Public Discussion: Inclusion of Telia Root CA v2

925 views
Skip to first unread message

Ben Wilson

unread,
Dec 1, 2021, 10:15:41 AM12/1/21
to dev-secur...@mozilla.org

All,

This is to announce the beginning of the public discussion phase of the Mozilla root CA inclusion process (https://wiki.mozilla.org/CA/Application_Process#Process_Overview - Steps 4 through 9) for Telia’s inclusion request for the Telia Root CA v2 (https://crt.sh/?id=1199641739).  

Mozilla is considering approving Telia’s request to add the root as a trust anchor with the websites and email trust bits as documented in Bugzilla #1664161 and CCADB Case #660.

This email begins the 3-week comment period, after which, if no concerns are raised, we will close the discussion and the request may proceed to the approval phase (Step 10).

Summary

This CA certificate for Telia Root CA v2 is valid from 29-Nov-2018 to 29-Nov-2043.

SHA2 Certificate Hash:  

242B69742FCB1E5B2ABF98898B94572187544E5B4D9911786573621F6A74B82C

Root Certificate Downloads:

https://support.trust.telia.com/repository/teliarootcav2_selfsigned.cer

https://support.trust.telia.com/repository/teliarootcav2_selfsigned.pem


CP/CPS:  Effective October 14, 2021, the current CPS for the Telia Root CA v2 may be downloaded here:   

https://cps.trust.telia.com/Telia_Server_Certificate_CPS_v4.4.pdf (v.4.4).

Repository location: https://cps.trust.telia.com/


Test Websites:

Valid - https://juolukka.cover.telia.fi:10603/

Revoked - https://juolukka.cover.telia.fi:10604/

Expired - https://juolukka.cover.telia.fi:10605/

 

BR Self Assessment (PDF) is located here:  https://support.trust.telia.com/download/CA/Telia_CA_BR_Self_Assessment.pdf

Audits:  Annual audits are performed by KPMG. The most recent audits were completed for the period ending March 31, 2021, according to WebTrust audit criteria. The standard WebTrust audit (in accordance with v.2.2.1) contained no adverse findings.  The WebTrust Baseline Requirements audit (in accordance with v.2.4.1) was qualified based on the fact that the Telia Root CA v1 certificate did not include subject:countryName. (The Telia Root CA v2 contains a subject:countryName of “FI”.)

Attachment B to the WebTrust Baseline Requirements audit report listed eight (8) Bugzilla bugs for incidents open during the 2020-2021 audit period, which are now resolved as fixed.  They were as follows:

Link to Bugzilla Bug

Matter description

https://bugzilla.mozilla.org/show_bug.cgi?id=1614311

Two CA certificates not listed in 2020 WebTrust audit report

https://bugzilla.mozilla.org/show_bug.cgi?id=1612332

Ambiguity on KeyUsage with ECC public key

https://bugzilla.mozilla.org/show_bug.cgi?id=1551372

One Telia certificate containing a stateOrProvinceName of Some-State

https://bugzilla.mozilla.org/show_bug.cgi?id=1649683

Two Telias pre-2012 rootCA certificates arent fully compliant with Baseline Requirements

https://bugzilla.mozilla.org/show_bug.cgi?id=1637854

AIA CA Issuer field pointing to PEM-encoded certificate

https://bugzilla.mozilla.org/show_bug.cgi?id=1674536

Certificates with RSA keys where modulus is not divisible by 8

https://bugzilla.mozilla.org/show_bug.cgi?id=1565270

Subject field automatic check in CA system

https://bugzilla.mozilla.org/show_bug.cgi?id=1689589

Disallowed curve (P-521) in leaf certificate

 

Recent, open bugs/incidents are the following:

Link to Bugzilla Bug

Matter description

https://bugzilla.mozilla.org/show_bug.cgi?id=1738207

Issued three precertificates with non-NIST EC curve

https://bugzilla.mozilla.org/show_bug.cgi?id=1736020

Invalid email contact address was used for few domains

https://bugzilla.mozilla.org/show_bug.cgi?id=1737808

Delayed revocation of 5 EE certificates in connection to id=1736020

 

I have no further questions or concerns about this inclusion request, however I urge anyone with concerns or questions to raise them on this list by replying directly in this discussion thread. Likewise, a representative of Telia must promptly respond directly in the discussion thread to all questions that are posted.

Again, this email begins a three-week public discussion period, which I’m scheduling to close on December 22, 2021.

Sincerely yours,

Ben Wilson

Mozilla Root Program

 

md

unread,
Dec 6, 2021, 2:32:22 AM12/6/21
to Ben Wilson, dev-secur...@mozilla.org
Hi,

as Telia Company AB (Sweden) and Telia Oy (Finland) are two separate legal persons, its not clear what is Telia?

Actually the same clarification needed for all other countries listed in the Bug.

Thanks,
M.D.



Sent from my Galaxy
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaZZj87QS3jL7R_32JEnfPZeU4hBNBJ%2BGHWU_pUdqF%3Dbbg%40mail.gmail.com.

Ben Wilson

unread,
Dec 6, 2021, 1:10:56 PM12/6/21
to md, dev-secur...@mozilla.org
The CCADB record says, "Telia Finland Oyj, part of Telia Company AB", but I'll ask that a representative of Telia clarify this for us.

On Mon, Dec 6, 2021 at 12:32 AM md <m...@ssc.lt> wrote:
Hi,

as Telia Company AB (Sweden) and Telia Oy (Finland) are two separate legal persons, its not clear what is Telia?

Actually the same clarification needed for all other countries listed in the Bug.

Thanks,
M.D.



Sent from my Galaxy


-------- Original message --------
From: Ben Wilson <bwi...@mozilla.com>
Date: 12/1/21 17:16 (GMT+02:00)
Subject: Public Discussion: Inclusion of Telia Root CA v2

--

md

unread,
Dec 6, 2021, 7:45:34 PM12/6/21
to Ben Wilson, dev-secur...@mozilla.org
Thanks, Ben.

"Part of Telia Company AB" shows their ownership relationship, the question is about their roles under this Root inclusion request.

If Telia Company AB operates this CA, what functions they have delegated to Telia Finland Oyj (and possibly to other "parts of  Telia Company AB" in other countries)?

Ben Wilson

unread,
Dec 7, 2021, 11:04:16 AM12/7/21
to md, dev-secur...@mozilla.org
Thanks, Moudrick
I have asked Telia to provide a response publicly to this list, which they've provided to you directly.
Ben

Moudrick M. Dadashov

unread,
Dec 7, 2021, 11:18:40 AM12/7/21
to dev-secur...@mozilla.org
Thank you, Ben.

I've been doing "reply all", that didn't include dev-secur...@mozilla.org.

Just forwarding now..

Thanks 
M.D.




Sent from my Galaxy


-------- Original message --------
From: "Moudrick M. Dadashov" <m...@ssc.lt>
Date: 12/7/21 17:33 (GMT+02:00)
To: "Lahtiharju, Pekka" <pekka.la...@teliacompany.com>, Ben Wilson <bwi...@mozilla.com>
Cc: "Liimatainen, Mika A." <mika.lii...@teliacompany.com>, "Gholami, Ali" <ali.g...@teliacompany.com>
Subject: RE: Public Discussion: Inclusion of Telia Root CA v2

 Thank you, Pekka.

To my best knowledge, all contractual relations between a CA and its subcontractors not only must be documented, but also be part of the CA audit. I hope Ben could clarify this for us.

As for SK ID Solutions, your statement about its independance, unfortunately is not accurate - Telia Company AB is (and has always been) its major lobbist at all levels - this is why we have now huge #eIDAS & #GDPR misimplementation chaos - the # of surrogate QESCs and QSCDs in circulation exceeds 5 million (!).

But back to the subject, if I understand correctly, Telia Lithuania (legal name AB Telia Lietuva) is one Telia Finland Oyj's RA, right?

Thanks,
M.D.

Sent from my Galaxy


-------- Original message --------
From: "Lahtiharju, Pekka" <pekka.la...@teliacompany.com>
Date: 12/7/21 16:55 (GMT+02:00)
To: "Moudrick M. Dadashov" <m...@ssc.lt>, Ben Wilson <bwi...@mozilla.com>
Cc: "Liimatainen, Mika A." <mika.lii...@teliacompany.com>, "Gholami, Ali" <ali.g...@teliacompany.com>
Subject: RE: Public Discussion: Inclusion of Telia Root CA v2

Hi Moudrick,

 

This division of Telia RA functionality to two internal affiliated teams is not now documented into our CP/CPS. I think many CA competitors like Entrust are also using several RA teams that are not documented. Should we document our RA practices from this angle?

 

SK ID Solutions is not counted as Telia affiliate because Telia ownership is only 50 %. Telia can’t control it now. Thus, it has its own processes and policies which are independent from Telia.

 

Br Pekka

 

 

From: Moudrick M. Dadashov <m...@ssc.lt>
Sent: tiistai 7. joulukuuta 2021 16.23
To: Lahtiharju, Pekka <pekka.la...@teliacompany.com>; Ben Wilson <bwi...@mozilla.com>
Cc: Liimatainen, Mika A. <mika.lii...@teliacompany.com>; Gholami, Ali <ali.g...@teliacompany.com>
Subject: RE: Public Discussion: Inclusion of Telia Root CA v2

 

Thank you, Pekka.

 

Is this RA policy described somewhere in Telia Finland Oyj CA documentation?

 

Hopefully this will help to understand the relationship between Telia Company AB, Telia Finland Oyj and the Estonian CA (a TSP under eIDAS) -  SK ID Solutions which is owned by Telia Company AB, Swedbank AB and SEB AB.

 

Thanks,

M.D.

 

 

 

Sent from my Galaxy

 

 

-------- Original message --------

From: "Lahtiharju, Pekka" <pekka.la...@teliacompany.com>

Date: 12/7/21 16:03 (GMT+02:00)

To: "Moudrick M. Dadashov" <m...@ssc.lt>, Ben Wilson <bwi...@mozilla.com>

Cc: "Liimatainen, Mika A." <mika.lii...@teliacompany.com>, "Gholami, Ali" <ali.g...@teliacompany.com>

Subject: RE: Public Discussion: Inclusion of Telia Root CA v2

 

Hi Moudrick,

 

Currently Telia CA has two RA teams: one in Telia Finland Oyj in Finland and another in Cygate AB in Sweden. Cygate AB is also fully owned subsidiary of Telia Company AB. All validations from any country are done in these two teams but today we have a policy that company validation is done only to companies where it or its main company is located in one of the Telia countries meaning: FI, SE, NO, DK, EE, LT. These countries are divided to the our RA teams. Telia Finland has responsibility of FI, EE, LT and internal Telia certificates. Cygate has responsibility of SE, NO, DK certificates. Telia Finland Oyj is the “owner” of RA functions and may start using later other Telia affiliates for RA purposes if business in some country grows significantly. Telia Finland Oyj is also responsible of the TLS certificate process.  Telia CA won’t use any external parties for TLS validation. This means that your example certificate from “Telia Company AB” is validated by Telia Finland Oyj. Note! DV certificates are enrolled without any country or company validation.

 

Telia also enroll some signature certificates for Swedish Citizens. These client certificates are outside of Mozilla scope based on their EKU.  There user identification is outsourced to a third party called Formpipe AB (https://www.formpipe.com/). They use Swedish national citizen authentication called BankID to authenticate users. This functionality is included into our basic Webtrust audit under special subCA “Telia Class 3 CA”. Formpipe is the only external delegated RA party Telia CA is using.

 

Br Pekka

 

From: Moudrick M. Dadashov <m...@ssc.lt>
Sent: tiistai 7. joulukuuta 2021 15.18
To: Lahtiharju, Pekka <pekka.la...@teliacompany.com>; Ben Wilson <bwi...@mozilla.com>
Cc: Liimatainen, Mika A. <mika.lii...@teliacompany.com>; Gholami, Ali <ali.g...@teliacompany.com>
Subject: RE: Public Discussion: Inclusion of Telia Root CA v2

 

Hi Pekka,

 

Thanks for clarification.

 

As noted earlier, my question is about distribution/delegation of CA functions among all "part of Telia Company AB". Specifically, I'd like to understand delegated RA functions (if any).

 

Just take an example of issuing an TSL certificate for Telia Company AB.

 

Thanks,

M.D.

 

 

 

 

 

Sent from my Galaxy

 

 

-------- Original message --------

From: "Lahtiharju, Pekka" <pekka.la...@teliacompany.com>

Date: 12/7/21 14:48 (GMT+02:00)

To: Ben Wilson <bwi...@mozilla.com>

Cc: "Liimatainen, Mika A." <mika.lii...@teliacompany.com>, "Gholami, Ali" <ali.g...@teliacompany.com>, m...@ssc.lt

Subject: RE: Public Discussion: Inclusion of Telia Root CA v2

 

Hi Ben,

 

Here is the full evidence from our legal department related to Telia Company’s right to use trade mark “Telia”. Telia Finland Oyj is a fully owned subsidiary of Telia Company AB and has a license to use trademark TELIA in business in Finland. List of other valid countries is in the attachment.

 

Br Pekka

 

From: Lahtiharju, Pekka
Sent: tiistai 7. joulukuuta 2021 10.59
To: Ben Wilson <bwi...@mozilla.com>
Cc: Liimatainen, Mika A. <mika.lii...@teliacompany.com>; Gholami, Ali <ali.g...@teliacompany.com>; m...@ssc.lt
Subject: RE: Public Discussion: Inclusion of Telia Root CA v2

 

Hi Ben,

 

I have the main responsibility of this discussion so you should add posting privileges to me. Before that I answer using this email.

 

Telia Group is a huge European company group consisting of about one hundred affiliates in several countries. The main company is “Telia Company AB” in Sweden. Telia Finland Oyj is its Finnish affiliate that is responsible of publicly trusted CA services for the whole company group. Telia Finland Oyj is using some other affiliates like Swedish “Cygate AB” when implementing CA services. Many affiliates resell Telia’s CA services. We have used both company names “Telia Company AB” and “Telia Finland Oyj” in this application.

 

The common name under Telia company group is “Telia” that is trade mark used in all Telia countries by most Telia affiliates. “Telia” trade mark is protected on European Union level using mechanisms of “European Union Intellectual Property Office”. It is also protected in all Telia countries using local rules in each country. The link to describe European Union level trade mark protection system is Trade marks (europa.eu). For these reasons we use name “Telia CA” in most contexts where public can see our CA services. E.g. we want to use CN value “Telia Root CA v2” so that it is clearly linked to Telia Company group in all Telia countries. Generally public is not aware of company names of Telia group or how they own each others, but public usually know our well-known trade mark “Telia” at least in our primary target countries.

 

Br

Pekka

 

From: Ben Wilson <bwi...@mozilla.com>
Sent: maanantai 6. joulukuuta 2021 20.13
To: Lahtiharju, Pekka <pekka.la...@teliacompany.com>; Liimatainen, Mika A. <mika.lii...@teliacompany.com>; Gholami, Ali <ali.g...@teliacompany.com>
Subject: Re: Public Discussion: Inclusion of Telia Root CA v2

 

Also, let me know who will be responding so that I can make sure they have posting privileges to the list.

