All,
This is to announce the beginning of a six-week public discussion period for the inclusion request of Serviço Federal de Processamento de Dados (SERPRO) (Bug # 1677631, CCADB Case # 680) for its Autoridade Certificadora do SERPRO SSLv1 issuing CA certificate (SERPRO SSLv1), issued under the Autoridade Certificadora Raiz Brasileira v10, which is the root CA designated under the Brazilian PKI for support of TLS certificate issuance. Mozilla is considering SERPRO’s request to add the SERPRO SSLv1 CA as a trust anchor with the websites trust bit enabled.
Download – https://repositorio.serpro.gov.br/cadeias/serprossl.crt
crt.sh - https://crt.sh/?sha256=08FC942D5176E568ACBEF9C595F36A20DE6ACF9EA30C6F5FCEDD48216ED5B070
Repository: The SERPRO document repository is located here: https://certificados.serpro.gov.br/serprossl/certification-policies.
Relevant Policy and Practices Documentation:
An English version of the SERPRO CPS (v.4.2), March 2022, is available here: https://repositorio.serpro.gov.br/docs/CPS_SERPRO_SSL_CA.pdf
Self-Assessments and Mozilla CPS Reviews are located within Bug # 1677631:
AC_SERPRO_SSL_Self_Assessment.ods
Mozilla’s CP/CPS Review comments – Comment #2, Comment #73, and Comment #77
Value-vs-Risk Justification from SERPRO – see Value vs Risk_SERPRO_SSL_CA.pdf
Audits: Annual audits have been performed by PKI Contabilidade e Auditoria Ltda in accordance with the Webtrust Principles and Criteria for Certification Authorities. The most recent audits available were published on July 22, 2022, for the period ending May 29, 2022. See
https://www.cpacanada.ca/generichandlers/CPACHandler.ashx?attachmentid=b6a5cf89-dd0a-484e-bad5-5cf4faeb10a0 (Standard Webtrust)
https://www.cpacanada.ca/generichandlers/CPACHandler.ashx?attachmentid=5bee38f1-db75-46fe-91df-2ff67c6f0560 (WebTrust Baseline Requirements)
I have no other questions related to SERPRO’s inclusion request; however, I urge anyone with concerns or questions to raise them on this list by replying directly in this discussion thread. Likewise, a representative of SERPRO must promptly respond directly in the discussion thread to all questions that are posted.
This email begins a 6-week period for public discussion and comment, which I’m scheduling to close on or about December 31, 2022, after which, if no concerns are raised, we will close the discussion and the request may proceed to Mozilla’s one-week “last-call” phase.
Sincerely yours,
Ben Wilson
Mozilla Root Program Manager
--
You received this message because you are subscribed to the Google Groups "public" group.
To unsubscribe from this group and stop receiving emails from it, send an email to public+un...@ccadb.org.
To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/CA%2B1gtaagUFek6Fp_xp3Rw4PozHz3EJFrvNM5HQvxA2ifmsCLHQ%40mail.gmail.com.
