Re: DigiCert Assured ID Root CA and Global Root CA EV Request

2018-12-15 Thread Peter Gutmann via dev-security-policy
Rob Stradling via dev-security-policy  
writes:

>The public exponent (65537) in https://crt.sh/?asn1=628933973 is encoded as
>02 04 00 01 00 01 (02=INTEGER, 04=length in bytes), whereas the only valid
>encoding is 02 03 01 00 01.

Yep, this is what dumpasn1 says about it:

 5574:   INTEGER 65537
 : Error: Integer '00 01 ...' has non-DER encoding.

Peter.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: DigiCert Assured ID Root CA and Global Root CA EV Request

2018-12-15 Thread Rob Stradling via dev-security-policy
Hi Jeremy.  Comments inline...

On 14/12/2018 02:23, Jeremy Rowley via dev-security-policy wrote:

> Here’s the breakdown:
> 
> FATAL: x509: RSA modulus is not a positive number
> 
> Bad reading of the BRs. The BRs say the range should be between 2^16+1 and 
> 2^256-1. The team implementing this thought saw SHOULD and thought it was 
> optional. They missed the sentence before which says the public exponent MUST 
> be equal to 3 or more. I’ll file and incident report on this.

No, you've misunderstood the error message.  You're talking about the 
requirements for the public exponent, but this lint issue refers to the 
RSA modulus.

The modulus (n) is the product of two prime numbers (p and q).  AIUI, 
it's not possible for a prime number to be negative, so n=p*q will 
always be positive.

> FATAL: asn1: structure error: integer not minimally-encoded
> 
> I think this one is a false positive? It’s caused by padded zeros which  
> aren’t expressly prohibited. Want us to revoke these?

No, this isn't a false positive.  The ASN.1 Distinguished Encoding Rules 
(DER) expressly prohibit this.

Quoting from X.690 12/97:
"8.3 Encoding of an integer value
...
8.3.2  If the contents octets of an integer value encoding consist of 
more than one octet, then the bits of the first octet and bit 8 of the 
second octet:
   a) shall not all be ones; and
   b) shall not all be zero.
NOTE – These rules ensure that an integer value is always encoded in the 
smallest possible number of octets."

The public exponent (65537) in https://crt.sh/?asn1=628933973 is encoded 
as 02 04 00 01 00 01 (02=INTEGER, 04=length in bytes), whereas the only 
valid encoding is 02 03 01 00 01.

>   ERROR: The common name field in subscriber certificates must include only 
> names from the SAN extension
> 
> This one is a false positive

Yes, I think so.  This must've been due to cached linting results, 
generated by an old linter version.

It's impractical to re-lint every cert known to crt.sh every time a 
linter is updated.  But to facilitate this particular discussion, I've 
relinted all of the certs issued by https://crt.sh/?caid=1191 for which 
lint issues had previously been identified.

> ERROR: DNSNames must have a valid TLD
> 
> This is a false positive

Yes, except for https://crt.sh/?id=845405886=zlint, which has been 
discussed previously:
https://www.mail-archive.com/dev-security-policy@lists.mozilla.org/msg10727.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1500621


> ERROR: CAs MUST NOT issue subscriber certificates with validity periods 
> longer than 39 months regardless of circumstance.
> 
> False positive

How long is a month?

It could be argued that this cert's validity period is 39 months + 12 hours:
https://crt.sh/?id=282328562=zlint,x509lint,cablint

Thankfully the BRs now define maximum validity periods in terms of days 
rather than months.


> ERROR: Subject name fields must not contain '.','-',' ' or any other 
> indication that the field has been omitted
> 
> False positive. The BRs say “All other optional attributes, when present 
> within the subject field, MUST contain information that has  been verified by 
> the CA. Optional attributes MUST NOT contain metadata such as ‘.’, ‘-‘, and ‘ 
> ‘ (i.e. space)  characters, and/or any other indication that the value is 
> absent, incomplete, or not applicable.” With the strict wording policy that 
> seems in effect, organizationalUnit is not “All other optional attributes”. 
> It’s a defined attribute and thus cannot be “other”.