 

On Mon, Dec 6, 2021 at 11:08 AM Ben Wilson <bwi...@mozilla.com> wrote:

Please respond to Moudrick on MDSP list and clarify - thanks!

My CCADB records say "Telia Finland Oyj, part of Telia Company AB"


This email may contain information which is privileged or protected against unauthorized disclosure or communication. If you are not the intended recipient, please notify the sender and delete this message and any attachments from your system without producing, distributing or retaining copies thereof or disclosing its contents to any other person.

Telia Company processes emails and other files that may contain personal data in accordance with Telia Company’s Privacy Policy.


Moudrick M. Dadashov

unread,
Dec 12, 2021, 5:28:41 PM12/12/21
to dev-secur...@mozilla.org
Forwarding to the list



Sent from my Galaxy


-------- Original message --------
From: md <m...@ssc.lt>
Date: 12/8/21 17:02 (GMT+02:00)
To: "Lahtiharju, Pekka" <pekka.la...@teliacompany.com>, Ben Wilson <bwi...@mozilla.com>
Cc: "Liimatainen, Mika A." <mika.lii...@teliacompany.com>, "Gholami, Ali" <ali.g...@teliacompany.com>
Subject: RE: Public Discussion: Inclusion of Telia Root CA v2

Good day, Pekka

Let’s focus on information directly relevant to this CA. As you already explained, "Telia" is just a trademark used by Telia Finland Oyj, which is the CA - a legal entity behind this  root inclusion request.

You have also clarified that Telia Finland Oyj has two (undisclosed) RAs and a number of so called affiliates. We still need to understand:

1) How/if Telia Company AB is (Sweden) involved in Telia Finland Oyj’s CA/RA operations?

2) does "Telia CA Policy Management Team" mean Telia Finland Oyj?

3) what is "affiliate" in terms of specific CA/RA functions?

pekka.la...@teliacompany.com

unread,
Dec 13, 2021, 1:33:16 AM12/13/21
to dev-secur...@mozilla.org, m...@ssc.lt

1) How/if Telia Company AB is (Sweden) involved in Telia Finland Oyj’s CA/RA operations?

The main company “Telia Company AB” is the owner of the other Telia organizations (aka companies aka subsidiaries aka affiliates). Telia Finland Oyj and Cygate AB are such subsidiaries. Within Telia Company group, each subsidiary is responsible for running the operations. Telia Finland Oyj is the legal entity running Telia CA operations. Telia employees from many Telia companies may belong to group functions that create systems for the whole Telia group. E.g. Telia CA is a group function so that persons in virtual Telia CA team come from many Telia affiliates and thus from many countries. Complex but big enterprises may work like this. To simplify a bit you can say that Telia Finland is running Telia CA using resources from many Telia affiliates. And all is owned by Telia Company AB. All Telia CA employees belong legally to one of the Telia affiliates.

 2) does "Telia CA Policy Management Team" mean Telia Finland Oyj?

Telia CA Policy Management team is also a Telia group function like described above. Currently it has members from “Telia Finland Oyj” and “Cygate AB”.

 3) what is "affiliate" in terms of specific CA/RA functions?

We use affiliate like BR defines it: “Affiliate: A corporation, partnership, joint venture or other entity controlling, controlled by, or under common control with another entity, or an agency, department, political subdivision, or any entity operating under the direct control of a Government Entity.” Resources to run CA/RA come from several Telia affiliates but CA belongs legally to Telia Finland Oyj. One RA belongs to and is run by Telia Finland Oyj and the other belongs to Cygate AB.

m.m.dadashov

unread,
Dec 14, 2021, 4:55:37 AM12/14/21
to pekka.la...@teliacompany.com, dev-secur...@mozilla.org
Thanks, Pekka



1) How/if Telia Company AB is (Sweden) involved in Telia Finland Oyj’s CA/RA operations?

you clarified that Telia CA is a group function of virtual Telia CA team from many Telia affiliates, in the meantime Mozilla accepts only real CA with disclosed locations that were "included in the scope of the audit or should have been included in the scope of the audit, whether the inspection was physically carried out in person at each location, and which audit criteria were checked (or not checked) at each location".

a) Is this audit material available somehere?

The documents provided under this request show that Telia Company AB is a PKI participant whose roles/responsibilities within the CA are not disclosed. I’d suggest in your answers to focus on Telia Company AB CA/RA functions/responsibilities rather than ownership details - BRs and Mozilla policy do not assume any privileges for owners, affiliates or groups - CA’s operational independence must be ensured and respected not only by its affiliates (including owners) but also by its own company management.


b) according to RFC 3647 BRs and Mozilla policy require CP and CPS, while this root has CPS only, correct?


2) does "Telia CA Policy Management Team" mean Telia Finland Oyj?

you explained that its a Telia group function with two participants Telia Finland Oyj and Cygate AB, however based on 1) and the documents provided under this request, this CA has at least three PKI participants whose roles/responsibilities need to be disclosed.


3) what is "affiliate" in terms of specific CA/RA functions?

you explaned that "We use affiliate like BR defines it", sorry, but this is misunderstanding - in BRs affiliate is used in specific CA/RA operation contexts, so please be as specific as possible, what is the role of the affiliate you mentioned earlier - Telia Lithuania (legal name AB Telia Lietuva)?


Thanks,
M.D.

Sent from my Galaxy
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.

pekka.la...@teliacompany.com

unread,
Dec 14, 2021, 8:59:53 AM12/14/21
to dev-secur...@mozilla.org, m.m.da...@gmail.com, pekka.la...@teliacompany.com
>You clarified that Telia CA is a group function of virtual Telia CA team from many Telia affiliates, in the meantime Mozilla accepts only real CA with disclosed locations that were "included in the scope of the audit or should have been included in the scope of the audit, whether the inspection was physically carried out in person at each location, and which audit criteria were checked (or not checked) at each location".

I don't understand your statements above that we are not real or not disclosed our locations or audit criteria. Telia CA is a real CA under Telia Finland Oyj which is affiliate company of Telia Company AB. This is clearly disclosed in our CPS 1.3.1 using this wording: "The CA operating in compliance with this CPS is Telia CA. The legal entity responsible of Telia CA is Finnish company “Telia Finland Oyj” (BusinessID 1475607-9). Telia Finland Oyj is part of Swedish company “Telia Company AB” (BusinessID 5561034249)." Also our annual Webtrust audits clearly states that both countries have been in the audit scope. E.g. the last Webtrust report is using this wording: "... in providing its SSL and non-SSL Certification Authority (CA) services in Finland and Sweden, throughout the period 1 April 2020 to 31 March 2021, Telia has: -disclosed its SSL ...". The Full Webtrust audit reports are available at links below. Auditors have every year visited physically both countries since 2005 to verify our all our operations. Also audit criteria (Webtrust and its versions) is clearly stated in our audit reports.

>a) Is this audit material available somehere?



>The documents provided under this request show that Telia Company AB is a PKI participant whose roles/responsibilities within the CA are not disclosed. I’d suggest in your answers to focus on Telia Company AB CA/RA functions/responsibilities rather than ownership details - BRs and Mozilla policy do not assume any privileges for owners, affiliates or groups - CA’s operational independence must be ensured and respected not only by its affiliates (including owners) but also by its own company management.

I don't understand. All participants, locations and audit reports are disclosed on our public web pages Telia Certificate Services Repository. Both RAs were included in the audits like explained above. Swedish RA may not be directly mentioned in CPS but none of our competitors is listing all their RA teams either. All our CA/RA employees are internal Telia persons. Telia Company AB hasn't any real CA/RA role, instead it is the owner of Telia Finland Oyj and thus indirectly owner of Telia CA. Audit reports show how all our CA/RA processes in all locations have passed audits with only minor deviations. Auditors also verify all locations and roles of all trusted persons.  Company management assertions show that Telia Company Management is behind Telia CA. Our CP/CPS documents describe our processes in very detailed level. I think that different Telia company roles and responsibilities should be already clear but if any more responsibility description is required I'm happy to provide such.


>b) according to RFC 3647 BRs and Mozilla policy require CP and CPS, while this root has CPS only, correct?

Incorrect. Our disclosed CP/CPS is both at the same time. Chapter 1.2 clearly states: "This CPS is also a CP for Telia OV, DV and Seal certificates.". In many CP/CPS chapters there is at first more general CP description and then below how Telia CA has implemented such things.


>you explained that its a Telia group function with two participants Telia Finland Oyj and Cygate AB, however based on 1) and the documents provided under this request, this CA has at least three PKI participants whose roles/responsibilities need to be disclosed.

I don't understand what would be the third Telia CA/RA participant you are referring. Telia Company AB's role as the owner has been already covered in my previous comments. I don't think owner is any real CA/RA role. The only real (functional) roles belong to Telia Finland Oyj which has the legal responsibility of Telia CA and of the Finnish RA team and Cygate AB which has the legal responsibility of our Swedish RA team. 


>you explaned that "We use affiliate like BR defines it", sorry, but this is misunderstanding - in BRs affiliate is used in specific CA/RA operation contexts, so please be as specific as possible, what is the role of the affiliate you mentioned earlier - Telia Lithuania (legal name AB Telia Lietuva)?
Telia Lithuania AB has no role in Telia CA/RA processes. Clear enough? They may be using Telia certificates there thus having "relying party" role.

md

unread,
Dec 14, 2021, 12:51:31 PM12/14/21
to pekka.la...@teliacompany.com, dev-secur...@mozilla.org, m.m.da...@gmail.com
Thank you, Pekka

Before we can continue our discussion, could you please add any other documents relevant to this request? Make sure the documents are not password protected.

I’ve been relying on the documents listed in Ben's initial announcement.

pekka.la...@teliacompany.com

unread,
Dec 16, 2021, 2:44:38 AM12/16/21
to dev-secur...@mozilla.org, m...@ssc.lt, m.m.da...@gmail.com, pekka.la...@teliacompany.com
All other Telia CA public documentation is here: https://cps.trust.telia.com.  If you think that something is missing specify what. All links in Ben's initial announcement look good to me. There are no unnecessary password protections. 

Moudrick Dadashov

unread,
Dec 16, 2021, 10:24:06 AM12/16/21
to pekka.la...@teliacompany.com, dev-secur...@mozilla.org, m...@ssc.lt
Thank you, Pekka

At least the audit reports in the Repository require password. Please advise.

Thanks,
M.D.


Dimitris Zacharopoulos

unread,
Dec 16, 2021, 1:42:31 PM12/16/21
to Moudrick Dadashov, pekka.la...@teliacompany.com, dev-secur...@mozilla.org, m...@ssc.lt


On 16/12/2021 5:23 μ.μ., Moudrick Dadashov wrote:
Thank you, Pekka

At least the audit reports in the Repository require password. Please advise.


I managed to download and open all reports listed in https://cps.trust.telia.com/ under the "AUDIT REPORTS AND SEALS" section without any password issues.

Dimitris.

Moudrick Dadashov

unread,
Dec 16, 2021, 2:21:59 PM12/16/21
to Dimitris Zacharopoulos, pekka.la...@teliacompany.com, dev-secur...@mozilla.org, m...@ssc.lt
Thanks, Dimitris

Indeed the directive links no longer require passwords, however those through WebTrust do (see attached).

Thanks,
M.D.

SmartSelect_20211216-211808_Docs To Go.jpg

Corey Bonnell

unread,
Dec 16, 2021, 2:40:39 PM12/16/21
to Moudrick Dadashov, Dimitris Zacharopoulos, pekka.la...@teliacompany.com, dev-secur...@mozilla.org, m...@ssc.lt

Hi Moudrick,

It would be worthwhile to try another PDF viewer, as I am successfully able to view the WebTrust report PDFs in Telia’s Repository using Firefox’s built-in PDF viewer without having to input any passwords.

 

Thanks,

Corey

Moudrick M. Dadashov

unread,
Dec 16, 2021, 9:56:54 PM12/16/21
to Corey Bonnell, Moudrick Dadashov, Dimitris Zacharopoulos, pekka.la...@teliacompany.com, dev-secur...@mozilla.org
Hi Corey,

thank you, indeed I'm able to open all documents on my laptop (looks like a bug in my Docs to Go app).

I'll proceed with responding to Pekko's email.

Thanks,
M.D.

Ben Wilson

unread,
Dec 23, 2021, 4:22:55 PM12/23/21
to dev-secur...@mozilla.org

On December 1, 2021, we began a three-week public discussion[1] on a request from “Telia” for inclusion of its root certificate, the Telia Root CA v2.[2] (Step 4 of the Mozilla Root Store CA Application Process[3]). Telia seeks enablement of both the websites and the email trust bits.

Summary of Discussion and Completion of Action Items [Application Process, Steps 5-8]:  

Moudrick Dadashov inquired about the relationship among the “Telia” entities, noting that Telia Company AB (Sweden) and Telia Oy (Finland) are two separate legal persons, and that the announcement of the public discussion did not clarify which one was operating the CA that is the subject of the inclusion request. I noted that the CCADB record reflected “Telia Finland Oyj, part of Telia Company AB” as the applicant.

Pekka Lahtiharju, a representative of the Telia companies, responded that “Telia” is a trademark recognized in the EU, but that “Telia Company AB” in Sweden was the main company, while Telia Finland Oyj was its Finnish affiliate responsible for publicly trusted CA services for the whole company group, and that Telia Finland Oyj was also using Swedish Cygate AB to perform CA and Registration Authority (RA) services for server certificates, and that for signature certificates under the “Telia Class 3 CA” subordinate CA, Formpipe AB would serve as an external RA. (According to the CCADB, that subordinate CA has EKUs of 1.2.840.113583.1.1.5 and 1.3.6.1.4.1.311.10.3.12 and a derived trust bit of “Document Signing.”)

Additional follow-up questions were about the RA relationships among Telia Company AB, Telia Finland Oyj and the Estonian CA (a TSP under eIDAS) - SK ID Solutions (owned by Telia Company AB, Swedbank AB and SEB AB), and Telia Lithuania (legal name Telia Lietuva AB).

Pekka responded that he couldn’t speak to SK ID Solutions because they were a separate company, and that Telia Lietuva AB was a Telia affiliate, but not an RA. He also responded that “[the] Swedish RA may not be directly mentioned in CPS but none of our competitors is listing all their RA teams either. All our CA/RA employees are internal Telia persons. Telia Company AB hasn't any real CA/RA role, instead it is the owner of Telia Finland Oyj and thus indirectly owner of Telia CA. Audit reports show how all our CA/RA processes in all locations have passed audits with only minor deviations. Auditors also verify all locations and roles of all trusted persons.” 

Pekka also stated that all of the relevant public documentation was available for review at https://cps.trust.telia.com.

We did not receive any other objections or other questions or comments in opposition to Telia’s request.