crt.sh ID | Logged At ⇧ | Not Before | Not After | Common Name | Matching Identities | Issuer Name | ||||||||||
3.76E+09 | ######## | ######## | ######## |
Autoridade Certificadora do SERPRO SSLv1 | Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Instituto Nacional de Tecnologia da Informacao - ITI, CN=Autoridade Certificadora Raiz Brasileira v10 | ||||||||||
4.55E+09 | ######## | ######## | ######## | https://certificados.serpro.gov.br/arssl/ |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 | ||||||||||
4.54E+09 | ######## | ######## | ######## | ccd-ct01bsa |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 | ||||||||||
4.54E+09 | ######## | ######## | ######## | ccd-ct02bsa |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 | ||||||||||
4.45E+09 | ######## | ######## | ######## | Extrato Selic - Producao |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 | ||||||||||
4.45E+09 | ######## | ######## | ######## | flexa.pgfn.fazenda |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 | ||||||||||
4.42E+09 | ######## | ######## | ######## | sgconf.rfoc.srf |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 | ||||||||||
4.41E+09 | ######## | ######## | ######## | SEGES-171379.mp.intra |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 | ||||||||||
4.39E+09 | ######## | ######## | ######## | ibmwebspheremqsefazsc |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 | ||||||||||
4.37E+09 | ######## | ######## | ######## | https://hom-carneleaoweb.estaleiro.serpro.gov.br/carneleao/ |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 | ||||||||||
4.35E+09 | ######## | ######## | ######## | https://consopt.www8.receita.fazenda.gov.br/consultaoptantes |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 | ||||||||||
4.31E+09 | ######## | ######## | ######## | http://confucius.hcpa.edu.br/ |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 | ||||||||||
4.31E+09 | ######## | ######## | ######## | http://crlve.detran.ma.gov.br/ |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 | ||||||||||
4.27E+09 | ######## | ######## | ######## | Benner |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 | ||||||||||
4.27E+09 | ######## | ######## | ######## | Benner |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 | ||||||||||
4.23E+09 | ######## | ######## | ######## | puma.pgfn.fazenda |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 | ||||||||||
4.16E+09 | ######## | ######## | ######## | discorl.bhe.serpro |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 | ||||||||||
4.02E+09 | ######## | ######## | ######## | 189.9.81.58 |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 | ||||||||||
4E+09 | ######## | ######## | ######## | TermoITR |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 | ||||||||||
4E+09 | ######## | ######## | ######## | discorl.rce.serpro |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 | ||||||||||
4E+09 | ######## | ######## | ######## | discorl-rst.rce.serpro |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 | ||||||||||
3.98E+09 | ######## | ######## | ######## | autoriza-estaleiro |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 | ||||||||||
3.97E+09 | ######## | ######## | ######## | discorl.rce.serpro |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 | ||||||||||
3.96E+09 | ######## | ######## | ######## | discorl-rst.rce.serpro |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 | ||||||||||
3.85E+09 | ######## | ######## | ######## | discorl.coaf |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
--
You received this message because you are subscribed to the Google Groups "public" group.
To unsubscribe from this group and stop receiving emails from it, send an email to public+un...@ccadb.org.
To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/20221117094440.4aae752e4a288d66203affaf%40andrewayer.name.
4.34E+09 | ######## | ######## | ######## | btgpactual.com |
Autoridade Certificadora do SERPRO SSLv1 |
4.2E+09 | ######## | ######## | ######## | infoconv.tce.pa |
Autoridade Certificadora do SERPRO SSLv1 |
3998121831 | 2021-01-28 | 2021-01-28 | 2022-01-28 | https://carneleaoweb.estaleiro.serpro.gov.br |
Autoridade Certificadora do SERPRO SSLv1 |
3847481019 | 2020-12-29 | 2020-12-29 | 2021-12-29 | https://spubackoffice.estaleiro.serpro.gov.br |
Autoridade Certificadora do SERPRO SSLv1 |
Would there be any other reason than "we want to become a CA"?We would like to be a CA with competitive characteristics in our issued certificates.No other reason.
Indeed, in the beginning we had many certificates issued erroneously and we started to monitor these certificates to eliminate such errors.We believe that they are errors that any CA can have and that makes the process of revoking and replacing certificates, as with any other CA, that is already in the root program of Mozilla or any other root program.
Daily we receive emails from bugzilla where we can see many certificates issued by major competitors CA with errors.We believe that there is no CA that is ready and mature to not make mistakes when starting to operate in these issuing.We have been trying to submit to this program for more than 2 years and we are always attentive and making efforts to do our best within compliance.
