assurance level 1 or higher certificates…” 

>
>
> For the CPS of the intermediate CA I see that section 3.2.5.2 lists a 
> number of ways to validate domain control. I'd like to understand what 
> risk assessment has been done of each of these methods, some of which 
> seem more amenable to automation than others. There doesn't seem to be 
> any statement about automating this process. 


We have done a risk assessment, including keep pay attention to the 
discussions in Validation Subcommittee of the Server Certificate Working 
Group of CA/B Forum. These methods are acceptable methods that we think we 
can bear the risks after evaluation, and surely CAs need to be equipped 
with some verification mechanisms to prevent malicious behavior and other 
requests. As for domain control methods, of course we will continue to work 
hard to make these methods more automated in our RA system, and we have 
more resource to support than other CAs because our company is a domain 
name registrar of the base domain name and a telecommunications company as 
well. I think these designs are depends for each CAs where BR didn’t ask 
CAs to mention this and it’s real hard to do so by wording in fact.  

 

> Section 4.2.1.1 is a bit 
> funny: I agree it's the right result to get the applicant to fix their 
> busted CAA record, and after confirming its correct issue the EV cert 
> (assuming all other checks went through) but it does seem a bit funny 
> to me in the way its worded.


This is a bad case, and the sentences below will be deleted in our CPS. 

“If the DNS resource record of CAA exists, and has not named HiPKI EV TLS 
CA as the CA to authorize the issuance of the EV TLS/SSL certificate, HiPKI 
EV TLS CA will deem that the certificate application agrees to authorize 
HiPKI EV TLS CA to issue the EV TLS/SSL certificate for that complete 
domain name, and require the subscriber to visit the DNS for updating the 
DNS resource record of CAA, in order to have HiPKI EV TLS CA included in 
the record, and the EV TLS/SSL certificate will be issued afterwards.”

 

Thanks again for your comments, which help us a lot. 

         Li-Chun 

         Chunghwa Telecom Co., Ltd. 

>
>

-- 
You received this message because you are subscribed to the Google Groups 
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/95365183-9119-428a-b736-98b306176c1bn%40mozilla.org.

Reply via email to