There still remain the three, previously-mentioned, open incidents/bugs in Bugzilla. However, I do not believe that these, or the issues mentioned above, merit a delay in Mozilla’s approval decision.

Close of Public Discussion and Intent to Approve [Application Process, Steps 9-10]: 

This is notice that I am closing public discussion (Application Process, Step 9) and that it is Mozilla’s intent to approve Telia’s request (Step 10). 

This begins a 7-day “last call” period for any final objections.

Thanks,

Ben

[1] https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/52Gfr4dnJD8/m/yn5fpfnACQAJ

[2] https://bugzilla.mozilla.org/show_bug.cgi?id=1664161

[3] https://wiki.mozilla.org/CA/Application_Process#Process_Overview


Moudrick M. Dadashov

unread,
Dec 29, 2021, 9:33:02 AM12/29/21
to pekka.la...@teliacompany.com, dev-secur...@mozilla.org, m...@ssc.lt
Thanks, Pekka

Obviously the year end is not the best time for this high risk applicant - Telia Company AB - as a telco and Tier 1 ISP together with its affiliates use/rely on TSL certificates for other undisclosed network management purposes. Also, given Telia Company AB's business practices in my own country, its close "cooperation" with many governments, worth mentioning that this is a semi-government company.

As this is the only place where we can discuss Telia Company AB related issues (eIDAS supervisory body assessment procedures are not public), I’d like to summarize the three questions raised earlier:


1) How/if Telia Company AB is (Sweden) involved in Telia Finland Oyj’s CA/RA operations?

i) in your 12-14-21 email: 'I don't understand your statements above that we are not real or not disclosed our locations or audit criteria’, however in your 12-13-21 email: "Telia CA is a group function so that persons in virtual Telia CA team come from many Telia affiliates and thus from many countries. Complex but big enterprises may work like this. To simplify a bit you can say that Telia Finland is running Telia CA using resources from many Telia affiliates.

The problem here is that the CA resources need to be clearly identified and audited (irrelevant to who owns what). Ownership of resources also need to be disclosed - it helps relying parties to understand the risk.

ii) "Telia CA is a real CA under Telia Finland Oyj which is affiliate company of Telia Company AB".

Again, this is confusing, the discussion is about CA operations not ownership.

iii) "This is clearly disclosed in our CPS 1.3.1 using this wording: "The CA operating in compliance with this CPS is Telia CA. The legal entity responsible of Telia CA is Finnish company “Telia Finland Oyj” (BusinessID 1475607-9). Telia Finland Oyj is part of Swedish company “Telia Company AB” (BusinessID 5561034249)."

Please be as specific as possible - we don’t need "responsible of Telia CA", we need identification of the CA - a legal person, so I assume its Telia Finland Oyj and NOT Telia Company AB, right?


iv) "Also our annual Webtrust audits clearly states that both countries have been in the audit scope. E.g. the last Webtrust report is using this wording: "... in providing its SSL and non-SSL Certification Authority (CA) services in Finland and Sweden, throughout the period 1 April 2020 to 31 March 2021, Telia has: -disclosed its SSL ..."."

the subject of audit should be a legal entity, not a country -  the AUDIT REPORTS AND SEALS section of the CA’s Repository lists following 5 items:

- WebTrus Audit Report 2021 (15 pages)
The first 7 pages of this document is TELIA'S MANAGEMENT ASSERTION, which clearly states that: "Telia Company AB (Telia) operates the Certificate Authority (CA) services as listed in Appendix A, and provides the followin services: Subscriber registration, Certificate renewal, Certificate rekey, Certificate issuance, Certificate distribution, Certificate revocation, Certificate validation, Subscriber key generation and management.
The management of Telia is responsible for establishing and maintaining effective control over its CA operations."

The second part of this document is KPMG’s letter To the Management of Telia Company AB which also clearly states: "We have been engaged, in a reasonable assurance, to report on Telia Company AB’s (Telia) management’s assertion that for its Certification Authority (CA) operations in Finland and Sweden throughout  the period 1 April 2020 trough 31 March 2021....”. In this report there is no reference to Telia Finland Oyj.


The first 6 pages of this document is also TELIA'S MANAGEMENT ASSERTION by Telia Company AB and the second part KPMG's letter To the Management of Telia Company with the same statement as above. In this report there is no reference to Telia Finland Oyj.

- Telia Public Response to Audit 2021
In this single page document no reference to Telia Company AB or Telia Finland Oyj.


The link here refers to the WebTrus Audit Report 2021 (see above).

The link here also refers to the WebTrus Audit Report 2021 (see above).


v) "The Full Webtrust audit reports are available at links below. Auditors have every year visited physically both countries since 2005 to verify our all our operations. Also audit criteria (Webtrust and its versions) is clearly stated in our audit reports."

See above, again, we are not talking about country audits. If something seams to you clearly stated, help us to see that with specific references - as noted earlier, Mozilla policy requires clear indication of which audit criteria were checked (or not checked) at each location" - as you don’t have a CP and the relevant parts are not identified in the CP/CPS, its unclear what criteria you are talking about.


vi) "All participants, locations and audit reports are disclosed on our public web pages Telia Certificate Services Repository".

Sorry, this generic claims don’t help, specific questions need specific answers.

vii) "Both RAs were included in the audits like explained above. Swedish RA may not be directly mentioned in CPS but none of our competitors is listing all their RA teams either."

See above my comment iv) I’m sure revisiting RFC 3647 should help, does it matter that "none of our competitors is listing all their RA teams either"? RAs are essential part of CA operations!

viii) ”All our CA/RA employees are internal Telia persons. Telia Company AB hasn't any real CA/RA role, instead it is the owner of Telia Finland Oyj and thus indirectly owner of Telia CA."

"Telia persons" should not be accepted, only persons with contractual relations  with the CA - Telia Finland Oyj. Here in Lithuania Telia has created the same chaos - just forget about the laws and standards, do like "Telia persons".

ix) "Audit reports show how all our CA/RA processes in all locations have passed audits with only minor deviations. Auditors also verify all locations and roles of all trusted persons."

Please don’t forget to indicate specific document and pages. This generic claims don’t help.

x) "Company management assertions show that Telia Company Management is behind Telia CA. Our CP/CPS documents describe our processes in very detailed level. I think that different Telia company roles and responsibilities should be already clear but if any more responsibility description is required I'm happy to provide such."

But you have already explained that the CA under this request is Telia Finland Oyj (?!). If Telia Company AB is involved in the CA operations, it needs be identified as a PKI participant.

xi) "Our disclosed CP/CPS is both at the same time. Chapter 1.2 clearly states: "This CPS is also a CP for Telia OV, DV and Seal certificates.". In many CP/CPS chapters there is at first more general CP description and then below how Telia CA has implemented such things."

Sorry, this is not what we expect per Section 3.5 of RFC 3647. Could you replace "In many CP/CPS chapters" with specific chapter numbers? 


x) "I don't understand what would be the third Telia CA/RA participant you are referring. Telia Company AB's role as the owner has been already covered in my previous comments. I don't think owner is any real CA/RA role. The only real (functional) roles belong to Telia Finland Oyj which has the legal responsibility of Telia CA and of the Finnish RA team and Cygate AB which has the legal responsibility of our Swedish RA team."

As shown above (see comment iv), actually you have two undisclosed PKI  participants: Telia Company AB and Cygate AB.

Conclusion: Telia Company AB is a PKI participant with undisclosed obligations.

2) does "Telia CA Policy Management Team" mean Telia Finland Oyj?

Not clear.

3) what is "affiliate" in terms of specific CA/RA functions?

Not clear.


If approved, this request will create a precedent of ”do like Telia” - a practice that is widely used by Telia Company AB and its affiliates in the trust services markets under eIDAS. That’s how the recent eIDAS & GDPR misimplementation chaos started.

I suggest this request be approved after the conversion of corporate relationships into clearly identified, disclosed and audited specific PKI participant roles.


Thanks,
M.D.

Ryan Sleevi

unread,
Dec 29, 2021, 11:00:04 PM12/29/21
to Moudrick M. Dadashov, pekka.la...@teliacompany.com, dev-secur...@mozilla.org, m...@ssc.lt
On Wed, Dec 29, 2021 at 9:33 AM Moudrick M. Dadashov <m.m.da...@gmail.com> wrote:

If approved, this request will create a precedent of ”do like Telia” - a practice that is widely used by Telia Company AB and its affiliates in the trust services markets under eIDAS. That’s how the recent eIDAS & GDPR misimplementation chaos started.

I suggest this request be approved after the conversion of corporate relationships into clearly identified, disclosed and audited specific PKI participant roles.

Moudrick,

For those following, could you share more precise details (e.g. references to news articles or other discussions) about the "recent eIDAS & GDPR misimplementation chaos started"? This sounds like you're specifically referring to actions taken by Telia Company AB, and perhaps some more context/references would help understand your concern. 

Moudrick Dadashov

unread,
Dec 30, 2021, 10:33:31 AM12/30/21
to ry...@sleevi.com, pekka.la...@teliacompany.com, dev-secur...@mozilla.org, m...@ssc.lt
Sure, Ryan, allow me 2-3 days as I’m fully booked by my grandchildren :)

Thanks,
M.D.

md

unread,
Jan 3, 2022, 11:38:08 AM1/3/22
to Moudrick Dadashov, ry...@sleevi.com, pekka.la...@teliacompany.com, dev-secur...@mozilla.org
1. RE "recent eIDAS & GDPR misimplementation chaos started"


1.1 misimplementation means an instance of applying something incorrectly

1.1.1 instance means a data object that Telia's affiliates - SK ID Solutions (formerly AS Sertifitseerimeskeskus)  together with its RA - Omnitel (legal name - AB Telia Lietuva) have been issuing to the public as "qualified certificate" (QS).

1.1.2 something means "Qualified certificate" - a complex data structure that was initially defined in directive 1999/93/EC. For clarity, the QS in 1.1.1 (which is incompatible with the directive) is called surrogate QS.

1.1.3 Worth mentioning also evaluation of legality of surrogate QS by:

a) the Data Protection Authority (legal name Valstybinė duomenų apsaugos inspekcija - VDAI) ordered Omnitel to stop issuing surrogate QSs. This order is still ignored (how and why can be discussed separately);

b) the Supreme administrative court which ruled that surrogate QS violates the Data protection law (an implementation of directive 95/46/EC, now regulation 2016/679 - GDPR). This is also ignored (how and why can be discussed separately).

1.1.4 based on the above, misimplementation of directive 1999/93/EC means incorrect application of Article 2 (10) (and Article 8 and Annex I). For technical details see the surrogate QC profiles here: https://www.skidsolutions.eu/en/repository/CPS/

1.1.5 the regulation 910/2014 (eIDAS) enhances and expands the acquis of  Directive 1999/93/EB - its transitional measure (Article 51 (2)) provision the conditions for the recognition of QSs (issued according to directive 1999/93/EC) as qualified electronic signature certificates (QESC) under eIDAS.

1.1.6 the fact that SK ID Solutions together with its unaudited RA - AB Telia Lietuva:

a) within transitional period issued surrogate QSs only, means incorrect application of eIDAS Article 51;

b) after transitional period have been issuing surrogate QSs only, means incorrect application of eIDAS Article 28 (1) - (3).

1.1.7 based on the above, misimplementation of eIDAS means incorrect application of Article 5, 28 (1) - (2) and 51 (2).


1.2 chaos means complete confusion and disorder

1.2.1 when surrogate QCs are accepted as QESCs, it is confusion.

1.2.2 eIDAS has at least three directly applicable mechanisms to prevent issuing surrogate QCs, but none of them worked as expected (disorder):

a) TSP audit by CAB - surrogate QCs were accepted;

b) TSP "qualified service" assessment by the Supervisory body - surrogate QCs were accepted;

c) Trust list management by the Scheme operator under the Commission implementing decision 2015/1505 - surrogate QCs were accepted.

2. RE "This sounds like you're specifically referring to actions taken by Telia Company AB"

Correct. Telia Company AB is the driving force of an ”organized group”, where

a) The Swedish government creates "favorable conditions" in the countries of Telia Company AB's business operation (at least easy access to local governments is guaranteed);

b) The Telia Company AB management partners with local governments so that the doors of relevant institutions (agencies) are open to its local affiliate  (remember "What's good for General Motors is good for the country"?)

c) The Telia Company AB affiliate develops "special relationship" with the  institutions so that at least supervision of its business is completely "switched off", this includes lobbying any desired legislation (surrogate QC is "locally legitimazed" despite of competing with other national laws and EU directives and regulations.

I must apologize for this schematic/simplified response covering 20+ years of Telia Company AB's business practices in Baltics.

If you google "Telia + corruption", almost all information will be about Telia Company AB's (formerly TeliaSonera AB) "achievements" in teleco markets, this is partly because of:

- its huge propaganda machine on mass media and social networks;


- naturally invisible/hard to understand trust services.

Please let me know if you need more info or have any questions - the information above is backed by publicly acessible evidence material from official sources.

Thanks,
M.D.

Sent from my Galaxy


-------- Original message --------
From: Moudrick Dadashov <m.m.da...@gmail.com>
Date: 12/30/21 17:34 (GMT+02:00)
Subject: Re: FW: RE: Public Discussion: Inclusion of Telia Root CA v2

--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.

pekka.la...@teliacompany.com

unread,
Jan 4, 2022, 1:49:31 AM1/4/22
to dev-secur...@mozilla.org, m...@ssc.lt, pekka.la...@teliacompany.com, dev-secur...@mozilla.org, m.m.da...@gmail.com, Ryan Sleevi
Your comment is  again full of inaccurate claims and accusations without any evidence. Again: SK ID Solutions is not an affiliate of Telia Company AB (check annual report that is listing affiliates). Telia CA has nothing to do with them. This conversation is about Telia CA Root application to Mozilla and your unclear SK/Eidas/QS comments are not related to this at all. I wonder how long this kind of hostile discussion is tolerated by Mozilla.

-"High Risk": Telia Company AB is by no means any "high risk" applicant. Telia CA has been a normal Root CA already more than 15 years without any security related issues in any of annual audit results. All BR rules have been followed during that time. Only minor technical deviations have ever been identified. Recently Telia also joined to CAB Forum work also.

-"Semi-government company": Telia Company is a normal private company. Check https://www.teliacompany.com/en: Founded in 1853. The share is listed at Nasdaq Stockholm and Nasdaq Helsinki. Approximately 490,000 shareholders. 20,800 employees. Net sales SEK 89,191 million.

-"The problem here is that the CA resources need to be clearly identified and audited":
CA Resources have been clearly identified above to be located in Finnish "Telia Finland Oyj" and in Swedish "Cygate AB". The full CA organization and system has been audited annually in both countries and in both companies. Auditors have got exact person details who belong to Telia CA and audit has been focused on those persons and their legal entities and how they implement Telia CA.

-"the discussion is about CA operations not ownership"
I agree. Auditors have audited all related CA operations annually based on publicly disclosed Telia CP/CPS.