4337379215 | 2021-04-06 | 2021-04-06 | 2022-04-06 | btgpactual.com |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
4203823298 | 2021-03-12 | 2021-03-12 | 2022-03-12 | infoconv.tce.pa |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
crt.sh ID | Logged At ⇧ | Not Before | Not After | Common Name | Matching Identities | Issuer Name |
3756574427 | 2022-01-26 | 2020-03-12 | 2032-07-01 |
Autoridade Certificadora do SERPRO SSLv1 | Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Instituto Nacional de Tecnologia da Informacao - ITI, CN=Autoridade Certificadora Raiz Brasileira v10 |
4554741564 | 2021-05-19 | 2021-05-19 | 2022-05-19 | https://certificados.serpro.gov.br/arssl/ |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
4541931304 | 2021-05-17 | 2021-05-17 | 2022-05-17 | ccd-ct01bsa |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
4541264547 | 2021-05-17 | 2021-05-17 | 2022-05-17 | ccd-ct02bsa |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
4453318199 | 2021-04-30 | 2021-04-30 | 2022-04-30 | Extrato Selic - Producao |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
4448357444 | 2021-04-29 | 2021-04-29 | 2022-04-29 | flexa.pgfn.fazenda |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
4415391045 | 2021-04-22 | 2021-04-22 | 2022-04-22 | sgconf.rfoc.srf |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
4411160619 | 2021-04-21 | 2021-04-21 | 2022-04-21 | SEGES-171379.mp.intra |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
4385268647 | 2021-04-16 | 2021-04-16 | 2022-04-16 | ibmwebspheremqsefazsc |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
4374011657 | 2021-04-14 | 2021-04-14 | 2022-04-14 | https://hom-carneleaoweb.estaleiro.serpro.gov.br/carneleao/ |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
4345805063 | 2021-04-08 | 2021-04-08 | 2022-04-08 | https://consopt.www8.receita.fazenda.gov.br/consultaoptantes |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
4306083475 | 2021-03-31 | 2021-03-31 | 2022-03-31 | http://confucius.hcpa.edu.br/ |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
4305829154 | 2021-03-31 | 2021-03-31 | 2022-03-31 | http://crlve.detran.ma.gov.br/ |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
4272875230 | 2021-03-25 | 2021-03-25 | 2022-03-25 | Benner |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
4267330157 | 2021-03-24 | 2021-03-24 | 2022-03-24 | Benner |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
4225132514 | 2021-03-16 | 2021-03-16 | 2022-03-16 | puma.pgfn.fazenda |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
4162997747 | 2021-03-04 | 2021-03-04 | 2022-03-04 | discorl.bhe.serpro |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
4020518938 | 2021-02-02 | 2021-02-02 | 2022-02-02 | 189.9.81.58 |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
4003932904 | 2021-01-30 | 2021-01-30 | 2022-01-30 | TermoITR |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
3995565484 | 2021-01-28 | 2021-01-28 | 2022-01-28 | discorl.rce.serpro |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
3995298864 | 2021-01-28 | 2021-01-28 | 2022-01-28 | discorl-rst.rce.serpro |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
3982843217 | 2021-01-26 | 2021-01-26 | 2022-01-26 | autoriza-estaleiro |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
3967003223 | 2021-01-22 | 2021-01-22 | 2021-01-23 | discorl.rce.serpro |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
3961758343 | 2021-01-21 | 2021-01-21 | 2021-01-22 | discorl-rst.rce.serpro |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
3852508782 | 2020-12-30 | 2020-12-30 | 2021-12-30 | discorl.coaf |
Autoridade Certificadora do SERPRO SSLv1 |
C=BR, O=ICP-Brasil, OU=Autoridade Certificadora Raiz Brasileira v10, CN=Autoridade Certificadora do SERPRO SSLv1 |
--
You received this message because you are subscribed to the Google Groups "public" group.
To unsubscribe from this group and stop receiving emails from it, send an email to public+un...@ccadb.org.
To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/dc6a28f4-0a68-4a94-bbec-266e3fd31d9dn%40ccadb.org.
Currently we only issue to *.br, due to our form of validation that involves the Registro.br, but It has no restriction.
Bellow we answer all the outstanding questions:
SERPRO SSLCA is subject to the Brazilian Public Key Infrastructure (ICP-Brasil) and the rules in force in ICP-Brasil.
At the time of issuing these certificates, the SAN extension should contain other names in addition to the 'dnsName' and 'ipaddress' entries '.
