QuoVadis has applied to include the “QuoVadis Root CA 1 G3”, “QuoVadis
Root CA 2 G3”, and “QuoVadis Root CA 3 G3” root certificates, turn on
all three trust bits for the RCA1 and RCA3 root certs, and turn on the
websites and code signing trust bits for the RCA2 root cert. The request
is to also enable EV treatment for the “QuoVadis Root CA 2 G3” root
certificate. These SHA256 root certs will eventually replace the
corresponding QuoVadis root certificates that were included in NSS in
bugs #238381 and #365281.
QuoVadis is a commercial CA serving a global client base, active in both
the markets for SSL and End User certificates with a focus on digital
signatures. The company is a Qualified Certification Services Provider
in Switzerland and Holland, and an issuer in the SuisseID (CH) and PKI
Overheid (NL) eID programmes. QuoVadis serves both enterprises and
individuals.
The request is documented in the following bug:
https://bugzilla.mozilla.org/show_bug.cgi?id=926541
And in the pending certificates list:
http://www.mozilla.org/projects/security/certs/pending/
Summary of Information Gathered and Verified:
https://bugzilla.mozilla.org/attachment.cgi?id=8403019
Noteworthy points:
* The primary documents, the CP/CPS, are in English.
QuoVadis Document Repository:
https://www.quovadisglobal.com/QVRepository.aspx
RCA1_RCA3_CPS:
https://www.quovadisglobal.com/~/media/Files/Repository/QV_RCA1_RCA3_CPCPS_V4_14.ashx
RCA2_CPS:
https://www.quovadisglobal.com/~/media/Files/Repository/QV_RCA2_CPCPS_v1.14.ashx
* CA Hierarchy: The hierarchy under the new (G3) roots will be very
similar to the hierarchy of the current (G1) roots. CA Hierarchy
diagrams are provided in section 1.3 of RCA1_RCA3_CPS and RCA2_CPS.
** RCA1 and RCA3 share a CP/CPS (RCA1_RCA3_CPS) and are both allowed to
have externally operated subCAs from a policy perspective. However,
QuoVadis concentrates all external subCAs under the RCA3 hierarchy.
Both RCA1 and RCA2 are reserved solely for QuoVadis operated subCAs.
- G3 Roots (i.e. the new roots): Currently the new roots do not have
external subCAs. Any third-party SubCAs added to the G3 hierarchy will
comply with Section 9 of the Mozilla CA Inclusion Policy from inception.
- G1 Roots (i.e. the old roots): Previously, third-party subCAs have
been overseen via contractual controls or technical monitoring,
supported by internal audit. QuoVadis is in the process of
transitioning these clients before May 15, 2014 to either technical
controls (nameConstraints) or audit with public disclosure as specified
in Section 9 of the Mozilla CA Inclusion Policy.
At present, QuoVadis does not expect to have any cross-certificates for
the G3 Root Certificates. However, if QuoVadis needs to start using the
G3 Roots before they have achieved a sufficient level of distribution
amongst the installed base of various software products, they may elect
to issue cross-certificates to the new Roots from the existing QuoVadis
Roots.
* This request is to turn on all three trust bits for the RCA1 and RCA3
root certs, and turn on the websites and code signing trust bits for the
RCA2 root cert.
** Authentication of identity and authority is described in sections
3.2.2 through 3.2.5 of RCA1_RCA3_CPS, and Appendix B of RCA2_CPS.
** RCA1_RCA3_CPS, section 4.1.2: Where Certificates are to be used for
digitally signing and/or encrypting email messages, QuoVadis takes
reasonable measures to verify that the entity submitting the request
controls the email account referenced in the Certificate, or has a legal
right to request a Certificate including the email address. QuoVadis
systems perform a challenge-response procedure by sending an email to
the email address to be included in the Certificate. The Applicant must
respond with a shared secret within a limited time to demonstrate that
they have control over that email address.
** RCA1_RCA3_CPS, section 10.6.1.2, Grid Server Certificate: The
identity vetting of all Applicants must be performed by an approved
Registration Authority (RA). For Grid Server Certificates, the RA must
validate the identity and eligibility of the person in charge of the
specific entities using a secure method. The RA is responsible for
recording, at the time of validation, sufficient information regarding
the Applicant to identify the Applicant. As part of the registration
process the RA must ensure that the Applicant is appropriately
authorised by the owner of the associated Fully Qualified Domain Name
(FQDN) or the responsible administrator of the machine to use the FQDN
identifiers asserted in the Digital Certificate. The RA is responsible
for maintaining documented evidence on retaining the same identity over
time.