-"the subject of audit should be a legal entity, not a country"
Audit scope in audit reports has been legal entity "Telia Company AB (Telia)" that is the main company. This audit scope covers both mentioned affiliate legal entities practically participating into Telia CA processes.

-"CA/Browser Forum Baseline Requirements Audit Report 2021 (15 pages). In this report there is no reference to Telia Finland Oyj."
In audit reports there is reference to main company "Telia Company AB" because auditors kept it as better because Telia CA functions are carried by both affiliates: "Telia Finland Oyj" and "Cygate AB". We can ask auditors to add all three company names in the future audit reports if it makes audit results clearer.

-"Telia Public Response to Audit 2021, In this single page document no reference to Telia Company AB or Telia Finland Oyj."
Incorrect, footer has identification of entity that created this response which is: Telia Finland Oyj

-"Mozilla policy requires clear indication of which audit criteria were checked (or not checked) at each location" - as you don’t have a CP and the relevant parts are not identified in the CP/CPS, its unclear what criteria you are talking about."
I don't understand. We have CP (combined CP/CPS) that identifies the legal entities. I think the used audit criteria and locations (Finland and Sweden) are clearly stated in the audit reports. Both locations were using the same criteria. For WTCA criteria it is clearly written there "...in accordance with the WebTrust Principles and Criteria for Certificate Authorities v2.2.1." and for WTBR is using "...in accordance with the WebTrust Principles and Criteria for Certificate Authorities - SSL Baseline with Network Security v2.4.1."  

Moudrick M. Dadashov

unread,
Jan 4, 2022, 6:02:41 AM1/4/22
to pekka.la...@teliacompany.com, dev-secur...@mozilla.org, m.m.da...@gmail.com, Ryan Sleevi
Thanks, Pekka

"Your comment is  again full of inaccurate claims and accusations without any evidence."

I understand your frustration - we have different knowledge what Telia Company AB is - unfortunately you are limited to ownership and company reports, but the reality is completely different.

"This conversation is about Telia CA Root application to Mozilla and your unclear SK/Eidas/QS comments are not related to this at all."

Correct, in my last comment I responded to Ryan's questions. Don't mix this up with my previous comment about Telia Finland Oyj's Root inclusion request, ok?

"Telia Company AB is by no means any "high risk" applicant."

Quoting out of context is one well known methods. If you read carefully, I explained why this is a high risk application.

"Semi-government company": Telia Company is a normal private company".

Semi-government means a hibrid entity partly owned by Government (~40%).

"CA Resources have been clearly identified above to be located in Finnish "Telia Finland Oyj" and in Swedish "Cygate AB".

Sorry, could you point us to specific URL's with page numbers?

"Auditors have audited all related CA operations annually based on publicly disclosed Telia CP/CPS."

"all related CA operations" is not sufficient: as noted earlier, its not clear which legal entity is the CA - the references I provided were on behalf of Telia Company AB, however applicant of this request is Telia Finland Oyj - from CA operations point of view these should be two different (independent) entities (no matter who owns what).

Besides, we don't know which  [parts of CPS] constitute the CP. If you disclose this clearly, then we'll see what criteria  auditors have  checked.

"Audit scope in audit reports has been legal entity "Telia Company AB (Telia)" that is the main company. This audit scope covers both mentioned affiliate legal entities practically participating into Telia CA processes."

But we need audit reports issued to Telia Finland Oyj, which should be the only "main company". We don't care who owns Telia Finland Oyj unless the CA shares its operational resources with third parties (including owners). In all other cases, let's forget about Telia Company AB. :)

"We can ask auditors to add all three company names in the future audit reports if it makes audit results clearer."

I'm afraid this is misunderstanding - the CA under this request should be a clearly disclosed legal entity (ownership is out of scope here). If the CA operations rely on other party's (e.g. owner's, affiliate's etc.) material or human resources, you need to disclose those shared resources and have auditors do appropriate check ups. If this information already exist, please give us  specific references.

"I think the used audit criteria and locations (Finland and Sweden) are clearly stated in the audit reports."

OK, if you think so, just indicate specific audit report pages.

Thanks,
M.D.

Sent from my Galaxy


-------- Original message --------
Date: 1/4/22 08:50 (GMT+02:00)

Ryan Sleevi

unread,
Jan 4, 2022, 9:13:06 AM1/4/22
to md, Moudrick Dadashov, dev-secur...@mozilla.org, pekka.la...@teliacompany.com, ry...@sleevi.com
On Mon, Jan 3, 2022 at 11:38 AM 'md' via dev-secur...@mozilla.org <dev-secur...@mozilla.org> wrote:
1.1.1 instance means a data object that Telia's affiliates - SK ID Solutions (formerly AS Sertifitseerimeskeskus)  together with its RA - Omnitel (legal name - AB Telia Lietuva) have been issuing to the public as "qualified certificate" (QS).

As with Pekka, I have to question the relevance of this statement to the discussion.

It would appear you’re saying that Telia should be held accountable for SK IDs behavior, and the reasoning for that is simply the statement that they are “Telia’s affiliates”.

Can you share facts and details to support this claim? Otherwise, it presently reads no differently than if someone said I should be personally responsible for, say, WoSign, because I talked to their CEO once.

That’s not to suggest there may not be something here, but you haven’t actually established this with any supporting details yet.

1.1.2 something means "Qualified certificate" - a complex data structure that was initially defined in directive 1999/93/EC. For clarity, the QS in 1.1.1 (which is incompatible with the directive) is called surrogate QS.

I am unable to locate any references to this term. Is this a term you just made up here?


1.1.3 Worth mentioning also evaluation of legality of surrogate QS by:

a) the Data Protection Authority (legal name Valstybinė duomenų apsaugos inspekcija - VDAI) ordered Omnitel to stop issuing surrogate QSs. This order is still ignored (how and why can be discussed separately);

b) the Supreme administrative court which ruled that surrogate QS violates the Data protection law (an implementation of directive 95/46/EC, now regulation 2016/679 - GDPR). This is also ignored (how and why can be discussed separately).

It may be worth disclosing that it would appear you were listed as well in this case, and thus may not be neutral. That doesn’t necessarily undermine the facts, but does affect how we should perceive the conclusions here, as it appears it was a case against your competitor.

However, while I greatly appreciate the fascinating case here, it also doesn’t obviously link to Omnitel, and certainly not to Telia. If you believe there is a link, I hope you can show a bit more of those details.

Noting here, further, that the case was with respect to the inclusion of certain ID attributes, in which the (equivalent of) the SB said was permitted, your CA believed were not, the other CA believed were - and the latter CA became more popular. I mention it because it seems at issue here was the guidance of the state authority, rather than the CA itself.

1.1.6 the fact that SK ID Solutions together with its unaudited RA - AB Telia Lietuva:

Can you establish this link mode, specifically:
1) between AB Telia Lietuva and the CA presently applying
2) Establishing how this CA was unaudited

1.2.2 eIDAS has at least three directly applicable mechanisms to prevent issuing surrogate QCs, but none of them worked as expected (disorder):

a) TSP audit by CAB - surrogate QCs were accepted;

b) TSP "qualified service" assessment by the Supervisory body - surrogate QCs were accepted;

c) Trust list management by the Scheme operator under the Commission implementing decision 2015/1505 - surrogate QCs were accepted.

With respect, a wide degree of latitude is afforded to SBs with respect to scheme evaluation and notification, and similarly to the supervision of CABs. This is one of the long-standing critiques as to the applicability of eIDAS to browser trust programs (and equally, that those schemes proposed to be unified into - such as ETSI - are equally misaligned).

However, it would seem that you’re saying that despite the SB recognizing the CABs assessment and notifying the trust list, that the CA should bear responsibility here, particularly for doing something the government said is OK?

I certainly don’t want to say that government authority exempts a CA from understanding the rules, or this would create a clear risk of compelled misissuance, but I think that such a statement is also missing a lot of substance and detail here.

Are we still discussing the context of the citizen number being included in certificates, or do you believe there are further aspects at play here?

2. RE "This sounds like you're specifically referring to actions taken by Telia Company AB"

Correct. Telia Company AB is the driving force of an ”organized group”,

I’m not sure that we’ve established the connection yet.

where

a) The Swedish government creates "favorable conditions" in the countries of Telia Company AB's business operation (at least easy access to local governments is guaranteed);

This is a statement without support, but also seems to be a complaint about the Swedish government?

b) The Telia Company AB management partners with local governments so that the doors of relevant institutions (agencies) are open to its local affiliate  (remember "What's good for General Motors is good for the country"?)

Are you implying that Telia participated in corruption? It’s unclear if this is a complaint simply that they’re well-connected, or if this is implying nefarious action because of it.

c) The Telia Company AB affiliate develops "special relationship" with the  institutions so that at least supervision of its business is completely "switched off", this includes lobbying any desired legislation (surrogate QC is "locally legitimazed" despite of competing with other national laws and EU directives and regulations.

Is this still about the citizen number? Are there other aspects here?

I must apologize for this schematic/simplified response covering 20+ years of Telia Company AB's business practices in Baltics.

If you google "Telia + corruption", almost all information will be about Telia Company AB's (formerly TeliaSonera AB) "achievements" in teleco markets, this is partly because of:

I’m not sure I see the same results? That is, there’s the discussion of the Uzbekistan corruption case, which I believe you’ve raised previously on the list (certainly, there has been some past discussion), in which TeliaSonera was accused of bribing Uzbeki authorities. That case was settled (with respect to US charges), although the charges against Telia’s CEO were dismissed on a technicality (unable to show the specific beneficiaries of the bribes were directly responsible for decision making).

However, are the others you believe are relevant to this current inclusion request?

Please let me know if you need more info or have any questions - the information above is backed by publicly acessible evidence material from official sources.

I think it’s clear you feel very strongly about this, and would appear to be requesting this request be denied.

What is unclear to me is what are the relevant facts you believe would justify that. As it stands, the only concrete detail that seems to be provided here is a case against a different CA; if this is linked to Telia, it’s not obvious.

On the vaguer side, we see references to Telia’s corruption scandals, and an implication of inherent corruption simply because they lobby. I’m not trying to suggest such concerns aren’t relevant; as we saw with DarkMatter, the behaviors and practices of an organization can very much have bearing on the decision to include or not include a CA. It’s just that, right now, it does not feel like there is a similarly coherent narrative about the risks, and how those past actions predict further new issues that pose such risks.

Unlike, say, multiple independently sourced and researched allegations of adversarial hacking, the substance here seems to be one of bribery or influence operations, and I hope you can further elaborate why members here should be particularly concerned. For example, with your remarks about surrogate QSes, CABs, and SBs, it’s unclear if you’re trying to suggest that the audits should not be relied upon. However, as Telia noted, they also provide WebTrust-based audits; are you suggesting that corruption or influence extends there as well?

Moudrick Dadashov

unread,
Jan 4, 2022, 9:46:32 AM1/4/22
to ry...@sleevi.com, md, dev-secur...@mozilla.org, pekka.la...@teliacompany.com
Thanks, Ryan

I'm afraid we are taking wrong direction. :)

As I responded to Pekka today, the email you are commenting below is my answer to your questions about my comments re: eIDAS & GDPR chaos. If you are still interested, we can continue this discussion separately. 

To keep the root inclusion process in order, I'd suggest to reply to my last email today.

Thanks,
M.D.

pekka.la...@teliacompany.com

unread,
Jan 4, 2022, 9:54:35 AM1/4/22
to dev-secur...@mozilla.org, m...@ssc.lt, m.m.da...@gmail.com, Ryan Sleevi, pekka.la...@teliacompany.com
>>"CA Resources have been clearly identified above to be located in Finnish "Telia Finland Oyj" and in Swedish "Cygate AB".
>Sorry, could you point us to specific URL's with page numbers?

"Above" in my comment refers to this discussion where I have disclosed in very detailed level how the three legal entities are involved: "Telia Finland Oyj", "Cygate AB", "Telia Company AB". On the other hand on CPS chapter 1.3.1 we clearly say: "The CA operating in compliance with this CPS is Telia CA. The legal entity responsible of Telia CA is Finnish company “Telia Finland Oyj” (BusinessID 1475607-9). Telia Finland Oyj is part of Swedish company “Telia Company AB” (BusinessID 5561034249)."

>>"Auditors have audited all related CA operations annually based on publicly disclosed Telia CP/CPS."
>"all related CA operations" is not sufficient: as noted earlier, its not clear which legal entity is the CA - the references I provided were on behalf of Telia Company AB, however applicant of this request is Telia Finland Oyj - from CA operations point of view these should be two different (independent) entities (no matter who owns what).

The new root has O value "Telia Finland Oyj" meaning that it is the legal entity responsible of it. CPS also states it clearly like seen in my previous comment. Audit covered all relevant company parts under "Telia Company AB" including "Telia Finland Oyj". I still can't understand why this fact is hard to understand.

>Besides, we don't know which  [parts of CPS] constitute the CP. If you disclose this clearly, then we'll see what criteria  auditors have  checked.

There are no requirements to specifically separate CP and CPS texts. Auditors used our combined CP/CPS in their audit like stated in audit reports. So they have audited both CP and CPS. Audit report is stating also which CP/CPS version was used.


>>"Audit scope in audit reports has been legal entity "Telia Company AB (Telia)" that is the main company. This audit scope covers both mentioned affiliate legal entities practically participating into Telia CA processes."
>But we need audit reports issued to Telia Finland Oyj, which should be the only "main company". We don't care who owns Telia Finland Oyj unless the CA shares its operational resources with third parties (including owners). In all other cases, let's forget about Telia Company AB. :)

Audit report based on Telia CP/CPS was using wording "Telia Company AB's ... CA operations in Finland and Sweden" in case when CP/CPS is stating that legal entity responsible is "Telia Finland Oyj". This should make it clear to everybody that "Telia Finland Oyj" was audited.

>>"We can ask auditors to add all three company names in the future audit reports if it makes audit results clearer."
>I'm afraid this is misunderstanding - the CA under this request should be a clearly disclosed legal entity (ownership is out of scope here). If the CA operations rely on other party's (e.g. owner's, affiliate's etc.) material or human resources, you need to disclose those shared resources and have auditors do appropriate check ups. If this information already exist, please give us  specific references.

This is just semantic nonsense. In my previous comments I made it clear above that the responsible legal entity "Telia Finland Oyj" (and also Telia CA parts in Sweden) have been audited. We can ask auditors to write this more closely into the next reports if more detailed description is necessary.


>>"I think the used audit criteria and locations (Finland and Sweden) are clearly stated in the audit reports."
>OK, if you think so, just indicate specific audit report pages.