Once this requirement was understood, ICP-Brasil changed its certification policies and aligned them with the webtrust requirement. With this decision, the SERPRO SSL CA software was adjusted and the situation no longer occurred.
After the completion of the correction (revocation of certificates), we also publish it in our bugzilla: https://bugzilla.mozilla.org/show_bug.cgi?id=1677631#c80
From that moment on, we started to include a weekly CACHECKER in our CA to eliminate other errors, which we still do till today.
There were other notes by CACHECKER that we were requesting answers in bugzilla, among them, about an EV CERTIFICATE note that was issued with error.
We do not issue EV CERTIFICATES only OV CERTIFICATES. https://bugzilla.mozilla.org/show_bug.cgi?id=1677631#c60
Then we received the response from Mozilla support pointing out that the error was in the updated CACHECKER: https://bugzilla.mozilla.org/show_bug.cgi?id=1677631#c65
Recently an error was pointed out(again) in EV certificates (which we do not issue) and in contact with Mozilla support, they verified that there is still an error in the CACHECKER that is showing false errors in our certificates.
All can verify other comments in our bugzilla and the treatments that we have always given to everyone, that is, demonstration of responsibility with the issuance of certificates that are so vulnerable and that all CAs, which are part of these programs, must be attentive.
All the notes already made here in this public list are just copied and pasted from a CACHECKER result, but do not demonstrate that they were verified, that they are certificates issued previously and that they have already been revoked, that is, there has already been a treatment.
The motivation for joining the trusted roots program is the possibility of issuing certificates with international recognition that are also in line with Brazilian policies and practices, maintaining compliance with international standards and observing national needs.
Currently SSL certificates are already issued at SERPRO SSL CA, not yet recognized, which imposes on end users to encounter messages from an unsafe site, leaving users with two possible approaches: include the CA as trusted or add a security exception; in both cases, we consider end-user security to be harmful practices.
In this way, the inclusion of SERPRO SSL CA in the trusted root programs will increase the security of our end users.
SERPRO is the largest public IT company in the world and provider digital solutions for the Brazilian state and the international market (www.sepro.gov.br).
Regarding the use of a named-constraints to restrict .br domains only, we issue certificates to governments and also to national and international private entities that wish to have a certificate within the Brazilian public key infrastructure. Therefore, we do not consider the use of any named-constraint appropriate.
Anyway, the criticisms were pointed out and were not evaluated as the CA has already responded promptly to all errors.
The maturity of the CA and any one that is already part of a root program, was exactly as it was written earlier: mistakes everyone can make and the fact of quantity and lack of quality, all were mistakes already corrected.
It was also mentioned that our CP or CPS was not read, which may not facilitate the purpose of our CA by someone here on this list.
We would also like to add how we are a CA that holds the ISO/IEC 27001 and 27701 certification seals.
All CAs that produce within SERPRO, except the one that issues an SSL certificate in accordance with BRSSL, have existed within the company for more than 20 years, that is, we are not a company wanting to experiment and only with the intention of selling certificates poor quality and non-compliant.
All,First, would like to say that we stoped to answer the questions, because at November was introduced another subject in that Public List, that was different about SERPRO SSL CA.Bellow we answer all the outstanding questions:
SERPRO SSLCA is subject to the Brazilian Public Key Infrastructure (ICP-Brasil) and the rules in force in ICP-Brasil.
At the beginning of the CA, during the point in time and period of time audit, we only used the SERPRO(AR SERPRO) registration authority(internal registration authority).
About the CPS, I will be updating immediatly it and publishing it on the CCADB and on our CA page.
2 - As I explained earlier, we had problems with the SAN of all these certificates, alerted by Mozilla to our Root CA, as the Root CA rules overlapped the BR SSL rules.Unfortunately, due to the very large number of certificates, it was not possible to fulfill what is expected(24 hours timeline), both from the BR SSL regulations and what we reflect in our regulations (CPS).
These revocations, unfortunately, lasted much longer than expected.
We understand that we would not, yet, be infringing the rules, because our certificate is not in the Mozilla program.
