Symantec/GeoTrust has applied to enable EV for the “GeoTrust Primary
Certification Authority - G3” root certificate that is already included
in NSS.
GeoTrust is a subsidiary of Symantec. Symantec acquired the VeriSign
Authentication Services and root certificates, and is a major commercial
CA with worldwide operations and customer base.
The request is documented in the following bug:
https://bugzilla.mozilla.org/show_bug.cgi?id=539255
And in the pending certificates list here:
http://www.mozilla.org/projects/security/certs/pending/#Symantec%20/%20GeoTrust
Information Gathering Document:
https://bugzilla.mozilla.org/attachment.cgi?id=608011
Noteworthy points:
* The CPS is provided in English.
http://www.geotrust.com/resources/cps/pdfs/GeoTrustCPS-Version1.1.6.pdf
http://www.geotrust.com/resources/repository/legal.asp
* This SHA256 root certificate is currently included in NSS. It will
have a separate internally-operated intermediate CA for signing EV SSL
certificates.
** CP/CPS Section 3.2.2, Authentication of Organization Identity:
Whenever an organization name is included in the Certificate, GeoTrust
or the RA will take reasonable steps to establish that a Certificate
request made on behalf of that Organization is legitimate and properly
authorized. … GeoTrust may
(a) verify the validity of the registration through the authority that
issued it, or
(b) verify the validity of the registration through a reputable third
party database or other resource, or
(c) verify the validity of the Organization through a trusted third
party, or
(d) confirm that the Organization exists if such Organization is not the
type that is typically registered or is capable of being verified under
clause (b).
** CPS Section 3.2.3, Authentication of Domain Name: When a domain name
is included in a Certificate together with an organization name,
GeoTrust or the RA will verify that the Subscriber had the right to use
the domain name submitted by the Subscriber at the time it submitted its
application. For instance, GeoTrust may perform this verification by
confirming that the Subscriber is the same person or entity that holds
the domain name registration from the relevant domain name registrar or
that the Subscriber is otherwise authorized to use such domain name. …
When a domain name is included in a Certificate without authentication
of the entity owning the domain name, GeoTrust or an RA will verify that
the Subscriber has control over such domain name at the time it
submitted its enrolment form by accessing a third party database of
domain names and their owners. To do this, GeoTrust will send an e-mail
message to one of the following e-mail addresses requesting confirmation
of the Certificate order and authorization to issue the Certificate in
the domain name:
(a) an e-mail address listed as the administrative or technical contact
for the domain name in an official InterNIC domain name registry that
includes the domain name,
(b) a limited list of the most commonly used generic e-mail addresses
for authorized persons at domain names (e.g., “
ad...@domain.com,“ or
“
hostm...@domain.com” for the domain name
domain.com), or
(c) using a manual process of verification conducted by GeoTrust, to an
e-mail address identified as the registered owner of the domain per the
whois database. Optionally, a verification phone call may be substituted
to the domain owner phone number listed in the whois.
** CPS Section 3.2.4 states that GeoTrust requires the certificate
applicant to prove control over the Contact Address, which is the email
address to be included in the cert. GeoTrust’s process for proving
control over the email address is to send an email to the Contact
Address requiring the applicant to respond to a link and enter a PIN
that is also sent via email.
** CPS section 3.2.6, Validation of Authority: GeoTrust will take
reasonable steps to establish that a Certificate request made on behalf
of that Organization is legitimate and properly authorized. To prove
that a Certificate is duly authorized by the Organization, GeoTrust will
typically request the name of a contact person who is employed by or is
an officer of the Organization. GeoTrust will also typically require a
form of authorization from the Organization confirming its intent to
obtain a Certificate and will usually document the Organization's
contact person. GeoTrust normally confirms the contents of this
authorization with the listed contact person.
** GeoTrust’s EV SSL Verification Requirements are in Appendix A of the
CPS, which starts on page 47.
*** Sections 14 and 15: Verification of Applicant’s Legal Existence and
Identity (pages 60 – 62)
“To verify Applicant‟s legal existence and identity, GeoTrust verifies
that the Applicant is a legally recognized entity, in existence and
validly formed (e.g., incorporated) directly with the Incorporating or
Registration Agency in Applicant‟s Jurisdiction of Incorporation or
Registration, and designated on the records of the Incorporating or
Registration Agency …”
*** Section 16: Verification of Applicant’s Physical Existence (pages 62
– 64)
“To verify Applicant‟s physical existence and business presence,
GeoTrust verifies that the physical address provided by Applicant or a
Parent/Subsidiary Company is an address where Applicant conducts
business operations (e.g., not a mail drop or P.O. Box), and is the
address of Applicant‟s Place of Business. …”
*** Section 17: Verification of Applicant’s Operational Existence (page 64)
“If the records of the Incorporating or Registration Agency indicate
that the Applicant has been in existence for less than three (3) years,
and the Applicant is not listed in either the current version of one (1)
Qualified Independent Information Source or a Qualified Governmental Tax
Information Source, GeoTrust verifies that the Applicant has the ability
to engage in business. …”
*** Section 18: Verification of Applicant’s Domain Name (pages 64 - 65)
“…GeoTrust performs a WHOIS inquiry on the Internet for the domain name
supplied by the Applicant to verify that the Applicant is the entity to
whom the domain name is registered. Where the WHOIS record indicates
otherwise, GeoTrust will require the WHOIS record to be updated to
reflect the Applicant as the registered holder of the domain. …”
* EV Policy OID: 1.3.6.1.4.1.14370.1.6
* Test Website:
https://ssltest21.bbtest.net/
Before actual approval, need test website whose EV SSL cert chains up to
the intermediate issuing CA, chaining up to this root.
* CRL: No CRL exists yet – GeoTrust is not yet actively issuing
certificates from these roots.
** CPS Section 4.9.7: GeoTrust shall post the CRL online at least weekly
(but no later than twenty-four (24) hours after revocation of a Certificate)
* OCSP: Not yet provided. Must be provided before actual approval to
enable EV.
** CPS Appendix A1, section 26: For EV Certificates: ... GeoTrust’s
Online Certificate Status Protocol (OCSP) is updated at least every four
(4) days, and with a maximum expiration time of ten (10) days.
* Audit: GeoTrust’s audits are performed by KPMG and posted on the
webtrust.org website:
https://cert.webtrust.org/SealFile?seal=650&file=pdf
This document contains two audit reports, one for WebTrust for CA and
one for WebTrust for EV.
Potentially Problematic Practices
(
http://wiki.mozilla.org/CA:Problematic_Practices):
* CPS Section 1.4: GeoTrust may issue Wildcard Certificates, which are
X.509 Certificates with SSL Extensions that are vetted to a specified
level domain and may be used in connection with all next level higher
domains that contain the specified vetted level domain.
** CPS Appendix A1: “Wildcard certificates are not allowed for EV
certificates.”
This begins the discussion of the request from Symantec/GeoTrust to
enable EV for the “GeoTrust Primary Certification Authority - G3” root
certificate that is already included in NSS. At the conclusion of this
discussion I will provide a summary of issues noted and action items. If
there are outstanding issues, then an additional discussion may be
needed as follow-up. If there are no outstanding issues, then I will
track the action items to create the intermediate EV issuing
certificate, provide OCSP, and perform EV testing before recommending
approval in the bug.
Kathleen