You're right that Subject:organizationalUnitName doesn't fall under "All 
other optional attributes".

However, the second sentence begins "Optional attributes...".  The 
"other" qualifier is not there, and since Subject:organizationalUnitName 
is an optional attribute, it is in scope for the "MUST NOT contain 
metadata" requirement.

> ERROR: Explicit text has a maximum size of 200 characters
> 
> False positive I think….

Yes, this appears to be a bug in ZLint.

The User Notice string in https://crt.sh/?id=289322499=zlint is 169 
characters long.  It's a BMPString, so each character is encoded in 2 
octets.  Presumably ZLint is counting the number of bytes instead of the 
number of characters.

Note the x509lint warning "explicitText is not using a UTF8String" 
though, which stems from RFC5280 forbidding the use of BMPString in this 
context:
  "Conforming CAs SHOULD use the
   UTF8String encoding for explicitText, but MAY use IA5String.
   Conforming CAs MUST NOT encode explicitText as VisibleString or
   BMPString."

RFC6818 un-forbids it, but AFAICT the BRs don't recognize RFC6818.



-- 
Rob Stradling
Senior Research & Development Scientist
Sectigo Limited

___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: DigiCert Assured ID Root CA and Global Root CA EV Request

2018-12-13 Thread Jeremy Rowley via dev-security-policy
: DigiCert Assured ID Root CA and Global Root CA EV Request

 

My main concern with this request is the misissued certificates identified by 
linters that have not been revoked - I have included my comments and links from 
the original message below.

 

It appears that DigiCert is not planning to remediate these certificates - can 
a representative from DigiCert confirm that?

 

If these certificates are not revoked, I feel that it would be consistent with 
our treatment of other CAs to deny this request. I would appreciate everyone's 
opinion on that, and also if you think that the amount of misissuance is reason 
enough to deny this request, even if the misissuance is remediated.

 

=


[3] https://crt.sh/?caid=1687 
<https://crt.sh/?caid=1687=cablint,zlint,x509lint=2017-01-01> 
=cablint,zlint,x509lint=2017-01-01

[4] https://crt.sh/?id=629259396 <https://crt.sh/?id=629259396=cablint> 
=cablint

[5] https://bugzilla.mozilla.org/show_bug.cgi?id=1397958
[6]https://crt.sh/?caid=1191 
<https://crt.sh/?caid=1191=cablint,zlint,x509lint=2017-01-01> 
=cablint,zlint,x509lint=2017-01-01
[7] https://crt.sh/?id=286404787 <https://crt.sh/?id=286404787=zlint> 
=zlint
=

 

On Thu, Nov 29, 2018 at 4:17 PM Wayne Thayer mailto:wtha...@mozilla.com> > wrote:

I would appreciate it if we could move the discussion of exceptions to the 
deadline for revoking certificates containing underscores to a new thread.

 

As it relates to this request, any failure to meet the revocation deadline 
would trigger the creation of an incident bug. (that is unless we as a 
community decide otherwise)

 

I am not of the opinion that the existence of such a bug would change the 
outcome of this discussion. If others feel that it might, I am not opposed to 
holding the discussion open. Meanwhile, i'd suggest we stick to discussing the 
current facts of this request.

 

- Wayne



smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: DigiCert Assured ID Root CA and Global Root CA EV Request

2018-12-13 Thread Wayne Thayer via dev-security-policy
My main concern with this request is the misissued certificates identified
by linters that have not been revoked - I have included my comments and
links from the original message below.

It appears that DigiCert is not planning to remediate these certificates -
can a representative from DigiCert confirm that?

If these certificates are not revoked, I feel that it would be consistent
with our treatment of other CAs to deny this request. I would appreciate
everyone's opinion on that, and also if you think that the amount of
misissuance is reason enough to deny this request, even if the misissuance
is remediated.