2 - As I explained earlier, we had problems with the SAN of all these certificates, alerted by Mozilla to our Root CA, as the Root CA rules overlapped the BR SSL rules.
Unfortunately, due to the very large number of certificates, it was not possible to fulfill what is expected(24 hours timeline), both from the BR SSL regulations and what we reflect in our regulations (CPS).
These revocations, unfortunately, lasted much longer than expected.
We understand that we would not, yet, be infringing the rules, because our certificate is not in the Mozilla program.
--
You received this message because you are subscribed to the Google Groups "public" group.
To unsubscribe from this group and stop receiving emails from it, send an email to public+un...@ccadb.org.
To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/63ca387d-fcd3-44b3-9838-fdca227134f6n%40ccadb.org.
Now I understand better. Thanks for rephrasing the question.
What happened was that we started using the CACHECKER "first" instead of waiting for the Root CA to be alerted to wrong certificates.We always aim to only use CA SSL/TLS software in compliance with BR SSL requirements.
We understand that we need to respect the rules about the time for revocation, and we started intensify this issue even more if we are accepted in root programs.Well, as I read the bugzillas daily, I see that even today there are still CAs, that are in the program, and also have problems, keeping the revocation time within the rules.
We assume that we have rules to resolve issues and not remain impartial.Thanks about your question.lEm quinta-feira, 8 de dezembro de 2022 às 11:48:38 UTC-3, joel.r...@ucalgary.ca escreveu:Hello:regarding this:2 - As I explained earlier, we had problems with the SAN of all these certificates, alerted by Mozilla to our Root CA, as the Root CA rules overlapped the BR SSL rules.Unfortunately, due to the very large number of certificates, it was not possible to fulfill what is expected(24 hours timeline), both from the BR SSL regulations and what we reflect in our regulations (CPS).
These revocations, unfortunately, lasted much longer than expected.
We understand that we would not, yet, be infringing the rules, because our certificate is not in the Mozilla program.
I suppose my question is what specific operational changes have been made on your side since then so that the inability to fulfill the baseline requirements won't remain an issue were you to be part of Mozilla's program?
--
You received this message because you are subscribed to the Google Groups "public" group.
To unsubscribe from this group and stop receiving emails from it, send an email to public+un...@ccadb.org.
To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/63ca387d-fcd3-44b3-9838-fdca227134f6n%40ccadb.org.
CA CHECKER:
CA Checker is a public use tool for CA Mis-issuance Checker;
2. How were you validating control of the DNS domains if you weren't ensuring you were only issuing certificates to DNS names?
The issuance of certificates with names that were not DNS would occur, because before we submitted our CA to the root programs there was a usage scenario where web applications authenticated their APIs using the application name as identified and not a DNS, but when adhering to the webtrust requirements, we have eliminated this practice and now the CA software itself verifies that the content is a valid DNS before certificate issuance.
3. So to confirm: you're promising to do better once accepted into the root program? But you're not willing to show that you can and will do this prior to being accepted?
That's not what I tried to explain. We are already adhering to the rules of BR SSL.
We have implemented all the controls required in the policies, the problems that occurred have all been corrected and that we have no non-conformities in the certificates that are active, we are not waiting to be accepted into the root program to start initiating any rules. They are already in our CA.
You can check the annual results of our external audit.
On Thu, Dec 8, 2022 at 7:57 AM Lucia Castelli <lucast...@gmail.com> wrote:Now I understand better. Thanks for rephrasing the question.
What happened was that we started using the CACHECKER "first" instead of waiting for the Root CA to be alerted to wrong certificates.We always aim to only use CA SSL/TLS software in compliance with BR SSL requirements.1) What is CACHECKER exactly (a service? software?)2) How were you validating control of the DNS domains if you weren't ensuring you were only issuing certificates to DNS names? Because you issued many certificates to urls, single names and so on spanning months.We understand that we need to respect the rules about the time for revocation, and we started intensify this issue even more if we are accepted in root programs.Well, as I read the bugzillas daily, I see that even today there are still CAs, that are in the program, and also have problems, keeping the revocation time within the rules.So to confirm: you're promising to do better once accepted into the root program? But you're not willing to show that you can and will do this prior to being accepted?