The RA must validate the association of the Certificate Signing Request.
The Certificate Request submitted for certification must be bound to the
act of identity vetting.
*** A Grid Server Certificate is used in the for e-Science Grid for
authentication between academic institutions, under standards set by the
EUGridPMA according to the Authentication Profile of the International Grid
Trust Federation (IGTF). The external RA is essentially assisting in the
gathering of supporting documentation - primarily to confirm that the
requestor has the right to use a Grid certificate. As stated in the CPS,
QuoVadis Support approves the Subject and Domain information for all SSL,
and these certificates are issued via our Trust/Link system with the
automated controls to enforce the validation/aging requirements of the BR,
etc.
** RCA1_RCA3_CPS, section 10.7, QuoVadis Device:
***QuoVadis Device Certificates are intended for use in establishing
web-based data communication conduits via TLS/SSL protocols. QuoVadis
Device Certificates (i.e. with the OID 1.3.6.1.4.1.8024.1.600 in
Certificate Policies) that have the Server Authentication Extended Key
Usage comply with the CA/B Forum Baseline Requirements.
***QuoVadis acts as Registration Authority (RA) for Device Certificates
it issues.
Before issuing a Device Certificate, QuoVadis performs procedures to
verify that all Subject information in the Certificate is correct, and
that the Applicant is authorised to use the domain name and/or
Organisation name to be included in the Certificate, and has accepted a
Certificate Holder Agreement for the requested Certificate.
** RCA1_RCA3_CPS section 10.7 and RCA2_CPS section 3.1.7: For each FQDN
listed in a Certificate, QuoVadis confirms that, as of the date the
Certificate was issued, the Applicant either is the Domain Name
Registrant or has control over the FQDN by:
1. Confirming the Applicant as the Domain Name Registrant directly with
the Domain Name Registrar;
2. Communicating directly with the Domain Name Registrant using an
address, email, or telephone number provided by the Domain Name Registrar;
3. Communicating directly with the Domain Name Registrant using the
contact information listed in the WHOIS record’s “registrant”,
“technical”, or “administrative” field;
4. Communicating with the Domain’s administrator using an email address
created by pre-pending ‘admin’, ‘administrator’, ‘webmaster’,
‘hostmaster’, or ‘postmaster’ to the FQDN;
5. Relying upon a Domain Authorization Document; and
6. Having the Applicant demonstrate practical control over the FQDN by
making an agreed-upon change to information found on an online Web page
identified by a uniform resource identifier containing the FQDN.
** In RCA1_RCA3_CPS the Device certs described in section 10.7 may have
the Code Signing EKU. RCA1_RCA3_CPS section 10.7: Before issuing a
Device Certificate, QuoVadis performs procedures to verify that all
Subject information in the Certificate is correct, and that the
Applicant is authorised to use the domain name and/or Organisation name
to be included in the Certificate, and has accepted a Certificate Holder
Agreement for the requested Certificate.
** RCA2_CPS Appendix B: Before issuing a Code Signing Certificate,
QuoVadis performs limited procedures to verify that all Subject
information in the Certificate is correct, and that the Applicant is
authorised to sign code in the name to be included in the Certificate.
Prior to issuing a Code Signing Certificate to an Organisational
Applicant, QuoVadis:
1. Verifies the Applicant’s possession of the Private Key;
2. Verifies the Subject’s legal identity, including any Doing Business
As (DBA) included in a Certificate,
3. Verifies the Subject’s address, and
4. Verifies the Certificate Requester’s authority to request a
certificate and the authenticity of the Certificate request using a
verified method of communication.
Prior to issuing a Code Signing Certificate to an Individual Applicant,
the QuoVadis:
1. Verifies the Subject’s identity using a government photo ID,
2. Verifies the Subject’s address using reliable data sources,
3. Obtains a biometric associated with the Subject, such as a
fingerprint or notarized handwritten Declaration of Identity,
4. Verifies the Certificate Requester’s authority to request a
certificate and the authenticity of the Certificate request using a
verified method of communication.
