Introduction:

I have been reviewing the inclusion requests of Austrian CAs which are 
inter-related to each other and I think to have gathered enough 
information in order to make a recommendation. This report was compiled 
by the documentation made available by the requesters on Bugzilla and 
other web sites, mainly that of RTR. The review I performed could be 
described as extensive and this report is my conclusion on the subject 
which includes only the most important points, but anything not known to 
me as of this writing might change various aspects of this report. I 
have a good knowledge in PKI and master the German language natively.

Under consideration for inclusion are three requests:

Austrian TCC: 
http://www.mozilla.org/projects/security/certs/pending/#Austrian%20TCC
ARGE DATEN: 
http://www.mozilla.org/projects/security/certs/pending/#ARGE%20DATEN
A-Trust: http://www.mozilla.org/projects/security/certs/pending/#A-Trust

Relevant Bugzilla entries are:

Austrian TCC: https://bugzilla.mozilla.org/show_bug.cgi?id=373174
ARGE DATEN: https://bugzilla.mozilla.org/show_bug.cgi?id=348987
A-Trust: https://bugzilla.mozilla.org/show_bug.cgi?id=373746



General Information:

1.)
Telekom-Control Commission was established under the Telecommunications 
Act (TKG) of 1997 as the regulatory authority for the Austrian 
telecommunications market. The Telekom-Control Commission was also 
assigned responsibility as supervisory authority for electronic 
signatures in Austria. In carrying out its supervisory activities, the 
Telekom-Control Commission uses the Services of RTR GmbH which is 
responsible for maintaining Austria's directories of 
certification-service-providers.

RTR as performed an ETSI based audit in 2002 which was performed by 
"Secure Information Technology Center - Austria". I have no information 
available about the auditor. TCC has one root certificate and five 
intermediate certificates which are used for the issuing of 
(intermediate) certificates to service providers in Austria. TCC doesn't 
issue end user certificates.

2.)
There are no minimal verification requirements placed on CAs except 
notification to TCC, which doesn't have any special meaning beyond that. 
TCC however issues intermediate certificates to the CAs and provides a 
list of them at their web site: 
http://www.signatur.rtr.at/en/providers/services.html

    References:
     From http://signatur.rtr.at/en/legal/overview.html  and
    http://www.ris.bka.gv.at/erv/erv_1999_1_190.pdf (Austrian Electronic
    Signature Act) find the following statements:

     From Overview: "The admission and practice of the activity of a
    certification service tenderer do not require separate permission.
    The service provider (CA) must only notify the activity to the
    supervision place."

     From Electronic Signature Act, Section 3.6: "Certification service
    providers shall require no special permit to establish and exercise
    their activities."

     From Bugzilla (Representative of TCC)
    https://bugzilla.mozilla.org/show_bug.cgi?id=373174#c7: "However,
    certificates are not only issued to accredited CSPs because
    accreditation is voluntary (pursuant to the Electronic Signatures
    Directive 1999/93/EC). Certificates are also issued to CSPs who are
    supervised under Austrian law (i.e. all CSPs established in Austria)."


3.)
The Electronic Signature Act has provisions for "voluntary 
accreditation" and "qualified certificates". The voluntary accreditation 
( http://signatur.rtr.at/en/legal/sigg17.html ) has some technical 
safety requirements ( http://signatur.rtr.at/en/legal/sigg18.html ). CAs 
which have been accredited and issue "qualified certificates" as 
outlined in the Electronic Signature Act (Section 3.7-8) are marked 
accordingly on http://www.signatur.rtr.at/en/providers/services.html
Intermediate CA certificates for accredited and "qualified" CAs are 
issued from the Sub-root of TCC marked "Accredited Certification Services 1"

4.)
http://www.signatur.rtr.at/en/providers/services.html provisions the 
revocation of intermediate CA certificates under the circumstances 
outlined in Section 3.9

5.)
RTR requests the inclusion of its root on behalf of TCC.

ARGE DATEN created their own (self-signed) roots with the same public 
key as issued by TCC, however with longer validity. They request the 
inclusion of these certificates, instead of the ones issued by TCC. ( 
https://bugzilla.mozilla.org/show_bug.cgi?id=348987#c5 )
(Note: The root labeled "GLOBALTRUST" shall be used for the issuing of 
intermediate CA certificates ( 
https://bugzilla.mozilla.org/show_bug.cgi?id=348987#c8 ), however their 
CPS/CP doesn't state such usage, only the issuance to end users)
 
A-Trust created four different CA roots without any relation to TCC. The 
four roots however signed the same public keys of their intermediate 
certificates, some of which were also signed by TCC ( see 
http://www.a-trust.at/DOCS/CA-Hierarchy_v10.pdf ). They request to 
include the four roots. (Note: There are intermediate CA certificates 
under the four roots which are not listed on the RTR list, clarification 
has been requested)

6.)
ARGE DATEN and A-Trust claim to have undergone an audit based on ETSI by 
TCC, however no such information exists neither in the Electronic 
Signature Act nor on the web site of RTR. No audit statements have been 
provided either. (See bugs)

7.)
Page  about Accreditation on 
http://www.signatur.rtr.at/en/providers/properties/accredited.html 
explains further: "Therefore, the fact that a 
certification-service-provider is accredited does not necessarily mean 
that all of the provider's certification services comply with the same 
quality standards."