> 1) What is CACHECKER exactly (a service? software?)
Hi Kurt.
An instance of the service is at https://cachecker-dot-ccadb-231121.appspot.com/.
Source code is at https://github.com/mozilla/CCADB-Tools/tree/master/cacheck, AIUI.
Hi Charles,Answers:1 - The external registration authorities that are mentioned are the ones that were later linked to CA SERPRO SSL.At the beginning of the CA, during the point in time and period of time audit, we only used the SERPRO(AR SERPRO) registration authority(internal registration authority)
Does SERPRO expect to use external registration authorities in the near future?
Currently we already use external registration authorities.
What identity validation tasks will they perform? Where are the procedures for them documented?
Each RA, which issues CA SERPRO SSL certificates, uses specific operating procedures.
For each RA associated with CA, specific training was carried out and validators specialized in this type of issue were trained.
We carry out the checks provided for in BR SSL, such as validating the domain following the item: 3.2.2.4.2 and 3.2.2.4.18, in addition to searching the URL, which we look for through the google transparency report (https://transparencyreport. google.com/safe-browsing/search?url= ).
If the search returns a message that SOME NOT secure content WAS found, the requester is informed that it will not be possible to issue the certificate for the URL in question until this situation is resolved. We also make the query using the WHOis tool (https://registro.br/tecnologia/ferramentas/whois/ ). This query aims to verify:
a) which organization is responsible for the domain with Registro.Br;
b) which person or which area of the organization is registered as responsible for the domain.
There are conditions to follow the approval, that is, if the requester is the same as responsible for the domain or if the name and e-mail constant in the request also match what appears in the domain.
For domains other than .br, we use the link https://who.is/ with the same criteria mentioned above.
We also validate whether the requester has management of the request address (URL)
Obs. 1: This requirement shows that the requester has management (control) over the request address (URL). This evidence is automatically confirmed by the CA software.
Obs. 2: The customer/applicant, right after the request in the CA software, receives the instructions in his e-mail on how to proceed to carry out this test of control as foreseen in the operational procedure.
All of these procedures are carried out at the time of requesting the certificate, including the CA software automatically validating the proof of control, in addition to validating the applicant's possession and the company's and applicant's documents.
In addition to verifying the certificates issued by the CA, we also follow the rule provided for in BR SSL, to perform a self-audit of three percent of the Certificates issued by the CA, on a quarterly basis.
This query aims to verify
a) which organization is responsible for the domain with Registro.br or non-br;
b) which person or which area of the organization is registered as responsible for the
domain. We also use option 3.2.2.4.2 for domain validation.
Em segunda-feira, 12 de dezembro de 2022 às 16:46:13 UTC-3, Andrew Ayer escreveu:On Mon, 12 Dec 2022 11:08:36 -0800 (PST)
Lucia Castelli <lucast...@gmail.com> wrote:
> For domains other than .br, we use the link https://who.is/ with the
> same criteria mentioned above.
Could you clarify what you use https://who.is/ for? Is it to determine
the Domain Contact for domain validation method 3.2.2.4.2?
Regards,
Andrew
--
You received this message because you are subscribed to the Google Groups "public" group.
To unsubscribe from this group and stop receiving emails from it, send an email to public+un...@ccadb.org.
To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/94bff8df-364d-4a23-899c-069547be3509n%40ccadb.org.
To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/CABqVa3-7gaZQd36nz%3DqQ%3D0enEqSyC4Tw%3Did96uFFiGK7kPEH9g%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/CABqVa39o4%2BYmecxVxeA46kw%2BvpcqLqF%3DUsCKTzqaAtz9iYT7pg%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/CAKtZuQ6Oc9-SpDFFfujATvDXCFWoGLsnGmtEkaGuQiARQOLTLA%40mail.gmail.com.
