Thorsten Becker:
> In Bug #378882 Eddy Nigg directed me here because of a SubCA audit
> question: He states that root CAs in mozilla NSS must "Not circumvent
> the audit requirement set forth by the Mozilla CA policy.
> This means that the CAs which belong to this PKI and are under this root
> MUST
> be part of the audit. CAs themselves can't be the auditors, otherwise
> all CAs
> will audit themselves."
>
> That was an answer to a questions to the requirements to T-Systems to
> get their root accepted. I compared the practices of T-Systems to that
> of GlobalSign, that offer a service to Enterprise CAs that allows the
> Enterprise CAs to operate as SubCAs indepependently under the root of
> GlobalSign:
> http://eu.globalsign.com/pki/rootsign.htm
>
> According to the Info-Gathering-Document in Bug #406794, which covers
> the renewal of the GlobalSign root, GlobalSign does just do what they
> shouldn't do according to Eddys comment: They audit external SubCAs
> themselves, as stated in the bug/info-gathering-document:
> "[...] As a CA is then run by an enterprise, domains are not technically
> restricted, however domains are contractually restricted.
>
> *GlobalSign* audits periodically as part of our own brand protection
> program. [...]" [Emphasis added]
>
> So isn't GlobalSign doing something here that is very problematic?
>

Hi Thorsten,

Let me add a few things here in order to make it clear what I meant:

The Mozilla CA policy requires auditing of the CA and its 
infrastructure. In the past there were various requests from CAs which 
don't issue themselves end user certificates, but issue (sub) CA 
certificates to entities external to them, both physical, logical and 
legal. Those CAs were not included if the audit didn't cover the issuing 
CAs for the obvious reason, that otherwise CAs acting as roots for the 
sole purpose of issuing CA certificates to others and therefore by 
transferring the responsibilities to third parties would circumvent the 
audit requirement. The audit requirement is not a privilege, but a 
condition.

Now, to all of my knowledge, this condition has been applied at other 
inclusion and upgrade requests, most notably with Comodo just recently. 
CAs may issue subordinated CA certificates to third parties on a 
contractual basis, however the audit must cover those. This is made 
clear usually in the CP/CPS of the CA in such a way and the auditor has 
to confirm that.

As a matter of fact, the auditor confirms the CA/CPS of the CA and if 
your CA policy doesn't have any requirements to the third parties, then 
the auditor doesn't have to confirm it either. It would be then very 
easy to found a "straw-CA" which conforms to its own policy and have 
that confirmed by the auditor, but the actual issuing CAs wouldn't have 
any requirements whatsoever. Effectively the issuing CAs would never see 
an auditor anywhere near them, nor would the controls (if any) and 
issuing procedures be ever confirmed by a third party. This goes counter 
to the audit requirement of the Mozilla CA policy.

Concerning GlobalSign this problematic practice has been highlighted by 
Frank here: https://bugzilla.mozilla.org/show_bug.cgi?id=406794#c19

I don't remember the discussion of GlobalSign's request explicitly, but 
the entry at the pending page [1] states:

"The first root has two subordinate CAs (for domain-validated and 
organizationally-validated certificates respectively) and the second 
root has one subordinate CA (for extended validation certificates). 
(There is also a valid chain from the EV subordinate to the first root 
via a cross-signing certificate.)"

Apparently GlobalSign either doesn't have any externally operated CAs or 
they were part of the scope of the audit. In addition to that, this CA 
has been included previously and the request was to enable EV and 
replace the already included certificate with the same key, but longer 
life-time of the certificate. Most likely Frank can recall the 
considerations for approving this request.

[1] http://www.mozilla.org/projects/security/certs/pending/#GlobalSign

-- 
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: [EMAIL PROTECTED]
Blog:   https://blog.startcom.org
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to