=
* The TERENA SSL CA 3 subordinate has misissued a number of certificates
[3], most of which are not revoked. DigiCert’s response in this bug states
“We were under the impression from previous communications with Mozilla
that certain types of errors identified did not require certificate
revocation. It would help if Mozilla could indicate which certificate
errors are believed to require revocation. We will then review the lists to
see which certificates need to be revoked.” I do not believe that Mozilla
should create such a list, and we have set a precedent for requiring
revocation for at least some of the errors that are identified - e.g.
metadata in subject fields [4].
* In addition, DigiCert previously reported that they had addressed the
problem of metadata in subject fields for certificates issued by the Terena
subordinate [5].
* Linters identify a large number of misissued certificates under the
DigiCert SHA2 Secure Server CA intermediate [6]. Many of these are false
positives (e.g. ZLint expects CN and SAN fields to be lowercased), but some
are not and of those many are not revoked - e.g. [7].
* CPS section 3.2.2 did not, in my opinion, adequately specify the
procedures employed to perform email address verification as required by
Mozilla policy section 2.2(2). The latest update addressed this.

[3]
https://crt.sh/?caid=1687=cablint,zlint,x509lint=2017-01-01

> [4] https://crt.sh/?id=629259396=cablint
>
[5] https://bugzilla.mozilla.org/show_bug.cgi?id=1397958
[6]
https://crt.sh/?caid=1191=cablint,zlint,x509lint=2017-01-01
[7] https://crt.sh/?id=286404787=zlint
=

On Thu, Nov 29, 2018 at 4:17 PM Wayne Thayer  wrote:

> I would appreciate it if we could move the discussion of exceptions to the
> deadline for revoking certificates containing underscores to a new thread.
>
> As it relates to this request, any failure to meet the revocation deadline
> would trigger the creation of an incident bug. (that is unless we as a
> community decide otherwise)
>
> I am not of the opinion that the existence of such a bug would change the
> outcome of this discussion. If others feel that it might, I am not opposed
> to holding the discussion open. Meanwhile, i'd suggest we stick to
> discussing the current facts of this request.
>
> - Wayne
>
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: DigiCert Assured ID Root CA and Global Root CA EV Request

2018-11-29 Thread Ryan Sleevi via dev-security-policy
Sure, my intent was to keep it narrowed to understanding the potential
impact to this conversation.

I raise this concern because I think it would reflect poorly if these
certificates were not revoked. There has been past precedent - e.g. not
granting EV to Turktrust after misissuance came to light, post inclusion
process discussions - that are relevant and applicable to know whether this
precedent still holds. And, as Jeremy’s reply highlights, it sounds like
there is non-trivial risk of such actions happening.

I would find it difficult, especially if these certificates are EV
certificates, to believe that the standards are being upheld in a way that
deserves EV recognition if a CA does not make a timely revocation.
Similarly, there has been past precedent that failures are best called out
early, during the inclusion process, as they become more difficult to
remediate, short of distrust, once they are included, and thus are also
treated more seriously.

Given these past precedents, it should not seem unreasonable to suggest
that any recognition of EV is perhaps contingent upon no new incidents
coming to light in the weeks following such discussions. Alternatively, if
that is seen to be too extreme, that any incidents being shared following
that deadline should result in a return to public discussion, with the
default assumption being that EV will not be granted/be removed, might
equally provide a clearer set of expectations, and align with Mozilla’s
interest in ensuring CAs consistently meet expectations.
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: DigiCert Assured ID Root CA and Global Root CA EV Request

2018-11-29 Thread Wayne Thayer via dev-security-policy
I would appreciate it if we could move the discussion of exceptions to the
deadline for revoking certificates containing underscores to a new thread.

As it relates to this request, any failure to meet the revocation deadline
would trigger the creation of an incident bug. (that is unless we as a
community decide otherwise)

I am not of the opinion that the existence of such a bug would change the
outcome of this discussion. If others feel that it might, I am not opposed
to holding the discussion open. Meanwhile, i'd suggest we stick to
discussing the current facts of this request.