In both these links (=our audit reports)...
https://support.trust.telia.com/download/CA/Telia-2020-2021-WebTrust-Auditor-Report-WTBR-20210628.pdf
https://support.trust.telia.com/download/CA/Telia-2020-2021-WebTrust-Auditor-Report-WTCA-20210628.pdf
... on the first KPMG page in the first paragraph KPMG auditor has written this text: "Telia Company AB's ... CA operations in Finland and Sweden". Then later on the same page they state which Webtrust criteria was used. I can't understand how anybody may miss seeing company, locations or criteria that was used. To understand that legal entity behind Telia CA is "Telia Finland Oyj" and that it is affiliate to "Telia Company AB" you have to read also CP/CPS 1.3.1.

Ryan Sleevi

unread,
Jan 4, 2022, 12:36:33 PM1/4/22
to Moudrick Dadashov, Ryan Sleevi, md, dev-secur...@mozilla.org, pekka.la...@teliacompany.com
On Tue, Jan 4, 2022 at 9:46 AM Moudrick Dadashov <m.m.da...@gmail.com> wrote:
Thanks, Ryan

I'm afraid we are taking wrong direction. :)

As I responded to Pekka today, the email you are commenting below is my answer to your questions about my comments re: eIDAS & GDPR chaos. If you are still interested, we can continue this discussion separately.  

To keep the root inclusion process in order, I'd suggest to reply to my last email today.

Hi Moudrick,

Thanks for attempting to clarify. However, I'm still struggling here to understand the substance of your messages. Right now, they feel very incoherent, and I want to make sure I (and others watching this thread) are not misunderstanding which points you believe are on-topic and which are not.

You originally suggested this discussion was relevant, when you wrote:
If approved, this request will create a precedent of ”do like Telia” - a practice that is widely used by Telia Company AB and its affiliates in the trust services markets under eIDAS. That’s how the recent eIDAS & GDPR misimplementation chaos started.

Your latest reply makes it seem like "the recent eIDAS & GDPR misimplementation chaos" is unrelated to this inclusion. However, I'm having trouble understanding that, since in the above message, you reference "widely used by Telia Company AB and its affiliates", and in your explanation of the chaos, you stated:

 instance means a data object that Telia's affiliates - SK ID Solutions (formerly AS Sertifitseerimeskeskus)  together with its RA - Omnitel (legal name - AB Telia Lietuva) have been issuing to the public as "qualified certificate"

and 
Correct. Telia Company AB is the driving force of an ”organized group”, where


So the discussion about eIDAS and GDPR chaos is something that you introduced as directly factoring in to considering, so I'm not sure I understand why the change in direction. If it's not relevant to the discussion of Telia, that's totally fine - but I want to make sure that's explicitly what you're stating, because you introduced it as relevant for consideration. 

Moudrick Dadashov

unread,
Jan 4, 2022, 1:50:35 PM1/4/22
to ry...@sleevi.com, md, dev-secur...@mozilla.org, pekka.la...@teliacompany.com
Thanks, Ryan

Indeed, its really quite complicated. 

I agree with Pekka in a sense that eIDAS & GDPR chaos is not  directly related to this request, however this CA  is quite similar to Telia Company AB's eIDAS business.

See in-line.

Ryan, I'm afraid of creating disorder in this discussion - I've comments ***directly*** related to this request (with references to CA's documentation), I also have comments about eIDAS & GDPR chaos created by Telia Company AB (BTW similar to this CA, Telia Company AB has no  PKI participant role (disclosed obligations) in SK ID Solutions' operations).

This practice takes its roots  from Telia Company AB's telco/ISP business, where they  have operational access/control over its  national affiliate's business. This means nobody will be able to investigate incidents caused directly by Telia Company AB (as it happened some years ago when prosecuters discovered a spying system collecting terabytes of phone call data -  this equipment was installed by "Telia people").

Again, I've no preference where to discuss this - I can respond to your previous email or you can forward it as a new message. Makes sense?

Thanks,
M.D.

Moudrick M. Dadashov

unread,
Jan 5, 2022, 2:00:36 AM1/5/22
to pekka.la...@teliacompany.com, dev-secur...@mozilla.org, m...@ssc.lt, Ryan Sleevi
Thanks, Pekka

Disclosing shared CA resources

I’m looking for the CA's human/material resources that are shared with third parties (irrelevant to ownership), in your response I see only the names of three companies.


The audit report

You explained that "Audit covered all relevant company parts under "Telia Company AB" including "Telia Finland Oyj". I still can't understand why this fact is hard to understand.", the problem here is that we need a single legal entity as the CA cooperates with other PKI participants - these roles must be disclosed clearly (no matter who owns what).

If Telia Finland Oyj is the CA, then all others, including Telia Company AB, should be PKI participants. You need to disclose this. In the meantime the audit report states:

"Telia makes use of external registration authorities for subscriber registration activities, as disclosed in Telia's business practices. Our procedures did not extend to the controls excercised by these external registration authorities."

So, we have two different audit scenarious here:

a) as the audit report is issued to the CA known as Telia Company AB, then the other PKI participants  - Telia Finland Oyj and Cygate AB need to be audited according to their roles.

b) in case if Telia Finland Oyj is audited as the CA, then the other two PKI participants - Telia Company AB and Cygate AB need to be audited according to their roles.

Again, this has nothing to do with ownership relationship.

Separation of CP and CPS provisions

You explain that "There are no requirements to specifically separate CP and CPS texts.", according to RFC content of these two documents should be different. I’m ok with the combined document CP/CPS (but not content!) - I can’t see which part of combined document should be considered CP. At least section/page numbers could help.

Audit scope

Sorry, I cant accept your arguments, see The audit report above.

********************


To sum-up, obviousely we are in a loop, I don’t see any reason to change my opinion (see 2021-12-29 email).

Ryan Sleevi

unread,
Jan 5, 2022, 3:57:34 AM1/5/22
to Moudrick M. Dadashov, Ryan Sleevi, dev-secur...@mozilla.org, m...@ssc.lt, pekka.la...@teliacompany.com
In-line below

On Wed, Jan 5, 2022 at 2:00 AM Moudrick M. Dadashov <m.m.da...@gmail.com> wrote:

The audit report

You explained that "Audit covered all relevant company parts under "Telia Company AB" including "Telia Finland Oyj". I still can't understand why this fact is hard to understand.", the problem here is that we need a single legal entity as the CA cooperates with other PKI participants - these roles must be disclosed clearly (no matter who owns what).

If Telia Finland Oyj is the CA, then all others, including Telia Company AB, should be PKI participants. You need to disclose this. In the meantime the audit report states:

"Telia makes use of external registration authorities for subscriber registration activities, as disclosed in Telia's business practices. Our procedures did not extend to the controls excercised by these external registration authorities."

So, we have two different audit scenarious here:

a) as the audit report is issued to the CA known as Telia Company AB, then the other PKI participants  - Telia Finland Oyj and Cygate AB need to be audited according to their roles.

b) in case if Telia Finland Oyj is audited as the CA, then the other two PKI participants - Telia Company AB and Cygate AB need to be audited according to their roles.

Again, this has nothing to do with ownership relationship.

If I understand correctly, you are trying to highlight the requirements of Section 8.4 of the Baseline Requirements, namely:

For Delegated Third Parties which are not Enterprise RAs, then the CA SHALL obtain an audit report, issued under the auditing standards that underlie the accepted audit

schemes found in Section 8.4, that provides an opinion whether the Delegated Third Party’s performance complies with either the Delegated Third Party’s practice statement or the CA’s Certificate Policy and/or Certification Practice Statement. If the opinion is that the Delegated Third Party does not comply, then the CA SHALL not allow the Delegated Third Party to continue performing delegated functions.


Is that correct?



Audit scope

Sorry, I cant accept your arguments, see The audit report above.

If my above understanding is correct, then I’m not fully sure your argument here is correct. It’s certainly true that the RAs, which are DTPs, need to be audited, but that doesn’t necessarily propagate to the scope of the parent.

There’s been quite a bit of past discussion of this in the CA/Browser Forum, particularly during the WebTrust and ETSI updates. This has included discussions about of the expectations for who needs audits when performing particular functions (e.g. the local lawyer in South America who gets copies of documents from the courthouse, verifies them, and uploads them from their home machine was one such point of discussion). More recently, they’ve included discussions about the need for greater transparency, given ETSI ESI representatives have shared they’re pursuing paths that reduce transparency and accountability.

I think your point about transparency, and the need for it, when involving DTPs is apt. However, that doesn’t require tackling that by scope of the CA’s audits, which WebTrust representatives has highlighted is problematic (generally in the exact same reasons ETSI sees it advantageous), it allows simply for the DTP to be audited.

Pekka,

Can you share the audits for these two DTPs? I believe that may address part of the concern Moudrick is raising.

Peter Bowen

unread,
Jan 5, 2022, 4:49:20 AM1/5/22
to Moudrick M. Dadashov, pekka.la...@teliacompany.com, dev-secur...@mozilla.org, m...@ssc.lt, Ryan Sleevi
Moudrick,

Thanks for clearly breaking down your concerns. Based on this, and
the other messages in this thread, I don't think that some of these
are issues under the Mozilla policy. Please see my comments below.
Mozilla has never required that all legal entities be disclosed or
receive separate WebTrust audits when the CA operations are under
common management and governance. Many of the WebTrust audit reports
implicitly cover multiple legal entities simply by indicating
operations in multiple countries. A few WebTrust audit reports that I
checked including DigiCert, Sectigo, Google, and GlobalSign, all
indicate operations in more than one country. As most countries
require that people who work in that country be employed by a legal
entity in that country, I fully expect that all these audit reports
cover multiple legal entities.

I do not believe that what Telia is presenting is materially different
from what other CAs present. If Mozilla wants to have all the legal
entities involved listed in the audit report, that is something that
should be included the Mozilla policy; this would need to be carefully
considered, as it does not only impact multi-country CAs, but also CAs
that lease data center space, contract other companies to provide
physical security, or perform other actions covered under the audit.

> Separation of CP and CPS provisions
>
> You explain that "There are no requirements to specifically separate CP and CPS texts.", according to RFC content of these two documents should be different. I’m ok with the combined document CP/CPS (but not content!) - I can’t see which part of combined document should be considered CP. At least section/page numbers could help.

Mozilla does not require that a CP exist at all. It is fully
acceptable to only have a CPS - that is a single document that lays
out the practices of the CA.

> Audit scope
>
> Sorry, I cant accept your arguments, see The audit report above.
>
> ********************
>
>
> To sum-up, obviousely we are in a loop, I don’t see any reason to change my opinion (see 2021-12-29 email).
>
> Thanks,
> M.D.

From my perspective, the issues you raise are not issues under current
Mozilla policy.

Thanks,
Peter
(my personal view and does not necessarily reflect the views of anyone else)

Moudrick Dadashov

unread,
Jan 5, 2022, 7:28:53 AM1/5/22
to Peter Bowen, pekka.la...@teliacompany.com, dev-secur...@mozilla.org, m...@ssc.lt, Ryan Sleevi
Thanks, Peter

"Mozilla has never required that all legal entities be disclosed or
receive separate WebTrust audits when the CA operations are under common management and governance."

I'm afraid this is a different case - BTW so far nobody requested separate audits.

The applicant - Telia Finland Oyj is a legal entity (with its own management) and the fact that its owned by another company (Telia Company AB) doesn't create any privileges for the latter, meaning that if the owner is a PKI participant, its roles, obligations need to be clearly disclosed. According to the audit report I quoted earlier, Telia Company AB is the CA.

"I do not believe that what Telia is presenting is materially different from what other CAs present."

The CA's you are refering to are legal entities doing CA business, this is not the case here - Telia Company AB and its affiliates are telcos/ISPs and from business point of view their income from the CA operations  relative to their business is near 0%. So from the root program  point of view this CA is unique.

"Mozilla does not require that a CP exist at all.  It is fully
acceptable to only have a CPS - that is a single document that lays out the practices of the CA
."

I'm sure you know better what Mozilla require, but I'm relying on the publicly available policy, see section 3.3 here 

Thanks,
M.D.

pekka.la...@teliacompany.com

unread,
Jan 5, 2022, 9:25:35 AM1/5/22
to dev-secur...@mozilla.org, m.m.da...@gmail.com, pekka.la...@teliacompany.com, dev-secur...@mozilla.org, m...@ssc.lt, Ryan Sleevi, pzb...@gmail.com
Telia CA is legally operated by "Telia Finland Oyj" so that there is common management within several Telia units. For Telia CA the partially common management consists of three fully Telia owned affiliated companies: "Telia Company AB", "Telia Finland Oyj" and "Cygate AB". In this case like Peter said it is normal way to create only one audit report that covers multiple legal entities simply by indicating operations in multiple countries. This is what we have provided.

I think that Moudrick is using term "PKI participant" like it would mean "Delegated Third Party". But I think that is not the right term for Telia CA. The best definitions I found for "third party" and "affiliate" are from BR and it is clear that Telia CA case is the latter (not delegating functions):

Delegated Third Party: A natural person or Legal Entity that is not the CA but is
authorized by the CA, and whose activities are not within the scope of the appropriate
CA audits, to assist in the Certificate Management Process by performing or fulfilling
one or more of the CA requirements found herein.

Affiliate: A corporation, partnership, joint venture or other entity controlling,
controlled by, or under common control with another entity, or an agency,
department, political subdivision, or any entity operating under the direct control of a
Government Entity.

All three listed Telia affiliates were included into Telia CA audit scope. There are no non-audited Telia CA parts for TLS. In our Server CP/CPS 1.3.2 we say that "All RA functions in this CPS are performed internally by Telia. Telia will not delegate domain validation to be performed by a third-party". On Telia client certificate process we define in our Client CP/CPS how Enterprise RA may be used and that Telia Class 3 client certificates (which are outside of Mozilla context) are using external RA. I think that Enterprise RA is a normal concept on client certificates. I can't see any problems in this either

I hope that Mozilla now concludes if there is something that is against Mozilla policies or not. I haven't yet found any relevant issues on this discussion. I'm ready to improve our CPS or suggest new audit report formulation next time if I get instructions how. Our new root should be accepted soon so that we can replace the old one that has technical issues (read audit report).

Moudrick Dadashov

unread,
Jan 5, 2022, 9:52:42 AM1/5/22
to pekka.la...@teliacompany.com, dev-secur...@mozilla.org, m...@ssc.lt, Ryan Sleevi, pzb...@gmail.com
Thanks, Pekka

Just in case, PKI participant is defined in RFC 3647 and should be disclosed in CA’s CPS, but don’t worry, we are having another do a-la Telia "industry standard".

Thanks,
M.D.

Moudrick M. Dadashov

unread,
Jan 6, 2022, 1:18:10 AM1/6/22
to ry...@sleevi.com, dev-secur...@mozilla.org, m...@ssc.lt, pekka.la...@teliacompany.com
Thanks, Ryan

The audit report


You asked if my comment was about Delegated Third Parties - sorry, no, I had in mind the CA [1] and its RAs [] as defined in BRs.

As I quoted earlier, according to audit report the CA is a legal entity in Sweden - Telia Company AB, other participants are also separate legal entities Telia Finland Oyj and Cygate AB.

