Atos applied to include the “Atos TrustedRoot 2011” root certificate and
enable all three trust bits.
Atos Trustcenter acts in Europe, but also has international customers.
The PKI-Services are offered to the Public, with no restrictions to user
groups.
The request is documented in the following bug:
https://bugzilla.mozilla.org/show_bug.cgi?id=711366
And in the pending certificates list here:
http://www.mozilla.org/projects/security/certs/pending/#Atos
Summary of Information Gathered and Verified:
https://bugzilla.mozilla.org/attachment.cgi?id=725143
Noteworthy points:
* The primary document is the CPS which is provided in English.
Document Repository:
https://pki.atos.net/TrustedRoot/
CPS (English):
https://pki.atos.net/EJPKI-WebFrontend/Public/TrustedRoot/Download?File=AtosTrustedCA_CPS_v1.5.pdf
Subscriber Agreement:
https://bugzilla.mozilla.org/attachment.cgi?id=582228
This root signs three types of internally-operated intermediate
certificates for issuing SSL server, client, and code signing
certificates. The current subCAs are:
- Atos TrustedRoot Client‐CA 2011
- Atos TrustedRoot Client‐CA 2012
- Atos TrustedRoot Server‐CA 2011
- Atos TrustedRoot CodeSigning‐CA 2011
All three trust bits are requested.
* CPS chapter 4.2: The identity of an applicant is verified for the
different CAs with different evidences:
- [SSL-CA]: AO collects the necessary evidences for the verification of
the subject’s identity, requesting an AO SSL Server CA certificate. More
details see statement 77.
- [Client-CA]: AO collects the necessary evidences either directly for
the verification of the subject’s identity, requesting an AO Client CA
certificate. Alternatively there exists a registration authority
authorized by the CA and operating according to a contractual agreement
which is offered to a specific group of subscribers. The registration
authority collects the evidences for the verification of the subject’s
identity belonging to this group of subscribers. More details see
statements 69, 73, 74 and 75.
- [CodeSigning-CA]: AO collects the necessary evidences for the
verification of the subject’s identity, requesting an AO CodeSigning CA
certificate. More details see statement 76.
* CPS chapter 4.2, statement 77: A legal entity, represented by a device
or system, which requests a certificate is identified and authenticated
for the first time via the subject’s name of the certificate:
- The device or system possesses an Internet Domain name, and a
registration as Top Level Domain (which can be found for Germany with
www.denic.de or international with
www.iana.com), where the registered
full name of the legal entity is registered and this matches the
subject’s full name.
- The legal’s entity full name matches the subject’s name in the
certificate.
- The existence of the legal entity is evident from an excerpt from the
commercial register (certificate of registration, in Germany:
Handelsregisterauszug).
* Atos_ca_Information_v1.1.pdf: After the request was created by a
customer, an email will be send to the email address given in the
certificate. The email contains a system generated one-time-password,
which the customer has to use to activate the certificate request.
* CPS chapter 4.2, statements 69, 73, 74, 75.
Statement 75: In addition to the personal identification and
authentication a representative has to provide:
- Evidence that he or she is authorized by the legal entity to request a
certificate (the name of the person is included in the certificate as
the subject) for it
- Evidence of the existence of the legal entity in form of
-- an excerpt from the commercial register (certificate of registration,
in Germany: Handelsregisterauszug), or
-- a registration of a Top Level Domain (which can be found for Germany
with
www.denic.de or international with
www.iana.com)
* Atos_ca_Information_v1.1.pdf: After register a new account at the
Website an email with a system generated one-time-password will be send
to the given mail address. The customer has to activate the service with
this password. After this procedure the customer could create
certificate request for this email address only
* CPS chapter 4.2 Statement 76: A legal entity requesting a certificate
is identified and authenticated for the first time via the subject’s
name of the certificate:
- The legal’s entity full name matches the subject’s name in the
certificate.
- The existence of the legal entity in form is evident with either
-- an excerpt from the commercial register (certificate of registration,
in Germany: Handelsregisterauszug), or
-- a registration as Top Level Domain (which can be found for Germany
with
www.denic.de or international with
www.iana.com), where the
registered full name of the legal entity is registered and it matches
the subject’s full name.
* EV Policy OID: Not requesting EV treatment.
* Root Cert:
https://pki.atos.net/certs/Atos_TrustedRoot_2011.cer
* Test Website:
https://pki.atos.net:7081/
* CRL
https://pki.atos.net/crl/Atos_TrustedRoot_CA_2011.crl
http://pki.atos.net/crl/Atos_TrustedRoot_Server_CA_2011.crl (NextUpdate:
24 hours)
CPS section 3.3: CRLs are published at least every 24 hours.
* OCSP:
http://pki-ocsp.atos.net
* Audit: Audits are performed by DQS Holding GmbH,
https://de.dqs-ul.com, according to the ETSI TS 102 042 criteria. Annual
surveillance audits are also performed in order to maintain ETSI
certification.
The ETSI certificate is posted on the auditor’s website:
https://de.dqs-ul.com/kunden/kundendatenbank.html?aoemydqs[company_no]=334220&aoemydqs[action]=singleView&cHash=c086db2a2cd03a17407d1f2712ab2dd4
* Potentially Problematic Practices – None noted
(
http://wiki.mozilla.org/CA:Problematic_Practices)
This begins the discussion of the request from Atos to include the “Atos
TrustedRoot 2011” root certificate and turn on all three trust bits. At
the conclusion of this discussion I will provide a summary of issues
noted and action items. If there are outstanding issues, then an
additional discussion may be needed as follow-up. If there are no
outstanding issues, then I will recommend approval of this request in
the bug.
Kathleen