- Wayne

On Thu, Nov 29, 2018 at 2:17 PM Jeremy Rowley 
wrote:

> We can revoke them all by then. The question is do the browsers really
> want us to?
>
> Since we started a public discussion, here's the details:
>
> There are several prominent websites that use certs with underscore
> characters in connection with major operations. I was hoping to get
> permission to post the names of these companies before I started a public
> discussion, but se le vie - the discussion already started. These companies
> are currently in their blackout period which ends around mid-Jan. We're
> scheduled to revoke on Jan 14th per the BR change. However, we've heard
> back from several of them that they won't complete the migration by then.
> This will take down several of the Fortune 500's websites for a change in
> the BRs that no one can understand. What we're wondering is how the
> browsers feel about revocation vs. shutting down the sites. Public
> discussion is welcome while I still try to get the names. Unfortunately,
> most companies of that size require a legal review of the communication
> before we can post their name...
>
>
> -Original Message-
> From: dev-security-policy 
> On Behalf Of Ryan Sleevi via dev-security-policy
> Sent: Thursday, November 29, 2018 12:19 PM
> To: Wayne Thayer 
> Cc: mozilla-dev-security-policy <
> mozilla-dev-security-pol...@lists.mozilla.org>
> Subject: Re: DigiCert Assured ID Root CA and Global Root CA EV Request
>
> This deadline is roughly five weeks before all underscore certificates
> must be revoked (per Ballot SC12). Given the number of underscore
> certificates under various DigiCert operated hierarchies, would you think
> it appropriate to consider whether or not SC12 (and, prior to that, the
> existing BR requirements in force when those certificates were issued) was
> followed by that date?
>
> More concretely: If DigiCert were to fail to revoke certificates by that
> deadline, would it be a reason to consider denying EV status to these roots
> / removing (if a decision is made to grant) it?
>
> I realize the goal is to close discussion a month prior to that date, but
> I suspect such guidance about the risk of failing to abide by SC12, and
> failing to revoke by January 15, would be incredibly valuable to DigiCert
> and their customers.
>
> On Thu, Nov 29, 2018 at 1:39 PM Wayne Thayer via dev-security-policy <
> dev-security-policy@lists.mozilla.org> wrote:
>
> > Reminder: the 3-week discussion period for this request to EV-enable
> > two DigiCert roots ends next Friday 7-December.
> >
> > - Wayne
> >
> > On Fri, Nov 16, 2018 at 5:00 PM Wayne Thayer 
> wrote:
>
>
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: DigiCert Assured ID Root CA and Global Root CA EV Request

2018-11-29 Thread Jeremy Rowley via dev-security-policy
We can revoke them all by then. The question is do the browsers really want us 
to? 

Since we started a public discussion, here's the details:

There are several prominent websites that use certs with underscore characters 
in connection with major operations. I was hoping to get permission to post the 
names of these companies before I started a public discussion, but se le vie - 
the discussion already started. These companies are currently in their blackout 
period which ends around mid-Jan. We're scheduled to revoke on Jan 14th per the 
BR change. However, we've heard back from several of them that they won't 
complete the migration by then. This will take down several of the Fortune 
500's websites for a change in the BRs that no one can understand. What we're 
wondering is how the browsers feel about revocation vs. shutting down the 
sites. Public discussion is welcome while I still try to get the names. 
Unfortunately, most companies of that size require a legal review of the 
communication before we can post their name...


-Original Message-
From: dev-security-policy  On 
Behalf Of Ryan Sleevi via dev-security-policy
Sent: Thursday, November 29, 2018 12:19 PM
To: Wayne Thayer 
Cc: mozilla-dev-security-policy 
Subject: Re: DigiCert Assured ID Root CA and Global Root CA EV Request

This deadline is roughly five weeks before all underscore certificates must be 
revoked (per Ballot SC12). Given the number of underscore certificates under 
various DigiCert operated hierarchies, would you think it appropriate to 
consider whether or not SC12 (and, prior to that, the existing BR requirements 
in force when those certificates were issued) was followed by that date?

More concretely: If DigiCert were to fail to revoke certificates by that 
deadline, would it be a reason to consider denying EV status to these roots / 
removing (if a decision is made to grant) it?

