As I see we all agree on the fact that a 'trusted responder' can exist
according to RFC 2560, and it is possible that an OCSP responder
certificate is under a separate root. (There are various scenarios for
providing OCSP service, it can be provided by a CA directly or by
proxy responders, etc. but RFC 2560 does not deal with such issue.)

Thus, I refuse any statement that would claim that our solution is not
RFC 2560 conformant.


However, I accept that this way it could be very hard for an
application to automatically verify that a certain responder can be
trusted for answering OCSP requests for a certain certificate.
Moreover, our OCSP is currently not open for the general public, so
our OCSP service is not useful for Mozilla users.
We knew this from the very beginning, this is why we did not even ask
for the inclusion of our OCSP root in Mozilla.


> The question is: are the certs that rely on that responder useful to
> the general public without it?

Yes, this is the real question.

We say that yes, they are useful, as they can be verified using CRLs.

As I read above, it currently does not pose a problem that there is an
OCSP URL in the AIA field of the certificate. If you think that this
shall become problematic in the future, we can modify the profile of
webserver certificates and remove the OCSP URL (as long as the OCSP is
not useful for the general public).


> > We had good reasons to choose this solution. According to Hungarian
> > regulations, a qualified CA is allowed to use its private key for the
> > following two purposes only:

> You are not allowed to issue intermediate CA certificates then? Are you
> issuing directly from the CA root?

The CA key used for signing qualified certificates can be used for
signing qualified end-user certificates and CRLs. This also means that
we cannot issue intermediate CA certificates with that particular key
and we cannot issue non-qualified certificates either.

We have a root, which does not issue end-user certificates, but issues
CA certificates for our own CAs only. These 'productive' CAs can issue
either qualified or non-qualified certificates only.
This solution was accepted by our authorities.

In case of 'productive' CAs issuing qualified certificates the
'trusted responder' remained the only option.

> What are the checks performed on code-signing certificates?

1. We verify the existence of the company which requests the code-
signing certificate using an online connection to the Hungarian
registry of businesses.
2. We verify the existence of the documents (driving license, ID card
or passport) of the person who requests the code-signing certificate
on behalf of that particular company. We perform this verification
using an online connection to the Office of the Central Office for
Administrative and Electronic Public Services.
http://www.nyilvantarto.hu/kekkh/kozos/index.php?k=nyitolap_en&b=bal_eng
3. Using a face-to-face registration (as the CP is NCP-based) we
verify the identity of the person who requested the certificate on
behalf of that company. This person has to meet our registration
officer and has to present the document (driving license, ID card or
passport) that was verified in step 2.
4. We verify that this person has the authority to sign on behalf of
the company. We generally request a notarial deed (issued by a public
notary) as a proof.


> > attached to the signature. Certain signature policies require that the
> > revocation information needs to be issued _after_ the time of signing,
> > i.e. the point of time marked in the timestamp on the signature.)

> Well, of course, ALL revocation information is issued AFTER the time of
> signing of the cert.  No CA issues already-revoked certs.

No, I meant: revocation information issued after the creation of an
_electronic_signature_.
I was referring to a concept known as 'grace period'. This means for
example that if a signature had been created on Wednesday, it should
not be accepted based on a CRL issued on Monday (because the
certificate of the signatory could have been revoked on Tuesday). This
a European concept that appears e.g. in CEN Workshop Agreement CWA
14171, Section 5.3.
ftp://ftp.cenorm.be/PUBLIC/CWAs/e-Europe/eSign/cwa14171-00-2004-May.pdf
This concept is specific to electronic signatures, and cannot be
applied for e.g. webserver certificates. This concept is also the
subject of many debates.


> In bug 277797, a representative of a Hungarian CA claims that their
> SSL server certs ARE qualified certs.  If that is still true
> (and it may not be, since that bug is a couple years old), then it
> cannot be said that web server certs are generally non-qualified.

The EU Directive is about electronic signatures only (and e.g. not
about SSL), so the word 'qualified' can be used in the context of
electronic signatures only.

According to ETSI TS 102 280, Section 5.4.3, only the DigitalSignature
and NonRepudiation key usage bits may appear in certificates used for
signing. This means, a qualified certificate - a certificate used for
signing - cannot be used for SSL.

This EU requirement appears in Hungarian legislation too: according to
13. § (4) of the Hungarian act on electronic signatures, a private key
used for creating electronic signatures must not be used for any other
purpose (e.g. decryption, SSL authentication, etc).

This means, a webserver certificate cannot be qualified in Hungary.

I used the word 'generally', because other EU member states may
implement both the Directive and ETSI specifications differently. Some
countries are more, some countries are less strict on this issue.
Regulations also change in time. At the time when bug 277797 was
submitted, key usage bits in certificates was not a central issue for
our authority. A National Communications Authority statement in this
field has been published in late 2005, after bug 277797 was submitted
only.


> Yes, true.  As I understand it, it was the intention of the
> directive that only human persons be the holders of qualified
> certificates.  However when the CAs, industry and govt. departments
> started working with them, they discovered problems with this
> limitation.  Different countries approached the problems in
> different ways.  In some countries, I gather, qualified certs can be
> issued outside the strict intent of the directive.

Yes, different countries apply such concepts differently.

According to the Directive, qualified signatures are equivalent with
handwritten ones, so only natural persons were meant to have qualified
certificates. However, in certain countries, electronic invoices have
to be signed with qualified certificates. This led to the situation
where - in some countries - automated mechanisms also create qualified
signatures.
This is very far away from the original goal.

> Istvan, would it be possible to take the position that "signing
> CRLs" is equivalent to signing OCSP responses or OCSP certificates?

Personally, I agree with you.

This requirement in our regulations is the result of a (bad)
translation from CWA 14167-01. When we started our services, we were
not in the position to question such requirements and argue using
common sense.
Meanwhile, the situation has changed, new regulations appeared, and
relevant statements in ETSI TS 101 456, Section 7.2.5 (Certification
authority key usage) have been updated, clarified. Today, we might be
in a better position.

We shall try to take it into account when we modify our CA hierarchy
next time.


> How does the Hungarian regulation define the CA ?

Generally, it defines a CA as an organization.

This particular requirement is not about the organization, it is about
a private key - it is stated explicitly.

> Unfortunatly, I never had the opportunity to check how this specific
> case is handled by NSS :-)

I like the idea, but even if NSS handles this correclty, other
applications may fail to do so.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to