Frank Hecker wrote:
> TÜRKTRUST has applied to add two root CA certificates to the Mozilla
> root store, as documented in the following bug:
>
>    https://bugzilla.mozilla.org/show_bug.cgi?id=380635
>
> and propose to approve this request in two weeks time after a public 
> discussion period. If you have any  objections, or know of facts which 
> might influence this decision, please make them known before then.
>   
Hi Frank,

I've gone through the bug information and read the third revision of the 
CPS of TÜRKTRUST. As usual I have a few questions to you concerning this 
application.

- Audit statement/confirmation is from the *June 2005* supplied by the 
CA. So the Mozilla CA policy doesn't require re-audits, shouldn't 
initial audits be fairly recent? Maybe they have a newer confirmation 
than this one?

- Under 4.2.1 it says: "*No authentication* shall be made when 
processing applications for trial certificates." However as I 
understand, this trial certificates are issued from the same root. This 
is a problem which has also been highlighted by Gerv already in the bug 
itself.
The answer supplied at comment 
https://bugzilla.mozilla.org/show_bug.cgi?id=380635#c29 was:

    "You understand trial(i.e. test) certificates wrong I guess. The
    trial certificates are given without fee. They are not valid under
    Law since they are not qualified thus spoofing does not bother."

There was no follow up on this since you (Frank) took over the bug from 
Gerv.

I'd expect this not to be acceptable according to the Mozilla CA policy 
section 7 for SSL-enabled servers (and code signing as well), since in 
the same section it says: "When processing a server certificate 
application, the domain name that belongs to the server, the server’s 
name and the name of the domain owner and personal information for the 
server administrator should be verified by TÜRKTRUST’s registration 
authorities."
In case a so called "trial" certificate is processed and no 
authentication is performed, this means that also domain ownership 
verification is impossible. No alternative validation for domain 
ownership is provided either. Only email addresses are validated by an 
email ping.
Does this mean that only S/MIME certificates are issued as "trial" 
certificates? It doesn't say that anywhere in their CPS, therefore I 
assume that it applies to all types of certificates.

-- Non specific to this bug --

- Not relevant or conditional to the Mozilla CA policy, however how can 
a period of three years guaranty in any form even that the domain name 
is still under the same owner? I know this should be discussed outside 
of this inclusion request, but I would like to mention the fact that 
certificates issued for longer than one year (under certain 
circumstances even less) might result in a valid certificate in the 
wrong hands. Scenario: Buy a popular domain name for one year,  acquire 
a certificate for three years (or more at certain CAs), let the domain 
expire and have it bought by somebody else...This is something I also 
would like to have addressed in some form in a future revision of the 
Mozilla CA policy (note for myself).

- How are non-latin characters interpreted? There is no provision in the 
Mozilla CA policy, nevertheless this is something which might be 
interesting to know how this is handled by this CA (and other CAs in 
that situation). Can problems arise if non-latin letters are used and 
how would this affect the larger audience of Mozilla (outside of Turkey)?


-- 
Regards 
 
Signer:         Eddy Nigg, StartCom Ltd. <http://www.startcom.org>
Jabber:         [EMAIL PROTECTED] <xmpp:[EMAIL PROTECTED]>
Blog:   Join the Revolution! <http://blog.startcom.org>
Phone:          +1.213.341.0390
 

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to