I realize the goal is to close discussion a month prior to that date, but I 
suspect such guidance about the risk of failing to abide by SC12, and failing 
to revoke by January 15, would be incredibly valuable to DigiCert and their 
customers.

On Thu, Nov 29, 2018 at 1:39 PM Wayne Thayer via dev-security-policy < 
dev-security-policy@lists.mozilla.org> wrote:

> Reminder: the 3-week discussion period for this request to EV-enable 
> two DigiCert roots ends next Friday 7-December.
>
> - Wayne
>
> On Fri, Nov 16, 2018 at 5:00 PM Wayne Thayer  wrote:
>
> > This request is to enable EV treatment for the DigiCert Assured ID 
> > Root
> CA
> > and DigiCert Global Root CA as documented in the following bug:
> > https://clicktime.symantec.com/a/1/adm9pTelz2Ycom-02ypNzTJ8tHbaHBnhr
> > 4KpinQCwlc=?d=zggbfQ2UquIn-SV-ucU3iLEdxhFMiq9MN3zVHKS1lUo4wrDAUuqZ60
> > I9shljs32UPhv8ZKpenr8hGgACWBJQrC9TNT4MdeUNlx4r0FqYnMxjtk9I9D49tOkWtZ
> > wj0sxrbkFcuZl85ZMSfeIlCdKJ96uNLEdf69FG7V89Toz5h22AkEfM_tEXPrs3ti_Yzn
> > whbxUEM3Sl81xgMn2mpjaK7cCHEKPqRh8Dn_R4vcnJy6zt5RgUOFuv1qN6pb42VMrWou
> > Oh1_O4h9kg5tdN2MXZWioTc_3R_vMMU9o2nZiqPiouWRNjh4TEGzFOR8SlK0FjgcpInY
> > iEi2JE0QsZhnVjv7YlCCPUTD2FS8gGmmV2uvocQ50Z2diXYy3hVHEUMrM60G6enQ8T53
> > MtwMtvuAgtBBYQhASQcVfUJLruxU2rEDumYU2H0S1WsiMlCf8oIda7Z3kTsfw77J6kIe
> > JAcE67idnv=https%3A%2F%2Fbugzilla.mozilla.org%2Fshow_bug.cgi%3Fid%
> > 3D1165472
> >
> > * BR Self Assessment is here:
> > https://clicktime.symantec.com/a/1/yUphkRZlY4hiWQzfLqXz_e6_F7P6T9IN6
> > gvhgZ8YgRI=?d=zggbfQ2UquIn-SV-ucU3iLEdxhFMiq9MN3zVHKS1lUo4wrDAUuqZ60
> > I9shljs32UPhv8ZKpenr8hGgACWBJQrC9TNT4MdeUNlx4r0FqYnMxjtk9I9D49tOkWtZ
> > wj0sxrbkFcuZl85ZMSfeIlCdKJ96uNLEdf69FG7V89Toz5h22AkEfM_tEXPrs3ti_Yzn
> > whbxUEM3Sl81xgMn2mpjaK7cCHEKPqRh8Dn_R4vcnJy6zt5RgUOFuv1qN6pb42VMrWou
> > Oh1_O4h9kg5tdN2MXZWioTc_3R_vMMU9o2nZiqPiouWRNjh4TEGzFOR8SlK0FjgcpInY
> > iEi2JE0QsZhnVjv7YlCCPUTD2FS8gGmmV2uvocQ50Z2diXYy3hVHEUMrM60G6enQ8T53
> > MtwMtvuAgtBBYQhASQcVfUJLruxU2rEDumYU2H0S1WsiMlCf8oIda7Z3kTsfw77J6kIe
> > JAcE67idnv=https%3A%2F%2Fbug1165472.bmoattachments.org%2Fattachmen
> > t.cgi%3Fid%3D8960346
> >
> > * Summary of Information Gathered and Verified:
> > https://clicktime.symantec.com/a/1/25vbrlC4oNIH-rmRpBBOoNpXg9-MyHD3b
> > Arsg3rBYtU=?d=zggbfQ2UquIn-SV-ucU3iLEdxhFMiq9MN3zVHKS1lUo4wrDAUuqZ60
> > I9shljs32UPhv8ZKpenr8hGgACWBJQrC9TNT4MdeUNlx4r0FqYnMxjtk9I9D49tOkWtZ
> > wj0sxrbkFcuZl85ZMSfeIlCdKJ96uNLEdf69FG7V89Toz5h22AkEfM_tEXPrs3ti_Yzn
> > whbxUEM3Sl81xgMn2mpjaK7cCHEKPqRh8Dn_R4vcnJy6zt5RgUOFuv1qN6pb42VMrWou
> > Oh1_O4h9kg5tdN2MXZWioTc_3R_vMMU9o2nZiqPiouWRNjh4TEGzFOR8SlK0FjgcpInY
> > iEi2JE0QsZhnVjv7YlCCPUTD2FS8gGmmV2uvocQ50Z2diXYy3hVHEUMrM60G6enQ8T53
> > MtwMtvuAgtBBYQhASQcVfUJLruxU2rEDumYU2H0S1WsiMlCf8oIda7Z3kTsfw77J6kIe
> > JAcE67idnv=https%3A%2F%2Fbug1165472.bmoattachments.org%2Fattachmen
> > t.cgi%3Fid%3D8987141
> 

