Hi,

Here our statement regarding the SubordinateCA checklist requirements:

There are only two subordinate CAs issued by the root certificates related to 
this request.
Both Sub-CAs are operated by a third party for internal use only.

Regarding Sub-CA 1, which is chained to “TC Class 2 CA II”

Because the CA is for internal use only, the company operating the subordinate 
CA does not make the applicable CP/CPS publicly available.

According to Mozilla's SubordinateCA checklist 
(https://wiki.mozilla.org/CA:SubordinateCA_checklist) we have to provide and 
make publicly available the following information when our root signs 
subordinate CAs for enterprises/companies who operate the sub-CA for their own 
use:

1. General description of the sub-CAs operated by third parties.
--> This sub-CA 1 is used to issue certificate to company internal devices. All 
relying parties are company internal.

2. The CP/CPS that the sub-CAs are required to follow.
--> The sub-CA 2 is required to follow the TC TrustCenter CPD and CPS.

3. Requirements (technical and contractual) for sub-CAs in regards to whether 
or not sub-CAs are constrained to issue certificates only within certain 
domains, and whether or not sub-CAs can create their own subordinates.

--> This is covered by TC TrustCenter's CPD and CPS.
In addition, third party sub-CA 1 cannot create its own subordinates due to 
path length constraint in the sub-CA certificate.
Furthermore, all certificates issued by the CA in question are company internal 
device certificates; see below.

4. Requirements (typically in the CP or CPS) for sub-CAs to take reasonable 
measures to verify the ownership of the domain name and email address for 
end-entity certificates chaining up to the root, as per section 7 of our 
Mozilla CA certificate policy.

--> This is covered by TC TrustCenter's CPD and CPS.


        * domain ownership/control

--> Certificates are issued only company internal and all relying parties are 
only company internal, so domain ownership/control needs not to be verified.


        * email address ownership/control

 Certificates are issued to company internal devices and all relying parties 
are only company internal.


        * digitally signing code objects -- entity submitting the certificate 
signing request is the same entity referenced in the certificate

--> There is no signing of code objects.


5. Description of audit requirements for sub-CAs (typically in the CP or CPS)
          * Whether or not the root CA audit includes the sub-CAs.
          * Who can perform the audits for sub-CAs.
          * Frequency of the audits for sub-CAs. 

These requirements apply to the Root and are covered by TC TrustCenter's
CPS.


Regarding Sub-CA 2, which is chained to „TC Class 1 CA“.

1. General description of the sub-CAs operated by third parties.
--> This Sub-CA 2 is used to issue certificates to company internal email 
users. The certificates may only be used to secure the internal email 
communication.

2. The CP/CPS that the sub-CAs are required to follow.
--> The sub-CA 2 is required to follow the TC TrustCenter CPD.

3. Requirements (technical and contractual) for sub-CAs in regards to whether 
or not sub-CAs are constrained to issue certificates only within certain 
domains, and whether or not sub-CAs can create their own subordinates.

--> The sub-CA 2 cannot create its own subordinates due to path length 
constraint in the sub-CA certificate.
Furthermore, all certificates issued by the sub CA 2 in question are for 
company internal email users; see below.

4. Requirements (typically in the CP or CPS) for sub-CAs to take reasonable 
measures to verify the ownership of the domain name and email address for 
end-entity certificates chaining up to the root, as per section 7 of our 
Mozilla CA certificate policy.

--> This is covered by TC TrustCenter's CPD and CPS.


        * domain ownership/control

--> Certificates are for secure email purpose only, not for SSL servers.


        * email address ownership/control

--> Certificates are issued to company internal email users for company 
internal use.


        * digitally signing code objects -- entity submitting the certificate 
signing request is the same entity referenced in the certificate

--> There is no signing of code objects.


5. Description of audit requirements for sub-CAs (typically in the CP or CPS)
          * Whether or not the root CA audit includes the sub-CAs.
          * Who can perform the audits for sub-CAs.
          * Frequency of the audits for sub-CAs. 

These requirements apply to the Root and are covered by TC TrustCenter's
CPS.

-- 
Dr. Rolf Lindemann
Director Product Management
TC TrustCenter GmbH
Sonninstrasse 24-28, 20097 Hamburg
Office:       +49 40 808026-300
Fax:       +49 40 808026-126
Email:       lindem...@trustcenter.de
www.trustcenter.de


Geschaeftsfuehrung/Managing Directors: Robert Steinkrauss, Dr. Sabine
Kockskaemper
AG Hamburg, HRB 96168

This email may contain confidential and privileged material for the sole
use of the intended recipient. Any review or distribution by others is
strictly prohibited. If you are not the intended recipient please
contact the sender and delete all copies.
 

Attachment: smime.p7s
Description: S/MIME cryptographic signature

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to