Unfortinately this discussion about legal entities vs service providers has gone too far - in the EU service providers can chose different foreign establishment forms ranging from directly managed branches, offices etc. to country specific forms of legal entities. This is important from business operation, data protection etc. point of view - for more info please see Services directive 2006/123/EC.

Audit scope

"If my above understanding is correct, then I’m not fully sure your argument here is correct. It’s certainly true that the RAs, which are DTPs, need to be audited, but that doesn’t necessarily propagate to the scope of the parent."

My comment was about Pekka's argument, which is quite typical to Telia Company AB and its affiliates, that their corporate ownership relationship is directly apllicable to the CA operations, I believe this is fundamentally wrong.

**************


You also asked if Pekka could share the audits for these two DTPs? I believe that may address part of the concern Moudrick is raising.

The CA has a single audit report and I’m OK with that, but, as I quoted earlier, the audit report says:

"Telia makes use of external registration authorities for subscriber registration activities, as disclosed in Telia's business practices. Our procedures did not extend to the controls excercised by these external registration authorities."

Thanks,
M.D.

Sent from my Galaxy


[]

[]

-------- Original message --------
From: Ryan Sleevi <ry...@sleevi.com>
Date: 1/5/22 10:57 (GMT+02:00)
To: "Moudrick M. Dadashov" <m.m.da...@gmail.com>
Subject: Re: FW: RE: Public Discussion: Inclusion of Telia Root CA v2

Ryan Sleevi

unread,
Jan 6, 2022, 11:00:39 AM1/6/22
to Moudrick M. Dadashov, Ryan Sleevi, dev-secur...@mozilla.org, m...@ssc.lt, pekka.la...@teliacompany.com
On Thu, Jan 6, 2022 at 1:18 AM Moudrick M. Dadashov <m.m.da...@gmail.com> wrote:
You asked if my comment was about Delegated Third Parties - sorry, no, I had in mind the CA [1] and its RAs [] as defined in BRs.

I'm not sure I understand this. An RA is a DTP.
 
Audit scope

"If my above understanding is correct, then I’m not fully sure your argument here is correct. It’s certainly true that the RAs, which are DTPs, need to be audited, but that doesn’t necessarily propagate to the scope of the parent."

My comment was about Pekka's argument, which is quite typical to Telia Company AB and its affiliates, that their corporate ownership relationship is directly apllicable to the CA operations, I believe this is fundamentally wrong.

I'm sorry, I'm still not sure I think I understand the substance of your argument here, and it does seem like you're ascribing a particular malice to Telia that appears to be unsubstantiated, at least at present.
 
The CA has a single audit report and I’m OK with that, but, as I quoted earlier, the audit report says:

"Telia makes use of external registration authorities for subscriber registration activities, as disclosed in Telia's business practices. Our procedures did not extend to the controls excercised by these external registration authorities."

Correct, this part is difficult to square with Pekka's remarks that they were all part of the same audit scope, as the report does not appear to substantiate this. That is, the WebTrust Illustrative Guidance provides examples on how to disclose if no external RAs are involved, and that this seems to highlight a disconnect that bears some clarification, at the minimum.

Peter Bowen

unread,
Jan 6, 2022, 1:56:32 PM1/6/22
to Ryan Sleevi, Moudrick M. Dadashov, dev-secur...@mozilla.org, m...@ssc.lt, pekka.la...@teliacompany.com
On Thu, Jan 6, 2022 at 8:00 AM Ryan Sleevi <ry...@sleevi.com> wrote:
>
>
>
> On Thu, Jan 6, 2022 at 1:18 AM Moudrick M. Dadashov <m.m.da...@gmail.com> wrote:
>>
>> You asked if my comment was about Delegated Third Parties - sorry, no, I had in mind the CA [1] and its RAs [] as defined in BRs.
>
>
> I'm not sure I understand this. An RA is a DTP.

I think this is where some of the confusion is coming from. Not all
RAs are DTPs. In one way of describing PKI structure (or
participants), every certificate request first goes to a RA. The RA
validates the information, for example validates control of the
requested domains, then requests the CA to issue the certificate. The
RA and CA functions may be operated by the same entity, have the same
governance, and be part of the same audit. In this case the RA is not
a DTP, rather it is just a function of what in Mozilla terminology is
the "CA".

From my reading of this thread, there are two kinds of RAs for Telia
CA. The first are RA functions operated by the Telia group. These RA
functions are covered under the WebTrust audit. The people operating
the RA functions are employed by various companies, but ultimately
Telia Company AB is stating that they have governance and management
oversight of these RA functions. The second are Enterprise RAs which
are only used for client certificates. From earlier in the thread,
"Telia Class 3 client certificates (which are outside of Mozilla
context) are using external RA."

I'm hoping Telia reps can confirm that my understanding is correct.

>> Audit scope
>>
>> "If my above understanding is correct, then I’m not fully sure your argument here is correct. It’s certainly true that the RAs, which are DTPs, need to be audited, but that doesn’t necessarily propagate to the scope of the parent."
>>
>> My comment was about Pekka's argument, which is quite typical to Telia Company AB and its affiliates, that their corporate ownership relationship is directly apllicable to the CA operations, I believe this is fundamentally wrong.
>
>
> I'm sorry, I'm still not sure I think I understand the substance of your argument here, and it does seem like you're ascribing a particular malice to Telia that appears to be unsubstantiated, at least at present.
>
>>
>> The CA has a single audit report and I’m OK with that, but, as I quoted earlier, the audit report says:
>>
>> "Telia makes use of external registration authorities for subscriber registration activities, as disclosed in Telia's business practices. Our procedures did not extend to the controls excercised by these external registration authorities."
>
>
> Correct, this part is difficult to square with Pekka's remarks that they were all part of the same audit scope, as the report does not appear to substantiate this. That is, the WebTrust Illustrative Guidance provides examples on how to disclose if no external RAs are involved, and that this seems to highlight a disconnect that bears some clarification, at the minimum.

I agree. It would be helpful to clarify what functions any external
RA does for any certificate that falls within the Mozilla policy
(which includes at least server and e-mail end-entity certificates).

Thanks,
Peter

md

unread,
Jan 7, 2022, 2:29:52 AM1/7/22
to ry...@sleevi.com, Moudrick M. Dadashov, dev-secur...@mozilla.org, pekka.la...@teliacompany.com
Thanks, Ryan
 
Is RA a DTP? According to BRs, RA is a PKI participant (1.3.2) which may delegate some of its functions to third parties:

With the exception of Section 3.2.2.4 (Validation of Domain Authorization or Control) and Section 3.2.2.5 (Authentication for an IP Address), the CA MAY delegate the performance of all, or any part, of Section 3.2 (Initial identity validation) requirements to a Delegated Third Party, provided that the process as a whole fulfills all of the requirements of Section 3.2.

Before the CA authorizes a DTP to perform a delegated function, the CA SHALL contractually require the DTP to:

1. Meet the qualification requirements of Section 5.3.1 (Qualifications, experience, and clearance requirements) , when applicable to the delegated function;
2. Retain documentation in accordance with Section 5.5.2 (Retention period for archive);
3. Abide by the other provisions of these Requirements that are applicable to the delegated function; and
4. Comply with
a. the CA’s Certificate Policy/Certification Practice Statement or
b. the Delegated Third Party’s practice statement that the CA has verified complies with these Requirements.

BTW, section 5 is MANAGEMENT, OPERATIONAL, AND PHYSICAL CONTROLS,  section 5.3 defines Personnel controls where 5.3.1 require: "Prior to the engagement of any person in the Certificate Management Process, whether as an employee, agent, or an independent contractor of the CA, the CA SHALL verify the identity and trustworthiness of such person.".


As Pekka explained DTP , "is not the right term for Telia CA. The best definitions I found for "third party" and "affiliate" are from BR and it is clear that Telia CA case is the latter (not delegating functions)". 

I agree with Pekka, all we need is these third parties and affiliates be clearly disclosed with their PKI participant (BR section 1.3.) and/or personnel roles, if any.

Thanks,
M.D.



Sent from my Galaxy


-------- Original message --------
From: Ryan Sleevi <ry...@sleevi.com>
Date: 1/6/22 18:01 (GMT+02:00)
To: "Moudrick M. Dadashov" <m.m.da...@gmail.com>
Subject: Re: FW: RE: Public Discussion: Inclusion of Telia Root CA v2

--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.

pekka.la...@teliacompany.com

unread,
Jan 10, 2022, 2:01:41 AM1/10/22
to dev-secur...@mozilla.org, pzb...@gmail.com, m.m.da...@gmail.com, dev-secur...@mozilla.org, m...@ssc.lt, pekka.la...@teliacompany.com, Ryan Sleevi
I confirm Peter's comment and evaluation to be correct. Specifically that Telia hasn't used any third party RAs except in the mentioned client certificate cases. And that all other RA functions were operated internally by the Telia group so that all internal RA functions were covered under the WebTrust audit. In Enterprise RA cases it was technically constrained that each could only enroll SMIME certificates under pre-validated domains belonging to them. External RA case was outside of Mozilla context based on EKU values on subCA (and end-entity) level.

Moudrick M. Dadashov

unread,
Jan 10, 2022, 10:08:44 AM1/10/22
to pekka.la...@teliacompany.com, dev-secur...@mozilla.org, pzb...@gmail.com, m.m.da...@gmail.com, Ryan Sleevi
Hi Pekka,

Before your claim can be finalized, we need clarification of the terms in your statement:


"Specifically that Telia hasn't used any third party RAs except in the mentioned client certificate cases".

You explained earlier that Telia is a trademark that Telia Finland Oyj is authorized to use in Finland. 

In the Telia's Management Assertion Telia Company AB uses the term Telia as a self short name. The same short name is used in the audit reports.

So, based on the official documents, we don't know which legal entity represent the CA - Telia Company AB (Sweden) or Telia Finland Oyj (Finland). Once we identify the CA, it should be easier for you to disclose/identify other PKI participants, if any.

"And that all other RA functions were operated internally by the Telia group so that all internal RA functions were covered under the WebTrust audit."

Here you use the terms "internally" and "group" that have no meaning  in the context of the CA operations - if you think they are defined in existing standards and Mozilla policy, just refer us to the  appropriate sources.

Once again, as from the CA operations' (CP/CPS) point of view Telia Company AB and Telia Finland Oyj are two different legal entities, you need to disclose their PKI participant roles as required by all applicable standards, policies I quoted earlier.


Thanks,
M.D.



Sent from my Galaxy


-------- Original message --------
Date: 1/10/22 09:02 (GMT+02:00)
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.

Peter Bowen

unread,
Jan 10, 2022, 12:36:24 PM1/10/22
to Moudrick M. Dadashov, pekka.la...@teliacompany.com, dev-secur...@mozilla.org, m.m.da...@gmail.com, Ryan Sleevi
On Mon, Jan 10, 2022 at 7:08 AM 'Moudrick M. Dadashov' via
dev-secur...@mozilla.org <dev-secur...@mozilla.org>
wrote:
>
> Hi Pekka,
>
> Before your claim can be finalized, we need clarification of the terms in your statement:
>
>
> "Specifically that Telia hasn't used any third party RAs except in the mentioned client certificate cases".
>
> You explained earlier that Telia is a trademark that Telia Finland Oyj is authorized to use in Finland.
>
> In the Telia's Management Assertion Telia Company AB uses the term Telia as a self short name. The same short name is used in the audit reports.
>
> So, based on the official documents, we don't know which legal entity represent the CA - Telia Company AB (Sweden) or Telia Finland Oyj (Finland). Once we identify the CA, it should be easier for you to disclose/identify other PKI participants, if any.
>
> "And that all other RA functions were operated internally by the Telia group so that all internal RA functions were covered under the WebTrust audit."
>
> Here you use the terms "internally" and "group" that have no meaning in the context of the CA operations - if you think they are defined in existing standards and Mozilla policy, just refer us to the appropriate sources.
>
> Once again, as from the CA operations' (CP/CPS) point of view Telia Company AB and Telia Finland Oyj are two different legal entities, you need to disclose their PKI participant roles as required by all applicable standards, policies I quoted earlier.

Moudrick,

I'm afraid I'm somewhat confused. Mozilla Policy calls out two places
where the legal entity has to be disclosed: "ownership or control of
the CA’s certificate(s)" and "ownership or control of the CA’s
operations". I'm going to assume that the first really should be CA's
private keys, but that is something for a policy discussion.

The CPS says "The CA operating in compliance with this CPS is Telia
CA. The legal entity responsible of Telia CA is Finnish company “Telia
Finland Oyj” (BusinessID 1475607-9). Telia Finland Oyj is part of
Swedish company “Telia Company AB” (BusinessID 5561034249)."

From this thread, it seems clear to me that Telia Finland Oyj has
ownership of the CA certificate and keys. This has been stated
multiple times in the thread.

It also seems clear to me that Telia Company AB has overall control of
the CA operations, as they are the responsible party as documented in
the WebTrust management assertion and addressed in the auditor's
opinion.

I am unaware of any requirement in the Mozilla policy (directly or via
inclusion by reference) that requires a CA to disclose the employer of
all people they contract to assist in operations of the CA. This
applies regardless of whether the employer(s) are Affiliates of the
legal entity operating the CA, Affiliates of the legal entity owning
the private keys, or independent third parties. The thing that
matters is that the entity operating the CA takes responsibility for
and has control over the actions undertaken by the people operating
the CA.

As an example, as I understand it, if Afla, Inc. owns a private key,
they can contract Bravo Ltd. to operate the CA (including RA
functions). Bravo Ltd would then be listed as the responsible party
in the WebTrust audit report. Bravo can contract Charlie Pty Ltd,
Delta GmbH, and Echo BV to assist in the operations of the CA. This
could include providing physical security for the private keys,
providing ICT administration, applicant review services, or other
work. As long as Bravo is has oversight and control of the
operations, it is not necessary to list Charlie, Delta, or Echo in the
CPS nor in the WebTrust audit report.

I do realize that other regulations and requirements may require
disclosure of some or all of Charlie, Delta, or Echo. For example,
some CAs disclose information sub-processors for the purpose of
complying with GDPR; see
https://www.globalsign.com/en/repository/GlobalSign-Subprocessors.pdf
as an example. This is independent of the Mozilla requirements, to
the best of my knowledge.

md

unread,
Jan 10, 2022, 2:05:50 PM1/10/22
to Peter Bowen, pekka.la...@teliacompany.com, dev-secur...@mozilla.org, m.m.da...@gmail.com, Ryan Sleevi
Thanks, Peter

Below I’m relying on the Mozilla policy (MP) published here:

You say you are confused and looks like because of following:

1.  Telia Finland Oyj is part of Swedish company “Telia Company AB” (BusinessID 5561034249).

Please note Telia Finland Oyj is a legal entity with its own BusinessID, material/human resources, management and location (see MP  section 3.1.4 (13)).

As "CAs SHOULD NOT assume that trust is transferable" (MP section 8), using the MP terminology the relationship between Telia Company AB and Telia Finland Oyj is "legal ownership". Feel free to rely on any privileges the policy assumes for this kind of ownership parties.

