All,
This is to announce the beginning of a six-week public discussion period for the inclusion request of Beijing Certificate Authority Co., Ltd. (BJCA) (Bug # 1647181, CCADB Case # 615) for the following two root CA certificates:
BJCA Global Root CA1 ((4096-bit RSA) websites trust bit with EV enablement and the email trust bit)
Download – http://repo.bjca.cn/global/cert/BJCA_Global_Root_CA1.crt
crt.sh - https://crt.sh/?sha256=F3896F88FE7C0A882766A7FA6AD2749FB57A7F3E98FB769C1FA7B09C2C44D5AE
BJCA Global Root CA2 ((384-bit EC) websites trust bit with EV enablement and the email trust bit)
Download – http://repo.bjca.cn/global/cert/BJCA_Global_Root_CA2.crt
crt.sh - https://crt.sh/?sha256=574DF6931E278039667B720AFDC1600FC27EB66DD3092979FB73856487212882
Mozilla is considering approving BJCA’s request to add these two roots as trust anchors with the websites and email trust bits enabled. BJCA is also seeking enablement for Extended Validation (EV) under the CA/Browser Forum’s EV Guidelines.
Repository: The BJCA document repository is located here: https://www.bjca.cn/cps.
Relevant Policy and Practices Documentation:
Beijing Certificate Authority Co., Ltd. Global Certificate Policy, v. 1.0.6, dated July 25, 2022
Beijing Certificate Authority Co., Ltd. Global Certification Practice Statement, v. 1.0.6, dated July 25, 2022
Self-Assessments and Mozilla CPS Reviews are located within Bug # 1647181:
Mozilla’s CP/CPS Reviews – Comment #7 and Comment #24
Value-vs-Risk Justification from BJCA – see Quantifying-Value--BJCA -2022.7.7.pdf
Audits: Annual audits have been performed by Anthony Kam & Associates, Ltd. in accordance with the Webtrust Principles and Criteria for Certification Authorities. The most recent audit reports were published on May 18, 2022, for the period ending March 9, 2022. See
https://www.cpacanada.ca/GenericHandlers/CPACHandler.ashx?AttachmentID=389f5843-e05f-4e80-aae0-23cee8922866 (Standard Webtrust)
https://www.cpacanada.ca/GenericHandlers/CPACHandler.ashx?AttachmentID=2c0c075a-0000-40f1-8a81-1ccb21268e62 (WebTrust Baseline Requirements and Network and Certificate System Security Requirements)
https://www.cpacanada.ca/GenericHandlers/CPACHandler.ashx?AttachmentID=78bb08b0-7523-4011-b27c-b8a1a978433e (Webtrust for Extended Validation)
Incidents
I am unaware of any incidents involving BJCA.
I have no further questions or concerns about BJCA’s inclusion request; however, I urge anyone with concerns or questions to raise them on this list by replying directly in this discussion thread. Likewise, a representative of BJCA must promptly respond directly in the discussion thread to all questions that are posted.
This email begins a 6-week period for public discussion and comment, which I’m scheduling to close on or about January 11, 2023, after which, if no concerns are raised, we will close the discussion and the request may proceed to Mozilla’s one-week “last-call” phase.
Sincerely yours,
Ben Wilson
Mozilla Root Program Manager
--
You received this message because you are subscribed to the Google Groups "public" group.
To unsubscribe from this group and stop receiving emails from it, send an email to public+un...@ccadb.org.
To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/CA%2B1gtaZH1bXQrWJ5zWPg0Rm8XqtX687qeMogFUGV%3Dsb0jDwF3g%40mail.gmail.com.
The software mentioned in the security incident report is a digital certificate application security suite developed by BJCA. The normal operation of this software depends on some technical implementation, which lead to misjudged as abnormal behavior, actually it is not a spyware.
After BJCA received the above security incident report on August 2, 2021, we had made a clarification reply in the Mozilla root inclusion case (see https://bugzilla.mozilla.org/show_bug.cgi?id=1647181#c15) . Since the reply involves amount technical details, I will not repeat them here. Please follow the link above to get details and feel free to discuss further if you have more questions. At the same time, please note that the mentioned software does not include the certificate chains of this root inclusion case (BJCA Global Root CA1 and BJCA Global Root CA2).
Regards,
BJCA team
BJCA, founded in 2001, is a leading network trust and digital security service provider in China. It is one of the first CA institutions in China to obtain the Electronic Authentication Service License issued by the government. It provides electronic authentication services for nearly ten million enterprise users and hundreds of millions of individual users in China.