Re: DigiCert Assured ID Root CA and Global Root CA EV Request

2018-11-29 Thread Ryan Sleevi via dev-security-policy
This deadline is roughly five weeks before all underscore certificates must
be revoked (per Ballot SC12). Given the number of underscore certificates
under various DigiCert operated hierarchies, would you think it appropriate
to consider whether or not SC12 (and, prior to that, the existing BR
requirements in force when those certificates were issued) was followed by
that date?

More concretely: If DigiCert were to fail to revoke certificates by that
deadline, would it be a reason to consider denying EV status to these roots
/ removing (if a decision is made to grant) it?

I realize the goal is to close discussion a month prior to that date, but I
suspect such guidance about the risk of failing to abide by SC12, and
failing to revoke by January 15, would be incredibly valuable to DigiCert
and their customers.

On Thu, Nov 29, 2018 at 1:39 PM Wayne Thayer via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> Reminder: the 3-week discussion period for this request to EV-enable two
> DigiCert roots ends next Friday 7-December.
>
> - Wayne
>
> On Fri, Nov 16, 2018 at 5:00 PM Wayne Thayer  wrote:
>
> > This request is to enable EV treatment for the DigiCert Assured ID Root
> CA
> > and DigiCert Global Root CA as documented in the following bug:
> > https://bugzilla.mozilla.org/show_bug.cgi?id=1165472
> >
> > * BR Self Assessment is here:
> > https://bug1165472.bmoattachments.org/attachment.cgi?id=8960346
> >
> > * Summary of Information Gathered and Verified:
> > https://bug1165472.bmoattachments.org/attachment.cgi?id=8987141
> >
> > * Root Certificate Download URLs:
> > ** Global: https://www.digicert.com/CACerts/DigiCertGlobalRootCA.crt
> > ** Assured: https://www.digicert.com/CACerts/DigiCertAssuredIDRootCA.crt
> >
> > * CP/CPS:
> > ** CP:
> > https://www.digicert.com/wp-content/uploads/2018/08/DigiCert_CP_v416.pdf
> > ** CPS:
> >
> https://www.digicert.com/wp-content/uploads/2018/08/DigiCert_CPS_v416.pdf
> >
> > * These roots are already included with Websites and Email trust bits. EV
> > treatment is requested.
> > ** EV Policy OID: 2.23.140.1.1
> > ** Original inclusion request:
> > https://bugzilla.mozilla.org/show_bug.cgi?id=364568
> >
> > * Test Websites:
> > ** Global:
> > *** Valid: https://global-root-ca.chain-demos.digicert.com/
> > ***Expired: https://global-root-ca-expired.chain-demos.digicert.com/
> > *** Revoked: https://global-root-ca-revoked.chain-demos.digicert.com/
> > ** Assured:
> > *** Valid: https://assured-id-root-ca.chain-demos.digicert.com/
> > ***Expired: https://assured-id-root-ca-expired.chain-demos.digicert.com/