The reason of confuse is mixing two different terms "legal omwnership" and "CA operations" (as in MP section 8.2).

2. "It also seems clear to me that Telia Company AB has overall control of
the CA operations, as they are the responsible party as documented in
the WebTrust management assertion and addressed in the auditor's
opinion
."

See, this needs to be clear not only to highly skilled professional like yourself, but also to relying parties. I’ve no problem with Telia Company AB or Telia Finland Oyj being a CA, however I have big problem for both of them pretending to be PKI participant with undisclosed roles - in this context ”has overall control” is misunderstanding, again, see MP section 8.2.

************


I’m afraid your good example below is not applicable to this case - those companies, If I understood correctly, have contractual relationship, whereas in our case all we have is "is part of" which means the legal owner (Telia Company AB) controls shares of another legal entity (Telia Finland Oyj). This has nothing to do with CA operations.

Thanks,
M.D.


-------- Original message --------
From: Peter Bowen <pzb...@gmail.com>
Date: 1/10/22 19:37 (GMT+02:00)
To: "Moudrick M. Dadashov" <m...@ssc.lt>
Subject: Re: FW: RE: Public Discussion: Inclusion of Telia Root CA v2

Peter Bowen

unread,
Jan 10, 2022, 3:26:07 PM1/10/22
to md, pekka.la...@teliacompany.com, dev-secur...@mozilla.org, m.m.da...@gmail.com, Ryan Sleevi
On Mon, Jan 10, 2022 at 11:05 AM md <m...@ssc.lt> wrote:
>
> Thanks, Peter
>
> Below I’m relying on the Mozilla policy (MP) published here:
> https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/
>
> You say you are confused and looks like because of following:
>
> 1. Telia Finland Oyj is part of Swedish company “Telia Company AB” (BusinessID 5561034249).
>
> Please note Telia Finland Oyj is a legal entity with its own BusinessID, material/human resources, management and location (see MP section 3.1.4 (13)).
>
> As "CAs SHOULD NOT assume that trust is transferable" (MP section 8), using the MP terminology the relationship between Telia Company AB and Telia Finland Oyj is "legal ownership". Feel free to rely on any privileges the policy assumes for this kind of ownership parties.
>
> The reason of confuse is mixing two different terms "legal omwnership" and "CA operations" (as in MP section 8.2).
>
> 2. "It also seems clear to me that Telia Company AB has overall control of
> the CA operations, as they are the responsible party as documented in
> the WebTrust management assertion and addressed in the auditor's
> opinion."
>
> See, this needs to be clear not only to highly skilled professional like yourself, but also to relying parties. I’ve no problem with Telia Company AB or Telia Finland Oyj being a CA, however I have big problem for both of them pretending to be PKI participant with undisclosed roles - in this context ”has overall control” is misunderstanding, again, see MP section 8.2.
>
> ************
>
>
> I’m afraid your good example below is not applicable to this case - those companies, If I understood correctly, have contractual relationship, whereas in our case all we have is "is part of" which means the legal owner (Telia Company AB) controls shares of another legal entity (Telia Finland Oyj). This has nothing to do with CA operations.

From the Telia CA audit reports: "Telia Company AB (Telia) operates
the Certificate Authority (CA) services as listed in Appendix A" (the
first sentence of
https://support.trust.telia.com/download/CA/Telia-2020-2021-WebTrust-Auditor-Report-WTCA-20210628.pdf).
From that same file, KPMG conducted their procedures as per ISAE 3000,
which requires KPMG to determine the "responsible party". KPMG
clearly states that it is "Telia Company AB" in their opinion letter.

Given the root certificate currently under discussion is not part of
the root program, and the ownership and control seem to be clearly
stated, I do not see an issue here.

There may be a separate concern that the operations of the
"TeliaSonera Root CA v1" CA were transferred at some point. Mozilla
policy does not require public notice of transfer - notice can be
provided to Mozilla privately. Given this, it is not possible to
identify if notice was provided.

From this discussion, it does seem that Mozilla should consider a few actions:
1) Update the policy to require disclosure of the legal entity that
owns the CA private key (instead of the CA certificate)
2) Update the policy to require disclosure in the CCADB, for each root
CA and subordinate CA, of:
* the legal entity that owns CA private key
* the legal entity that is the operator of the CA and is either the
"Responsible Party" (ISAE 3000) or employer/contractor of the
"Management and Those Charged With Governance" (AT-C 801) of the CA
3) Clarify how the community will be notified of changes, given the
policy says that "Mozilla will normally keep commercially sensitive
information confidential."

Thanks,
Peter

Moudrick M. Dadashov

unread,
Jan 10, 2022, 4:12:26 PM1/10/22
to Peter Bowen, md, pekka.la...@teliacompany.com, dev-secur...@mozilla.org, Ryan Sleevi
Thanks, Peter

Indeed, you just quoted the same parts from the documentation that I did in my 2021-12-29 email.

According to CPS two different legal entities declared to have been representing the CA just because one "is part of" another which according to Mozilla policy means "legal ownership" that has nothing to do with the CA operations.

Sorry, I’m confused that while you don’t see problems here, but at the same time proposing improvements to Mozilla policy - isn’t this "customization of rules" to the needs of a specific legal entity? While this is quite typical for Telia Company AB’s eIDAS related practices, I’m very concerned its happening here.

Thanks,
M.D.


Sent from my Galaxy


-------- Original message --------
From: Peter Bowen <pzb...@gmail.com>
Date: 1/10/22 22:26 (GMT+02:00)
To: md <m...@ssc.lt>
Subject: Re: FW: RE: Public Discussion: Inclusion of Telia Root CA v2

Peter Bowen

unread,
Jan 10, 2022, 6:03:52 PM1/10/22
to Moudrick M. Dadashov, md, pekka.la...@teliacompany.com, dev-secur...@mozilla.org, Ryan Sleevi
On Mon, Jan 10, 2022 at 1:12 PM Moudrick M. Dadashov
<m.m.da...@gmail.com> wrote:
>
> Thanks, Peter
>
> Indeed, you just quoted the same parts from the documentation that I did in my 2021-12-29 email.
>
> According to CPS two different legal entities declared to have been representing the CA just because one "is part of" another which according to Mozilla policy means "legal ownership" that has nothing to do with the CA operations.

I'm not looking whether one company is owned by another, so "is part
of" does not matter. I'm looking at the audit reports which, but the
definition of ISAE 3000, list the "responsible party". My
interpretation is that "responsible party" is equivalent to "ownership
or control of the CA’s operations" in the Mozilla policy.

As you call out, the CPS says "The legal entity responsible of Telia
CA is Finnish company “Telia Finland Oyj” (BusinessID 1475607-9)".
Based on the audit report, Telia Finland Oyj is NOT the responsible
party for the operations of the CA. Prior messages stated that Telia
Finland is the legal owner. This indicates Telia Finland has
"ownership or control of the CA’s certificate(s)".

> Sorry, I’m confused that while you don’t see problems here, but at the same time proposing improvements to Mozilla policy - isn’t this "customization of rules" to the needs of a specific legal entity?

I know from working for multiple companies that had operations in
different countries and different tax jurisdictions that it is very
common to have people employed by different legal entities who work
together as a single team. I frequently have not known which company
my colleagues legally work for - it just doesn't matter for day to day
purposes. At one point I worked for XYZ Canada Ltd, my boss worked
for ABC GmbH, his boss worked for XYZ Inc in the US. The person
working for XYZ Inc was the senior vice president and general manager
for ABC and had responsibility and control of ABC, even if he didn't
work for ABC GmbH. At another group of companies, we had people from
multiple legal entities working in the same building side by side.
The fact that I worked for Example PQR LLC and my colleague worked for
Example JKL LLC was only found if you looked at the details for
entries in the corporate directory. We both had email addresses
ending in @example.com. This seems normal and common to me.

I'm suggesting improvements in Mozilla policy because this discussion
has shown the current policy does not provide clarity as to legal
entities and because you have reasonably called out that having
clarity is beneficial to transparency. This lack of claity is not
unique to Telia; for example, the Globalsign CPS says "GlobalSign
NV/SA and affiliated entities". Given the lack of requirement of
public disclosure of the owner of the private key/certificate, I'm not
sure how many other CAs in the Mozilla program have separation between
the operator and key owner.

> While this is quite typical for Telia Company AB’s eIDAS related practices, I’m very concerned its happening here.

I have zero experience with eIDAS, so I cannot comment on
eIDAS-related practices.

Thanks,
Peter

Ryan Sleevi

unread,
Jan 10, 2022, 10:09:48 PM1/10/22
to Moudrick M. Dadashov, Peter Bowen, Ryan Sleevi, dev-secur...@mozilla.org, md, pekka.la...@teliacompany.com
On Mon, Jan 10, 2022 at 4:12 PM Moudrick M. Dadashov <m.m.da...@gmail.com> wrote:
While this is quite typical for Telia Company AB’s eIDAS related practices, I’m very concerned its happening here.

Have I missed a thread where you have substantiated this remark? When I previously asked you for details, you shared an unrelated (as far as I can tell) CA incident.

If you feel your concerns have not been heard, it would be great if you could provide more details here specifically about Telia Company AB’s eIDAS related practices. Otherwise, it may be worth considering this as inappropriate/off-topic, without further details to substantiate the relevance.

Moudrick M. Dadashov

unread,
Jan 11, 2022, 11:20:01 AM1/11/22
to Peter Bowen, md, pekka.la...@teliacompany.com, dev-secur...@mozilla.org, Ryan Sleevi
Thanks, Peter

1. "I'm not looking whether one company is owned by another, so "is part

of" does not matter.  I'm looking at the audit reports which, but the
definition of ISAE 3000, list the "responsible party".  My
interpretation is that "responsible party" is equivalent to "ownership
or control of the CA’s operations" in the Mozilla policy
."

ISAE International standard on assurance engagements - is a tool for auditors to produce one of two type of audit reports: a reasonable assurance engagement or a limited assurance engagement

The definition from ISA 3000 shows that "responsible party" and  "ownership or control of the CA's operations" in Mozilla policy are different concepts:
 
Responsible  party―The  party(ies)  responsible  for  the  underlying  subject  matter.  (Para.  A34) .

Underlying  subject  matter―The  phenomenon  that  is  measured  or  evaluated  by applying  criteria. 

2. "As you call out, the CPS says "The legal entity responsible of Telia
CA is Finnish company “Telia Finland Oyj” (BusinessID 1475607-9)".
Based on the audit report, Telia Finland Oyj is NOT the responsible
party for the operations of the CA.  Prior messages stated that Telia
Finland is the legal owner. This indicates Telia Finland has
"ownership or control of the CA’s certificate(s)
".

Again, there is no "responsible party" in Mozilla policy or underlying standards. According to RFC 3647 the applicant under this root inclusion procedure has to disclose all of its PKI participants: CAs, RAs, subscribers, relying parties and other parties.


3. "I frequently have not known which company my colleagues legally work for - it just doesn't matter for day to day purposes.", 

I fully understand you, but as we already discussed earlier, for CA’s personnel requirements see RFC 3647 section 4.5.3, anyone working for CA’s operations should contracted according to their roles in the CA's operations - also, let's not forget about the sanctions against personnel for authorised actions, unauthorized use of authority etc.

4. "I'm suggesting improvements in Mozilla policy because this discussion
has shown the current policy does not provide clarity as to legal
entities and because you have reasonably called out that having
clarity is beneficial to transparency
."

I do support your suggestion, however I’m not sure if this can be done within a specific root inclusion procedure - obviuosly this is something to decide for Mozilla.

5. "I have zero experience with eIDAS, so I cannot comment on
eIDAS-related practices.”

If you don’t mind, I’ll give you more responding to Ryan’s comment, ok?

Dimitris Zacharopoulos

unread,
Jan 14, 2022, 2:59:22 AM1/14/22
to dev-secur...@mozilla.org

Sorry for chiming in late, I was monitoring this discussion and thought of adding a comment about the completeness of audit reports.

In my understanding, when Mozilla or any other Root Program is evaluating audit reports (Point-in-Time or Period-of-Time), they must confirm that all entities/functions that should be audited, are included in the submitted audit reports.

It is acceptable to submit multiple audit reports when multiple legal entities fulfill different CA functions, but at the end of the day all functions that need to be audited must be accounted for.

If the CA is company A and they have an external RA which is company B, then one of the following is acceptable:

a) Company A presents an audit report that contains its own CA operations AND the operations of company B, which means that the auditor of company A has engaged into independently evaluating the RA operations of company B

b) Company A presents an audit report that contains its own CA operations and states that it did not evaluate operations of external RA of company B, and there is a separate external audit report of company B which independently evaluates the RA operations of company B. Together, these two audit reports prove that all audited functions have been performed and nothing is missing.

If I understand one of Moudrick's concerns (obviously he has plenty of concerns but I only focus on the audit completeness), the audit report submitted by Telia does not include an opinion on "external RAs" which means that we are missing an audit report about these external RAs. AFAIK, external RAs are not exempt and must be audited by a qualified (external) auditor. Unless I am missing something, I believe that only Enterprise RAs can exist without external audits.

Ryan, Peter, do you agree with the last comment?


Thanks,
Dimitris.


PS: I was trying to find the right message in the various existing threads to reply to but it was too many messages to process, so apologies for starting a new thread.


On 1/12/2021 5:15 μ.μ., Ben Wilson wrote:

All,

This is to announce the beginning of the public discussion phase of the Mozilla root CA inclusion process (https://wiki.mozilla.org/CA/Application_Process#Process_Overview - Steps 4 through 9) for Telia’s inclusion request for the Telia Root CA v2 (https://crt.sh/?id=1199641739).  

Mozilla is considering approving Telia’s request to add the root as a trust anchor with the websites and email trust bits as documented in Bugzilla #1664161 and CCADB Case #660.

This email begins the 3-week comment period, after which, if no concerns are raised, we will close the discussion and the request may proceed to the approval phase (Step 10).

Summary

This CA certificate for Telia Root CA v2 is valid from 29-Nov-2018 to 29-Nov-2043.

SHA2 Certificate Hash:  

242B69742FCB1E5B2ABF98898B94572187544E5B4D9911786573621F6A74B82C

Root Certificate Downloads:

https://support.trust.telia.com/repository/teliarootcav2_selfsigned.cer

https://support.trust.telia.com/repository/teliarootcav2_selfsigned.pem


CP/CPS:  Effective October 14, 2021, the current CPS for the Telia Root CA v2 may be downloaded here:   

https://cps.trust.telia.com/Telia_Server_Certificate_CPS_v4.4.pdf (v.4.4).