At the same time, BJCA has decades of practical experience in acting as a reseller for international SSL certificate products, and is familiar with the relevant standards and specifications promulgated by CA/Browser Forum. In 2019, it established the BJCA global certification system and implemented the WebTrust international security audit certification. BJCA hopes to provide global electronic certification services with international standardized operation management and service levels to our customers and contributes to publicly-trusted digital certificates ecosystem.
The root certificate of the BJCA global certification system has been trusted by 360 browsers and Adobe Reader. The document signing certificate has been widely used in Chinese universities to sign the transcripts which can be widely trusted and verified around the world.
Since the certificate chains has not been trusted by Mozilla, Microsoft, Apple, and Google, no SSL certificate has been issued to customers at present. If you want to retrieve an example SSL certificate, please visit the following website in 360 browser:
i.BJCA Global Root CA1, https://demossl-rsa-valid.bjca.org.cn
ii.BJCA Global Root CA2, https://demossl-ecc-valid.bjca.org.cn
Thank you all, reply one by one:
1. Was this report submitted to Mozilla and is it available to read generally?
This report is a communication document between our company and the competent government department, and it is not suitable for disclosure or submission to Mozilla because it involves confidential information. And because the security incident does not involve the certificate chain of the root inclusion case submitted to Mozilla this time, we made a clarification in the Mozilla root inclusion case by disclosing the main points of the report.
2. I suppose my question is thus how do you define spyware in this context and in particular, "known spyware", and what was the process for evaluating if it was present? In my opinion there is a difference is whether or not a piece of software happens to include components that match a signature of spyware or a virus in a some database of known spyware, versus whether it exhibits behaviours consistent with spyware.
We understand that "Spyware is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user". Whether it is spyware is mainly to evaluate whether it behaves consistent with spyware. After analysis, we found that the suspected spyware behavior indicated in the report was caused by one of the drivers, wmControl.exe. This program is a driver provided by the USB Token manufacturer, Its software behavior is different from spyware and does not have malicious behavior. It is intended to ensure the normal use of this type of devide in the browser. In addition, the USB Token for digital certificate corresponding to the driver wmControl.exe is an old version device, and its driver has been deleted in the new version of the certificate environment software (version >= 3.6.8) provided by BJCA. This measure will help our software out from being judged as spyware.
3. I can see how software that installs novel root certificates to the trusted root store would be flagged as PUA. I'm surprised that in the value/risk analysis a desire to not have to install new root certificates on peoples computer's this way is not a more prominent component, instead it is more or less "to become a globally trusted CA ... to secure a wide range of websites visited by Firefox users".
This is exactly the reason why we apply for root inclusion, so that the issued SSL certificate can be automatically trusted by Mozilla, Microsoft, Apple, and Google, so the user experience could be improved. It must be noted that our software needs to provide services for different types of users. In addition to SSL certificates, the certificates issued by our company have a wide range of uses, including document signing, identity authentication, etc. Registering the root certificate to the operating system can bring convenience for users to use certificates.
4. I'm a bit unclear here. The Insikt report said that there was substantial functional overlap, not that a zfkeymonitor.exe program was included exactly.
From my understanding, a file with sha256 bed0d1139adcec9292841b7315289bb43960f2c7a4ff1bbab536528b1317b075 was included and multiple security vendors label it as a kind of PUA named zfkeymonitoring, e.g.,
So to clear this up, is it that this file as referenced above was in fact included, but Microsoft and others are incorrect to label it as they did? Or is this code-signed file not actually included in the first place? The Insikt report appears to be primarily static testing, meaning that code to record screenshots, read clipboard, etc., was present in the library but their testing did not seem to check whether such code actually ran during testing. Is it the case that the code was present but never used, or that this code didn't exist at all?
Our software contains drivers from multiple certificate device vendors, resulting in overlapping functionality. The SHA256 digest mentioned here points to the certificate application environment installation package developed by our company. In fact, our software does not include the zfkeymonitor.exe program.
5. I'm not sure I understand this. The software did install new root certificates, but it is not the same root certificates that you are attempting to add to Mozilla's program?
The root certificate installed by this software is not used for the application of the SSL server certificate, but for other purposes. Therefore, the software does not include the BJCA Global Root CA1 and BJCA Global Root CA2 certificate chains in the Mozilla root include case, nor does it attempt to add them to browser programs.
6. When the Windows installer runs, is there an option to forgo or not install the "Root Certificate Updates" functionality? As a person who has written Windows installers, I would expect an installer option to forgo Root Certificate installation and updates. If the user is not informed, or the option is not present, or the installation happens surreptitiously, then it would raise my suspicions.
And there's always the option to add the certificate and updates to the current user's Personal store rather than the machine's Trusted Roots or Trusted Third Party stores.
The BJCA certificate environment software will write the BJCA root certificate into the certificate store trusted by the system during installation. If you choose not to install the root certificate when installing the root certificate, some functions of the BJCA certificate will be abnormal, which has caused a large number of user complaints.