    ARGE DATEN has _not_ undergone "voluntary accreditation" or
    "qualified certificates":
    http://www.signatur.rtr.at/en/providers/services/argedaten-globaltrust.html
    and
    http://www.signatur.rtr.at/de/providers/services/argedaten-a-cert.html

    A-Trust has one active intermediate CA under "voluntary
    accreditation" or "qualified certificates":
    http://www.signatur.rtr.at/de/providers/services/atrust-asign-premium.html
    The others are not "accredited". Also it has intermediate CAs which
    issue code signing certificates upon email verification and phone
    callback only:
    http://www.signatur.rtr.at/de/providers/services/atrust-asign-light.html


8.)
The Austrian Electronic Signature Act is currently not an acceptable 
criteria for CA operations of the Mozilla CA policy (Section 8, 
http://www.mozilla.org/projects/security/certs/policy/ )



Preliminary summary:

1.) TCC has undergone an ETSI audit in 2002 and assuming the auditor to 
be acceptable by Mozilla, could be considered for inclusion (provided 
also that the audit is considered valid). However different aspects 
aren't compatible with the Mozilla CA policy.

2.) The purpose of the TCC root is to issue intermediate CA certificates 
to service providers in Austria.

3.)  The Austrian Electronic Signature Act doesn't obligate CAs to 
minimal verification methods, as outlined in the Mozilla CA policy 
http://www.mozilla.org/projects/security/certs/policy/ section 7.

4.) TCC doesn't control the various service providers nor their 
implementations CP/CPS.

    The statement by the TCC representative confirms this at
    https://bugzilla.mozilla.org/show_bug.cgi?id=373174#c11 : "The CPS
    does not lay down requirements for certification service providers
    ("sub-CAs") because these requirements are given by law."



Recommendations:

1.) The TCC root CA should not be included, because it doesn't control 
the service providers (and their policies) to whom it issues the 
certificates and the Austrian Electronic Signature Act doesn't obligate 
CAs to minimal verification methods.

2.) The roots of ARGE DATEN should not be included, because no audit 
statement has been provided nor are their CA services marked by RTR as 
accredited or qualified.

3.) The roots of A-Trust should not be included, because the 
intermediate CAs issued under those roots have different qualifications, 
including at least one which could be considered with insufficient 
verification methods (for code). Additionally the majority are not 
accredited or qualified by RTR except one (active).

4.) Under consideration for inclusion could be the intermediate CA 
certificate of TCC labeled "Accredited Certification Services 1" (issues 
certificates to CAs accredited under the Austrian accreditation scheme) 
since TCC has some control over them according to the Austrian 
Electronic Signature Act.  The lifetime of this (intermediate) root 
(expiry date) should be checked however.

5.) Alternatively under consideration could be any intermediate CA 
certificate issued to A-Trust which is marked as "voluntary accredited" 
and qualified certificate" ( 
http://www.signatur.rtr.at/de/providers/services/atrust-asign-premium.html 
). All other intermediate CA certificates issued by TCC to A-Trust 
should not be included.

6.) In order for A-Trust and ARGE DATEN to have their roots included, I 
recommend that they provide an explicit audit statement according to one 
of the criterion acceptable by the Mozilla CA policy. TCC could be 
_considered_ by Mozilla as an acceptable auditor even so they act as a 
super CA (requires further discussion?)

Summary:

The inclusion recommendations of #4 and #5 are not strictly roots 
certificates, but intermediate CA certificates issued by TCC. But in 
light of the special situation of CAs in Austria I recommend considering 
inclusion of those as an acceptable compromise, instead of rejecting the 
requests altogether. Feel free to challenge my assessment and I'm glad 
to provide additional information not included in this report. Also as 
noted in the introduction, additional information provided by the 
requesting CAs might provide a different result than presented here.

-- 
Regards
 
Signer:      Eddy Nigg, StartCom Ltd.
Jabber:      [EMAIL PROTECTED]
Phone:       +1.213.341.0390
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to