Repository location: https://cps.trust.telia.com/


Test Websites:

Valid - https://juolukka.cover.telia.fi:10603/

Revoked - https://juolukka.cover.telia.fi:10604/

Expired - https://juolukka.cover.telia.fi:10605/

 

BR Self Assessment (PDF) is located here:  https://support.trust.telia.com/download/CA/Telia_CA_BR_Self_Assessment.pdf

Audits:  Annual audits are performed by KPMG. The most recent audits were completed for the period ending March 31, 2021, according to WebTrust audit criteria. The standard WebTrust audit (in accordance with v.2.2.1) contained no adverse findings.  The WebTrust Baseline Requirements audit (in accordance with v.2.4.1) was qualified based on the fact that the Telia Root CA v1 certificate did not include subject:countryName. (The Telia Root CA v2 contains a subject:countryName of “FI”.)

Attachment B to the WebTrust Baseline Requirements audit report listed eight (8) Bugzilla bugs for incidents open during the 2020-2021 audit period, which are now resolved as fixed.  They were as follows:

Link to Bugzilla Bug

Matter description

https://bugzilla.mozilla.org/show_bug.cgi?id=1614311

Two CA certificates not listed in 2020 WebTrust audit report

https://bugzilla.mozilla.org/show_bug.cgi?id=1612332

Ambiguity on KeyUsage with ECC public key

https://bugzilla.mozilla.org/show_bug.cgi?id=1551372

One Telia certificate containing a stateOrProvinceName of Some-State

https://bugzilla.mozilla.org/show_bug.cgi?id=1649683

Two Telias pre-2012 rootCA certificates arent fully compliant with Baseline Requirements

https://bugzilla.mozilla.org/show_bug.cgi?id=1637854

AIA CA Issuer field pointing to PEM-encoded certificate

https://bugzilla.mozilla.org/show_bug.cgi?id=1674536

Certificates with RSA keys where modulus is not divisible by 8

https://bugzilla.mozilla.org/show_bug.cgi?id=1565270

Subject field automatic check in CA system

https://bugzilla.mozilla.org/show_bug.cgi?id=1689589

Disallowed curve (P-521) in leaf certificate

 

Recent, open bugs/incidents are the following:

Link to Bugzilla Bug

Matter description

https://bugzilla.mozilla.org/show_bug.cgi?id=1738207

Issued three precertificates with non-NIST EC curve

https://bugzilla.mozilla.org/show_bug.cgi?id=1736020

Invalid email contact address was used for few domains

https://bugzilla.mozilla.org/show_bug.cgi?id=1737808

Delayed revocation of 5 EE certificates in connection to id=1736020

 

I have no further questions or concerns about this inclusion request, however I urge anyone with concerns or questions to raise them on this list by replying directly in this discussion thread. Likewise, a representative of Telia must promptly respond directly in the discussion thread to all questions that are posted.

Again, this email begins a three-week public discussion period, which I’m scheduling to close on December 22, 2021.

Sincerely yours,

Ben Wilson

Mozilla Root Program

 

--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.

pekka.la...@teliacompany.com

unread,
Jan 14, 2022, 4:22:45 AM1/14/22
to dev-secur...@mozilla.org, ji...@it.auth.gr
Hi Dimitris,

I wonder why Telia should provide audit report to Mozilla about the only external RA Telia CA is using when this external RA is using subCA that is out of scope of Mozilla based on its EKU values. This external RA is producing only client certificates for signature purposes.

Both provided audit reports WTCA and WTBR state that they cover Telia CA operations in Finland and Sweden and only WTCA report has remark about External RA in this format (WTBR report doesn't have this):

"Telia makes use of external registration authorities for subscriber registration activities as disclosed in Telia's business practices. Our procedures did not extend to the controls excercised by these external registration authorities."

This text above refers to Telia Client CPS that has disclosed that the only case in addition to Enterprise RA when Telia is using External RA is related to Telia Class 3 client certificates and all SMIME related validation is done only by Telia CA itself. E.g. Client CPS 1.3.2: "Telia CA employs two RAs: Internal RA and External RA. Telia will not delegate domain validation to be performed by a third-party. The CA itself verifies email domain ownership or verifies that End-entity controls the email account." Chapter 1.3.2.2 defines Telia's only External RA to be restricted only to Class 3 certificates outside of Mozilla context. Note also that Server CPS states clearly that within TLS validation no External RAs are used: 1.3.2: "All RA functions in this CPS are performed internally by Telia. Telia will not delegate domain validation to be performed by a third-party."

Dimitris Zacharopoulos

unread,
Jan 14, 2022, 6:55:21 AM1/14/22
to pekka.la...@teliacompany.com, dev-secur...@mozilla.org


On 14/1/2022 11:22 π.μ., pekka.la...@teliacompany.com wrote:
Hi Dimitris,

I wonder why Telia should provide audit report to Mozilla about the only external RA Telia CA is using when this external RA is using subCA that is out of scope of Mozilla based on its EKU values. This external RA is producing only client certificates for signature purposes.

Hello Pekkam

If they are out of scope, then it makes sense not to disclose such audit reports to Mozilla and other Root Programs that are only interested in "websites" and "email" certificates. However, it needs to be clearly (and explicitly?) stated that this external RA does not perform RA functions related to Certificates for TLS and email. In any case, this is not a very popular condition because external RAs typically validate identities that can be used for all certificate types, including TLS (OV/IV/EV) and email certificates that include identity. However, it is perfectly fine to scope these external RAs out for TLS and email certificates if you choose to do so.



Both provided audit reports WTCA and WTBR state that they cover Telia CA operations in Finland and Sweden and only WTCA report has remark about External RA in this format (WTBR report doesn't have this):

"Telia makes use of external registration authorities for subscriber registration activities as disclosed in Telia's business practices. Our procedures did not extend to the controls excercised by these external registration authorities."

This text above refers to Telia Client CPS that has disclosed that the only case in addition to Enterprise RA when Telia is using External RA is related to Telia Class 3 client certificates and all SMIME related validation is done only by Telia CA itself. E.g. Client CPS 1.3.2: "Telia CA employs two RAs: Internal RA and External RA. Telia will not delegate domain validation to be performed by a third-party. The CA itself verifies email domain ownership or verifies that End-entity controls the email account." Chapter 1.3.2.2 defines Telia's only External RA to be restricted only to Class 3 certificates outside of Mozilla context. Note also that Server CPS states clearly that within TLS validation no External RAs are used: 1.3.2: "All RA functions in this CPS are performed internally by Telia. Telia will not delegate domain validation to be performed by a third-party."

Thank you for the clarifications. Please note that the statement for "not delegate domain validation to be performed by a third-party" does not apply to the identity validation function. This means that Telia CA could perform the Domain Validation part and delegate the Identity Validation part ("subscriber registration activities" in your WTCA audit report) to another entity (external RA) that would need to be audited. If your statement is that no external RAs are used for any validation activity associated with TLS or email certificates, then I believe this addresses the audit concerns related to this application.

It is not for me to decide whether this needs to be explicitly stated in audit reports or not. However, the fact that the "external RA" is mentioned only in the WTCA and not in the WTBR report, might implicitly state that there are no external RAs involved in the TLS certificate issuance process, but does it apply to the email certificate issuance? To the best of my knowledge, email certificate issuance is covered by the WTCA audit report and TLS is covered by the WTCA+WTBR. This could mean that "External RAs" might be used in the validation process (email or identity) for S/MIME certificates which are in scope of the Mozilla Root Program.

As a side note, I believe it would greatly help the community if WT experts could provide some guidance how Relying Parties should interpret WTCA and WTBR reports. Should a RP read a WTBR report as a stand-alone report or in combination with the WTCA?


Best regards,
Dimitris.

pekka.la...@teliacompany.com

unread,
Jan 14, 2022, 7:13:44 AM1/14/22
to dev-secur...@mozilla.org, ji...@it.auth.gr, pekka.la...@teliacompany.com
Right now audit reports aren't directly stating that "no external RAs are used for any validation activity associated with TLS or email certificates" but this is how it is and indirectly this should be clear because of the mentioned statements in CPS chapters 1.3.2. I hope it is enough now that we instruct auditors to add clearer statement into the next audit report; next audit round is soon starting and results come in June 2022.

Ben Wilson

unread,
Jan 20, 2022, 12:16:40 AM1/20/22
to dev-secur...@mozilla.org

All,

Over the past few weeks, we have discussed here Telia Finland Oyj’s request in more depth.  The discussion has mainly focused on Telia Finland Oyj’s parent company, Telia Company AB, and whether any unaffiliated third-party entities might be involved in providing RA services.

As Moudrick Dadashov rightly noted, the management assertion that accompanied the WebTrust audit report stated, “Telia Company AB (Telia) operates the Certificate Authority (CA) services as listed in Appendix A, and provides the following services: Subscriber registration, Certificate renewal, Certificate rekey, Certificate issuance, Certificate distribution, Certificate revocation, Certificate validation, Subscriber key generation and management. The management of Telia is responsible for establishing and maintaining effective control over its CA operations….”  

KPMG’s audit report likewise addressed Telia Company AB management and stated, “Telia makes use of external registration authorities for subscriber registration activities, as disclosed in Telia's business practices. Our procedures did not extend to the controls exercised by these external registration authorities.”

Telia has stated that its CA resources were clearly identified by the auditors as located in Finland and Sweden and that the full CA organization and system had been audited annually in both countries and in both companies. Auditors received details on the persons involved with the Telia CA and the “audit has been focused on those persons and their legal entities and how they implement Telia CA.”  It also responded that the audit scope in the audit reports included the legal entity Telia Company AB, because it was the main company, but also included affiliated legal entities practically participating in the Telia CA processes. 

Moudrick has made the point that the two organizations (Telia Company AB and Telia Finland Oyj) are separate legal entities. He said it was unclear which legal entity was the CA. He has argued that some of the materials provided (e.g. the audit documents) were on behalf of Telia Company AB, while the applicant is Telia Finland Oyj, and that these are two different, independent entities. He argued that "legal ownership" has nothing to do with the CA operations -- that Telia Company AB only controls shares of another legal entity (Telia Finland Oyj), which has nothing to do with CA operations.  Moudrick has argued that the audit reports should have been issued to Telia Finland Oyj, which should be the only ‘main company’, but that “[a]ccording to the audit report … Telia Company AB is the CA.”

Representatives from Telia have stated clearly and consistently that the applicant and CA operator is Telia Finland Oyj. The CA certificate identifies “Telia Finland Oyj” as the Organization.  Section 1.3.1 of the CP/CPS for Telia Server Certificates (v.4.4) states, "The CA operating in compliance with this CPS is Telia CA. The legal entity responsible of Telia CA is Finnish company “Telia Finland Oyj” (BusinessID 1475607-9). Telia Finland Oyj is part of Swedish company “Telia Company AB” (BusinessID 5561034249)."  To avoid future confusion, Telia has offered to “ask [its] auditors to add all three company names in the future audit reports if it makes audit results clearer.” I’d ask Telia to also improve its CP/CPS to provide more detail on the involvement of Telia Company AB in the management of the CA and any other subsidiaries’ provision of operational services.

Wikipedia and other information sources provide some information on the organizational and financial relationships among Telia Company AB and its subsidiaries, but not enough information is available on management structure and operations of the conglomerate. KPMG, in addressing its opinion to the management of Telia Company AB, implied that it had determined that Telia Company AB had some degree of control over CA operations. This is where the CP/CPS could be improved.

As noted by Ryan Sleevi, Peter Bowen, and Dimitris Zacharopoulos, PKI participant roles need to be adequately disclosed and any Delegated Third Party RAs need to be disclosed and audited.  There is a need for greater transparency and specificity. Ryan and Peter both felt that more explanation was needed concerning RA functions--“it would be helpful to clarify what functions any external RA does for any certificate that falls within the Mozilla policy.” Dimitris also stated that “it needs to be clearly (and explicitly?) stated that this external RA does not perform RA functions related to Certificates for TLS and email.” Pekka Lahtiharju from Telia responded that Telia hasn't used any third party RAs except in the mentioned client certificate cases – that the external RA does not perform RA functions related to Certificates for TLS and email.  

Basically, Moudrick has also asked for greater transparency and specificity, which is in line with what Mozilla wants.  Moudrick also cited MRSP section 8, that “trust is not transferrable”. Without getting into an interpretation of what that means for CAs operated by conglomerates, I agree with these points - it is important to know who is responsible, and I agree with Moudrick’s position that “If the CA operations rely on other party's (e.g. owner's, affiliate's etc.) material or human resources, you need to disclose those shared resources.”  Peter Bowen noted, “If Mozilla wants to have all the legal entities involved listed in the audit report, that is something that should be included in the Mozilla policy.” As a result of this, I have filed an issue in Github for these issues to be explored and worked on further in the future development of the Mozilla Root Store Policy. See https://github.com/mozilla/pkipolicy/issues/237

Based on all of the discussions back and forth, it appears that there is some common management under the umbrella of Telia Company AB, but that is no reason to withhold the approval of the inclusion of the root CA operated by Telia Finland Oyj, which has ownership and control of the CA certificate and keys. I believe the question of whether unaffiliated third-party entities might be involved in providing RA services has been adequately answered.  I urge Telia to add more detail, relative to these public discussions, the next time it updates its CP/CPS.

Thus, I'm going to ask Kathleen to proceed and approve the request to include the Telia Root CA v2 in the Mozilla/NSS root store.

Thanks,

Ben


pekka.la...@teliacompany.com

unread,
Jan 20, 2022, 2:30:00 AM1/20/22
to dev-secur...@mozilla.org, bwi...@mozilla.com
Thanks Ben,

It has always been clear to Telia that all participants and certificates in Mozilla scope has to be included into audits and results are disclosed. Telia will next improve the formulation of the texts in both CPSs (before June 2022) and audit reports (June 2022). We negotiate the better formulations together with our auditors and management. We'll also follow the discussion in  listed Github link if there will come some instructions what is the recommended way to document this in corporate case when several legal units are involved but operationally CA is just one entity and there are two (several) internal RAs operated by different legal entities of the same corporate. 

Moudrick Dadashov

unread,
Jan 20, 2022, 2:41:00 AM1/20/22
to pekka.la...@teliacompany.com, dev-secur...@mozilla.org, bwi...@mozilla.com
Hi Pekka,

Obviuosly your assurance below is on behalf of one of the PKI participant - Telia Finland Oyj.

It would be nice if the other PKI participant - Telia Company AB makes similiar public commitment.

Thanks,
M.D.

pekka.la...@teliacompany.com

unread,
Jan 20, 2022, 3:01:41 AM1/20/22
to dev-secur...@mozilla.org, m.m.da...@gmail.com, dev-secur...@mozilla.org, bwi...@mozilla.com, pekka.la...@teliacompany.com
I certainly talk on behalf of Telia CA and believe I talk also on behalf of Telia Company AB. If you look at my email address it is @teliacompany.com. If you look at my organization chart, on the top there is CEO of Telia Company AB. She has delegated the tasks of Telia CA to me and to my bosses. There aren't nearly any persons directly employed by Telia Company AB; nearly all are employed by Telia affiliate companies. I don't understand why my voice wouldn't be enough making these promises in this discussion.
Reply all
Reply to author
Forward
0 new messages