Ok a quick refresher on WHOIS since a lot has changed since https://www.rfc-editor.org/rfc/rfc3912.html was published in 2004:Lots of places still support WHOIS. AFAIK none support SSL/TLS, hopefully they use DNSSEC for the domain but this still allows BGP hijacking as mentioned in the Mozilla docs.Lots of places don't support WHOIS, it's old, it's a pain, and they have a website, so you can use their website to search for WHOIS records.
AFAIK almost everyone modern does private DNS registrations now, in fact, many DNS registrars make it the default (e.g. Cloudflare).Is there a list of official sources for WHOIS for all the domains? I can't find anything remotely up to date with all the new TLDs.Perhaps it is time to consider retiring this method? It seems prone to error and unreliable, and there are better ways to do this (ACME yo).
--
You received this message because you are subscribed to the Google Groups "public" group.
To unsubscribe from this group and stop receiving emails from it, send an email to public+un...@ccadb.org.
To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/20221212150722.ea922840d1588d0844b4a206%40andrewayer.name.
We use the RDAP protocol to query the domain contact as difined in the Baseline Requirements - section 1.6.1:
Domain Contact: The Domain Name Registrant, technical contact, or administrative contact (or the equivalent under a ccTLD) as listed in the WHOIS record of the Base Domain Name or in a DNS SOA record, or as obtained through direct contact with the Domain Name RegistrarEm terça-feira, 13 de dezembro de 2022 às 12:04:57 UTC-3, Andrew Ayer escreveu:On Mon, 12 Dec 2022 12:00:22 -0800 (PST)
Lucia Castelli <lucast...@gmail.com> wrote:
> This query aims to verify
> a) which organization is responsible for the domain with Registro.br
> or non-br;
> b) which person or which area of the organization is registered as
> responsible for the
> domain. We also use option 3.2.2.4.2 for domain validation.
How do you determine the Domain Contact for domain validation method
3.2.2.4.2?
--
You received this message because you are subscribed to the Google Groups "public" group.
To unsubscribe from this group and stop receiving emails from it, send an email to public+un...@ccadb.org.
To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/df80f7c8-a1e7-4d32-944f-57bcd108ea9dn%40ccadb.org.
Hi Kurt, please, is possible to keep this conversations calm ? Sorry, but sometimes you do a lot of confusion with what is simple to understand.
Hi all,here we go again...
You ask me to signup with my SERPRO work email address and I did it.If you have more requirements on authentication for signing up to this discussion, please make it clear, otherwise let´s continue the questions and answears about CA SERPRO practices, keeping it real and factual.
--
You received this message because you are subscribed to a topic in the Google Groups "public" group.
To unsubscribe from this topic, visit https://groups.google.com/a/ccadb.org/d/topic/public/Mux855BsRg4/unsubscribe.
To unsubscribe from this group and all its topics, send an email to public+un...@ccadb.org.
To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/ae3fb36a-7a8e-4a48-acbd-250e3f6fe95an%40ccadb.org.
You received this message because you are subscribed to the Google Groups "public" group.
To unsubscribe from this group and stop receiving emails from it, send an email to public+un...@ccadb.org.
To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/CAKw1M3NAsiDuwyhsf8z3TP2odRFnyy4F%2BHg1JN8b%2BQ3eM-Z6DA%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/CA%2B1gtaYxBkk7_UR6yqvHvbhmchSLLoJymUdKNJnnj7FSHt_nTw%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "CCADB Public" group.
To unsubscribe from this group and stop receiving emails from it, send an email to public+un...@ccadb.org.
To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/c0614023-9fde-4d12-a782-ac2cfa039286n%40ccadb.org.
Dear all,We would like to clarify that we have tried our best to present ourselves to the Mozilla program and other root stores, despite the difficulties we have encountered over the last two years to remain within the BR SSL requirements.
To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/a5f1de46-6cc7-4b33-a650-a32f7fff0a8bn%40ccadb.org.
Cordialmente,
Lucia de Fatima Castelli Rabelo
Analista
Superintendência de Produtos e Serviços-Operações
Diretoria de Operações
+55 (21)2159-3734(Whatsapp Business)