In order to improve the user experience, the BJCA certificate environment software chooses to skip user confirmation during the installation process, which may cause doubts for users. At present, we have plans to adopt advanced options in the new version of the software, allowing users to choose whether to confirm the installation, and support users to choose to add certificates and updates to the current user's personal storage instead of the computer's trusted root or trusted third party storage. No doubt that there is an obvious contradiction between convenience and security, which could improve the software security but degrades the user experience and increase our operation costs.
Regards,
BJCA team
--
You received this message because you are subscribed to the Google Groups "public" group.
To unsubscribe from this group and stop receiving emails from it, send an email to public+un...@ccadb.org.
To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/95c6ef70-2086-49bc-9713-bb25cd30724dn%40ccadb.org.
Thank you very much, and I agree with the relevant expert opinions of on PKI best practices. We have summarized the discussed issues, and made the following replies:
1. The Mozilla root includes the root certificate in the case and the Beijing One Pass certificate respectively belong to two independent electronic certification systems of BJCA. Based on the difference between the supervision of the electronic certification service system and the application scenario, BJCA has established two types of independent electronic certification systems:
i. The global certification system, which follows the WebTrust international standards and the relevant standards and specifications issued by the CA/Browser Forum, aims to issue and manage publicly trusted SSL certificates.
ii. The national trusted source certification system, which follows the relevant standards and specifications issued by the national competent authority, and aims to issue and manage personal certificates, enterprise certificates and equipment certificates. (Beijing One Pass certificate is issued by the national trusted source certification system)
2. We agree that registering the root certificate to the OS or Browser trust list does not comply with the security rules of the public trust system, but due to the following conditions, we cannot solve the certificate chain problem of Beijing One Pass by applying for root inclusion case, for example:
i. The certificate issued by the BJCA national trust source certification system contains the SM2 algorithm, which is currently not an algorithm approved by the root storage policy;
ii. The BJCA national trust source certification system is mainly subject to the supervision and management of the national competent authority, and obtaining the Electronic Authentication Service License issued by the government; (WebTrust audit certification is optional)
iii. The PKI framework of the BJCA national trusted source certification system is not suitable for issuing publicly trusted SSL certificates.
To sum up, the BJCA Global Root CA1 and BJCA Global Root CA2 in the Mozilla root inclusion case are the root certificates of the BJCA global certification system. They have passed the WebTrust audit certification for many years since they were generated, and have obtained WebTrust for CA, BR SSL, EV SSL audit report.
Although Beijing One Pass certificate and subsequent software do not belong to the WebTrust public trust system, we will also refer to the recommendations of experts, learn from the best practices of the public trust system, continue to innovate, practice corporate social responsibility, and strive to build a safe and reliable of cyberspace.
3. Beijing One Pass certificate is an Enterprise certificate issued by the BJCA national trust source certification system. A brief description:
i. The certificate is applicable to enterprise users registered in Beijing, China. Users can log in to the Beijing One Pass service system with the certificate to declare social security and other information. For social security declaration, it is usually required to be installed by the staff engaged in the work of the human resources department;
ii. Usually only need to be installed on one computer of the enterprise;
iii. The main purpose of installing the root certificate is to create a complete authentication chain from the certificate to the root certificate when logging in. If the user does not install the root certificate, the user will not be able to log in to the service system. We plan to adopt advanced options in the new version of the software, allowing users to choose whether to install, and support users to choose to add certificates and updates to the current user's personal storage instead of the computer's trusted root or trusted third-party storage;
iv. In addition to the certificate, the user can also choose the user name and password to log in to the service system.
4. BJCA has filed the root inclusion case contact information in CCADB, and the registered contact person has registered a Bugzilla account with the company domain name email address to submit the root inclusion case to Mozilla. We have already sent an email to Mozilla filed contact email address, stating that the account (wash...@gmail.com) participating in the Google Forum discussion represents BJCA.
Regards,
BJCA team
On Dec 16, 2022, at 3:56 AM, BJCA <wash...@gmail.com> wrote:
Thanks Kurt. When the discussion group responds, the "reply author" button is not available, so we responded by selecting "reply all".
To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/34f78ee0-8377-49d8-998f-601e717e83b7n%40ccadb.org.
1. Was this report submitted to Mozilla and is it available to read generally?
This report is a communication document between our company and the competent government department, and it is not suitable for disclosure or submission to Mozilla because it involves confidential information. And because the security incident does not involve the certificate chain of the root inclusion case submitted to Mozilla this time, we made a clarification in the Mozilla root inclusion case by disclosing the main points of the report.