** RCA2_CPS Appendix B: Before issuing an EV Certificate, QuoVadis
ensures that all Subject organisation information in the EV Certificate
conforms to the requirements of, and has been verified in accordance
with, the EV Guidelines and matches the information confirmed and
documented by the CA pursuant to its verification processes. Such
verification processes are intended to accomplish the following:
i. Verify Applicant’s existence and identity, including;
- Verify Applicant’s legal existence and identity (as established with
an Incorporating Agency),
- Verify Applicant’s physical existence (business presence at a physical
address), and
- Verify Applicant’s operational existence (business activity).
ii. Verify Applicant (or a corporate parent/subsidiary) is a registered
holder or has exclusive control of the domain name to be included in the
EV Certificate;
iii. Verify Applicant’s authorization for the EV Certificate, including;
- Verify the name, title, and authority of the Contract Signer,
Certificate Approver, and Certificate Requester;
- Verify that Contract Signer signed the Certificate Holder Agreement; and
- Verify that a Certificate Approver has signed or otherwise approved
the EV Certificate Request.
* EV Policy OID: 1.3.6.1.4.1.8024.0.2.100.1.2
** EV treatment is only requested for RCA2.
* Root Cert URLs
http://trust.quovadisglobal.com/qvrca1g3.crt
http://trust.quovadisglobal.com/qvrca2g3.crt
http://trust.quovadisglobal.com/qvrca3g3.crt
* Test Websites
https://qvica1g3-v.quovadisglobal.com
https://evsslicag3-v.quovadisglobal.com
https://qvica3g3-v.quovadisglobal.com
http://www.quovadisglobal.com/en-GB/QVRepository/TestCertificates.aspx
* CRL
http://crl.quovadisglobal.com/qvrca1g3.crl
http://crl.quovadisglobal.com/qvrca2g3.crl
http://crl.quovadisglobal.com/qvrca3g3.crl
* OCSP
http://ocsp.quovadisglobal.com
* Audit: Annual audits are performed by Ernst & Young according to the
WebTrust criteria.
WebTrust for CAs:
https://cert.webtrust.org/SealFile?seal=1503&file=pdf
WebTrust for EV:
https://cert.webtrust.org/SealFile?seal=1508&file=pdf
WebTrust for BRs:
https://cert.webtrust.org/SealFile?seal=1520&file=pdf
Ernst & Young auditors were present for the creation ceremony for the G3
Roots.
* Potentially Problematic Practices
(
http://wiki.mozilla.org/CA:Problematic_Practices)
** CPS allows for external subCAs, but any external subCAs that are
added to the G3 hierarchy will comply with Section 9 of Mozilla’s CA
Inclusion Policy from inception.
** QuoVadis has issued OV SSL (never EV) referencing internal server
names, and has implemented procedures to deprecate their use in line
with the Baseline Requirements. See Section 3.1.1 of the CP/CPS for
Root CA2. QuoVadis communicates the risks of such practices with
customers, and such requests are approved by a QuoVadis Administrator
before issuance. QuoVadis will not issue SSL including internal server
names with an Expiry Date later than November 1, 2015. Effective 1
October 2016, QuoVadis will revoke any unexpired SSL whose CN or SAN
contains internal server names.
** External RAs may be used in all three hierarchies. However, in the
case of SSL certificates, external RAs may only assist in the gathering
of validation information. QuoVadis provides signoff and acts as the
actual RA for all SSL requests.
*** External RAs:
QV_RCA2_CPCPS_v1.13.ashx: Client Local RAs can issue Business SSL and EV
SSL for Oganizations and Domains that have be pre-authentiated by QuoVadis.
QV_RCA1_RCA3_CPCPS_V4_13.ashx section 1.3.2: Registration Authorities
must perform certain functions in accordance with this CP/CPS and
applicable Registration Authority Agreement which include but are not
limited to;
- Process all Digital Certificate application requests.
- Maintain and process all supporting documentation related to Digital
Certificate applications.
- Process all Digital Certificate Revocation requests.
- Comply with the provisions of its QuoVadis Registration Authority
Agreement and the provisions of this QuoVadis CP/CPS including, without
limitation to the generality of the foregoing, compliance with any
compliance audit requirements.
- Follow a privacy policy in accordance with this CP/CPS and the
applicable Registration Authority Agreement.
This begins the discussion of the request from QuoVadis to include the
“QuoVadis Root CA 1 G3”, “QuoVadis Root CA 2 G3”, and “QuoVadis Root CA
3 G3” root certificates, turn on all three trust bits for the RCA1 and
RCA3 root certs, and turn on the websites and code signing trust bits
for the RCA2 root cert. The request is to also enable EV treatment for
the “QuoVadis Root CA 2 G3” root certificate.
At the conclusion of this discussion I will provide a summary of issues
noted and action items. If there are outstanding issues, then an
additional discussion may be needed as follow-up. If there are no
outstanding issues, then I will recommend approval of this request in
the bug.
Kathleen