> > *** Revoked:
> https://assured-id-root-ca-revoked.chain-demos.digicert.com/
> >
> > * CRL URLs:
> > ** Global: http://crl3.digicert.com/DigiCertGlobalRootCA.crl and
> > http://crl4.digicert.com/DigiCertGlobalRootCA.crl
> > ** Assured: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl and
> > http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl
> >
> > * OCSP URL: http://ocsp.digicert.com/
> >
> > * Audit: Annual audits are performed by Scott S Perry, CPA according to
> > the WebTrust for CA, BR, and EV audit criteria.
> > ** WebTrust: https://cert.webtrust.org/ViewSeal?id=2452
> > ** BR: https://www.cpacanada.ca/webtrustseal?sealid=2453
> > ** EV: https://www.cpacanada.ca/webtrustseal?sealid=2454
> >
> > Additionally, DigiCert is undergoing quarterly audits (due to the
> Symantec
> > acquisition) that include the DigiCert Global Root CA and has been
> posting
> > the reports [1].
> >
> >
> > I’ve reviewed the CPS, BR Self Assessment, and related information for
> the
> > DigiCert Assured ID Root CA and DigiCert Global Root CA request that is
> > being tracked in this bug and have the following comments:
> >
> > ==Good==
> > * Other than my two comments below, the CP and CPS are in good shape and
> > they are well written and regularly updated.
> >
> > ==Meh==
> > * These are old roots, created in 2006, however, DigiCert has provided a
> > continuous chain of audits back to their creation [1]
> > * CPS section 3.2.2 permitted DigiCert to use vulnerable BR domain
> > validation methods 3.2.2.4.9 and 3.2.2.4.10. They are described as
> > deprecated in the latest version.
> > * DigiCert has had quite a number of compliance bugs over the past 18
> > months [2]. All but one is resolved (that one is awaiting the subordinate
> > CA to move to a managed PKI), DigiCert is generally responsive, and they
> > have self-reported a number of these issues.
> >
> > ==Bad==
> > * DigiCert’s most recent quarterly audit report states “During our
> > examination, we noted DigiCert publicly reported (
> > https://bugzilla.mozilla.org/show_bug.cgi?id=1483715) that it continued
> > to rely on a deprecated method of domain validation when renewing
> > certificates after the stated transition date of August 1, 2018. As a
> > result, DigiCert had to revalidate all affected 1233 certificates over
> 154
> > domains.“ At least one of the certificates the required 

Re: DigiCert Assured ID Root CA and Global Root CA EV Request

2018-11-29 Thread Wayne Thayer via dev-security-policy
Reminder: the 3-week discussion period for this request to EV-enable two
DigiCert roots ends next Friday 7-December.

- Wayne

On Fri, Nov 16, 2018 at 5:00 PM Wayne Thayer  wrote:

> This request is to enable EV treatment for the DigiCert Assured ID Root CA
> and DigiCert Global Root CA as documented in the following bug:
> https://bugzilla.mozilla.org/show_bug.cgi?id=1165472
>
> * BR Self Assessment is here:
> https://bug1165472.bmoattachments.org/attachment.cgi?id=8960346
>
> * Summary of Information Gathered and Verified:
> https://bug1165472.bmoattachments.org/attachment.cgi?id=8987141
>
> * Root Certificate Download URLs:
> ** Global: https://www.digicert.com/CACerts/DigiCertGlobalRootCA.crt
> ** Assured: https://www.digicert.com/CACerts/DigiCertAssuredIDRootCA.crt
>
> * CP/CPS:
> ** CP:
> https://www.digicert.com/wp-content/uploads/2018/08/DigiCert_CP_v416.pdf
> ** CPS:
> https://www.digicert.com/wp-content/uploads/2018/08/DigiCert_CPS_v416.pdf
>
> * These roots are already included with Websites and Email trust bits. EV
> treatment is requested.
> ** EV Policy OID: 2.23.140.1.1
> ** Original inclusion request:
> https://bugzilla.mozilla.org/show_bug.cgi?id=364568
>
> * Test Websites:
> ** Global:
> *** Valid: https://global-root-ca.chain-demos.digicert.com/
> ***Expired: https://global-root-ca-expired.chain-demos.digicert.com/
> *** Revoked: https://global-root-ca-revoked.chain-demos.digicert.com/
> ** Assured:
> *** Valid: https://assured-id-root-ca.chain-demos.digicert.com/
> ***Expired: https://assured-id-root-ca-expired.chain-demos.digicert.com/
> *** Revoked: https://assured-id-root-ca-revoked.chain-demos.digicert.com/
>
> * CRL URLs:
> ** Global: http://crl3.digicert.com/DigiCertGlobalRootCA.crl and
> http://crl4.digicert.com/DigiCertGlobalRootCA.crl
> ** Assured: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl and
> http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl
>
> * OCSP URL: http://ocsp.digicert.com/
>
> * Audit: Annual audits are performed by Scott S Perry, CPA according to
> the WebTrust for CA, BR, and EV audit criteria.
> ** WebTrust: https://cert.webtrust.org/ViewSeal?id=2452
> ** BR: https://www.cpacanada.ca/webtrustseal?sealid=2453
> ** EV: https://www.cpacanada.ca/webtrustseal?sealid=2454
>
> Additionally, DigiCert is undergoing quarterly audits (due to the Symantec
> acquisition) that include the DigiCert Global Root CA and has been posting
> the reports [1].
>
>
> I’ve reviewed the CPS, BR Self Assessment, and related information for the
> DigiCert Assured ID Root CA and DigiCert Global Root CA request that is
> being tracked in this bug and have the following comments:
>
> ==Good==
> * Other than my two comments below, the CP and CPS are in good shape and
> they are well written and regularly updated.
>
> ==Meh==
> * These are old roots, created in 2006, however, DigiCert has provided a
> continuous chain of audits back to their creation [1]
> * CPS section 3.2.2 permitted DigiCert to use vulnerable BR domain
> validation methods 3.2.2.4.9 and 3.2.2.4.10. They are described as
> deprecated in the latest version.
> * DigiCert has had quite a number of compliance bugs over the past 18
> months [2]. All but one is resolved (that one is awaiting the subordinate
> CA to move to a managed PKI), DigiCert is generally responsive, and they
> have self-reported a number of these issues.
>
> ==Bad==
> * DigiCert’s most recent quarterly audit report states “During our
> examination, we noted DigiCert publicly reported (
> https://bugzilla.mozilla.org/show_bug.cgi?id=1483715) that it continued
> to rely on a deprecated method of domain validation when renewing
> certificates after the stated transition date of August 1, 2018. As a
> result, DigiCert had to revalidate all affected 1233 certificates over 154
> domains.“ At least one of the certificates the required revalidation chains
> to the DigiCert Global Root CA.
> * The TERENA SSL CA 3 subordinate has misissued a number of certificates
> [3], most of which are not revoked. DigiCert’s response in this bug states
> “We were under the impression from previous communications with Mozilla
> that certain types of errors identified did not require certificate
> revocation. It would help if Mozilla could indicate which certificate
> errors are believed to require revocation. We will then review the lists to
> see which certificates need to be revoked.” I do not believe that Mozilla
> should create such a list, and we have set a precedent for requiring
> revocation for at least some of the errors that are identified - e.g.
> metadata in subject fields [4].
> * In addition, DigiCert previously reported that they had addressed the
> problem of metadata in subject fields for certificates issued by the Terena
> subordinate [5].
> * Linters identify a large number of misissued certificates under the
> DigiCert SHA2 Secure Server CA intermediate [6]. Many of these are false
> positives (e.g. ZLint expects CN and SAN fields to be