To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/CA%2B1gtaYLdOmasuSyumsWaM04T6JAUc8eP_T9W6XwEbsRNVzj_w%40mail.gmail.com.
Thanks Kurt for your questions and suggestions. We are sorry that we have no right to disclose this report. In the previous threads we have provided dedicated responses including the main points of this report to the concerning issues of the Beijing One Pass app. We might discuss more technical details if necessary. We have maintained effective controls for the SSL/CodeSigning/DocSigning certification services in accordance with the BR and WebTrust Principles. At this time the Beijing One Pass app is not included in our Publicly-Trusted System, hence we are ultilizing a secruity strategy which is not meeting the security requirements of the Publicly-Trusted System. We agree that we should not prefer the convenience in the tradeoff between security and convenience. We will enlarge the coverage of our business to comply with Publicly-Trusted System and re-design the security rules of the Beijing One Pass app.
Thanks Kurt for your questions and suggestions. We are sorry that we have no right to disclose this report. In the previous threads we have provided dedicated responses including the main points of this report to the concerning issues of the Beijing One Pass app. We might discuss more technical details if necessary. We have maintained effective controls for the SSL/CodeSigning/DocSigning certification services in accordance with the BR and WebTrust Principles. At this time the
Beijing One Pass app is not included in our Publicly-Trusted System, hence we are ultilizing a secruity strategy which is not meeting the security requirements of the Publicly-Trusted System. We agree that we should not prefer the convenience in the tradeoff between security and convenience. We will enlarge the coverage of our business to comply with Publicly-Trusted System and re-design the security rules of the Beijing One Pass app.
All,
On November 30, 2022, we began a six-week, public discussion on the request from Beijing Certificate Authority Co., Ltd. (BJCA) for inclusion of two root certificates:
That public discussion period has ended.
Summary of Discussion and Action Items
Discussion Item #1: A concern was raised about BJCA’s Beijing One Pass software, which apparently facilitates client access to a digital portal or platform. It was noted that BJCA had attempted to address suspicions about the software in Comment #15, that the software was needed to support a USB token and to install another certificate chain, and not the two above-referenced roots.
A follow-up question was whether a security report concerning the software would be made publicly available.
BJCA Response to Discussion Item #1: “This report is a communication document between our company and the competent government department, and it is not suitable for disclosure or submission to Mozilla because it involves confidential information. And because the security incident does not involve the certificate chain of the root inclusion case submitted to Mozilla this time, we made a clarification in the Mozilla root inclusion case by disclosing the main points of the report.”
==========================
Discussion Item #2: Two components were also mentioned: wmControl.exe and zfkeymonitor.exe.
BJCA Response to Discussion Item #2: The “suspected spyware behavior indicated in the report was caused by one of the drivers, wmControl.exe. This program is a driver provided by the USB Token manufacturer, Its software behavior is different from spyware and does not have malicious behavior. It is intended to ensure the normal use of this type of [device] in the browser. In addition, the USB Token for digital certificate corresponding to the driver wmControl.exe is an old version device, and its driver has been deleted in the new version of the certificate environment software (version >= 3.6.8)”. Concerning zfkeymonitor.exe, BJCA responded that their software did not include the zfkeymonitor program.
==========================
Discussion Item #3: Clarification was requested about root certificate installation by the One Pass software.
BJCA Response to Discussion Item #3: BJCA reiterated that their software did not attempt to install the two roots, but stated, “in order to improve the user experience, the BJCA certificate environment software chooses to skip user confirmation during the installation process, which may cause doubts for users. At present, we have plans to adopt advanced options in the new version of the software, allowing users to choose whether to confirm the installation, and support users to choose to add certificates and updates to the current user's personal storage instead of the computer's trusted root or trusted third party storage. No doubt that there is an obvious contradiction between convenience and security, which could improve the software security but degrades the user experience and increase our operation costs.”
According to BJCA, it maintains two separate systems:
a global, public-trust system that meets international standards (WebTrust, CA/Browser Forum, etc.) and issues and manages SSL/TLS server certificates; and
a national system that follows Chinese standards and issues and manages personal certificates, enterprise certificates and equipment certificates (e.g., Beijing One Pass software and certificate).
BJCA acknowledges that both systems are under control of the same legal business entity, but for the latter, the software is not part of the global, public-trust system.
BJCA says it “will also refer to the recommendations of experts, learn from the best practices of the public trust system, continue to innovate, practice corporate social responsibility, and strive to build a safe and reliable of cyberspace.”
==========================
Conclusion
We thank community members for their review and consideration during this period. Root Store Programs will make final inclusion decisions independently, on their own timelines, and based on each Root Store Member’s inclusion criteria. Further discussion may take place in the independently managed Root Store community forums (i.e., MDSP).
Thanks,
Ben Wilson