DigiCert has applied to include 5 new root certificates that will
eventually replace the 3 DigiCert root certificates that were included
in NSS via bug #364568. The request is to turn on all 3 trust bits and
enable EV for all of the new root certs.
1) DigiCert Assured ID Root G2 -- This SHA-256 root will eventually
replace the SHA-1 “DigiCert Assured ID Root CA” certificate.
2) DigiCert Assured ID Root G3 -- The ECC version of the Assured ID root.
3) DigiCert Global Root G2 -- This SHA-256 root will eventually replace
the SHA-1 “DigiCert Global Root CA” certificate.
4) DigiCert Global Root G3 -- The ECC version of the Global root.
5) DigiCert Trusted Root G4 -- This SHA-384 root will eventually replace
the SHA-1 “DigiCert High Assurance EV Root CA” certificate.
DigiCert is a US-based commercial CA with headquarters in Utah. DigiCert
provides digital certification and identity assurance services
internationally to a variety of sectors including business, education,
and government.
The request is documented in the following bug:
https://bugzilla.mozilla.org/show_bug.cgi?id=908827
And in the pending certificates list:
http://www.mozilla.org/about/governance/policies/security-group/certs/pending/
Summary of Information Gathered and Verified:
https://bugzilla.mozilla.org/attachment.cgi?id=8359954
Noteworthy points:
* The primary documents, the CP and CPS, are in English.
DigiCert Legal Repository:
http://www.digicert.com/ssl-cps-repository.htm
CP:
http://www.digicert.com/docs/cps/DigiCert_CP_v405-May-2-2013.pdf
CPS:
http://www.digicert.com/docs/cps/DigiCert_CPS_v405-May-2-2013.pdf
* CA Hierarchy: All of the new root certs will have internally-operated
intermediate certificates for issuing SSL, email, and code-signing
certificates
* The request is to turn on all 3 trust bits and enable EV for all of
the new root certs.
** CPS section 3.2.2 -- DV SSL Server Certificates: DigiCert validates
the Applicant’s right to use or control the domain names that will be
listed in the certificate using one or more of the following procedures:
1. Relying on publicly available records from the Domain Name Registrar,
such as WHOIS or other DNS record information;
2. Communicating with one of the following email addresses:
webm...@domain.com,
admini...@domain.com,
ad...@domain.com,
hostmaster@domain, postmaster@domain, or any address listed in the
technical, registrant, or administrative contact field of the domain’s
Registrar record;
3. Requiring a practical demonstration of domain control (e.g.,
requiring the Applicant to make a specified change to a live page on the
given domain); and/or
4. A domain authorization letter, provided the letter contains the
signature of an authorized representative of the domain holder, a date
that is on or after the certificate request, a list of the approved
fully‐qualified domain name(s), and a statement granting the Applicant
the right to use the domain names in the certificate. DigiCert also
contacts the domain name holder using a reliable third‐party data source
to confirm the authenticity of the domain authorization letter; and/or
5. A similar procedure that offers an equivalent level of assurance in
the Applicant’s ownership, control, or right to use the Domain Name.
DigiCert verifies an included country code using (a) the IP Address
range assignment by country for either (i) the web site’s IP address, as
indicated by the DNS record for the web site or (ii) the Applicant’s IP
address; (b) the ccTLD of the requested Domain Name; or (c) information
provided by the Domain Name Registrar.
** CPS section 3.2.2
*** OV SSL Server Certificates: DigiCert validates the Applicant’s right
to use or control the Domain Name(s) that will be listed in the
Certificate using the DV SSL Server Certificate validation procedures above.
** EV SSL and EV Code Signing Certificates: Information concerning
organization identity related to the issuance of EV Certificates is
validated in accordance with the EV Guidelines.
** Level 1 Client Certificates - Enterprise: DigiCert verifies
organizational control over the email domain using authentication
procedures similar to those used by DigiCert when establishing domain
ownership by an organization before issuance of a DV or OV SSL Server
Certificate.
*** Level 2, 3, and 4 Client Certificates: If the certificate contains
organization information, DigiCert obtains documentation from the
organization sufficient to confirm that the individual has an
affiliation with the organization named in the certificate.
** CPS section 3.2.2: Before issuing an SSL certificate with a domain
name that has not been previously verified as within the scope of an
RA’s or other Delegated Third Party’s allowed domain names, DigiCert
establishes that the RA or Delegated Third Party has the right to use
the Domain Name by independently verifying the authorization with the
domain owner, as described above, or by using other reliable means, such
as performing a DNS lookup to determine whether there is a matching DNS
record that points to the Delegated Third Party’s IP address or domain
namespace.
** For Authentication of Individual Identity see CPS section 3.2.3 for
details, because this depends on the usage and verification level of the
certificate.
** CPS section 3.2.3 - Level 1 Client Certificates – Personal (email
certificates): DigiCert or an RA verifies Applicant's control of the
email address or website listed in the certificate.
** CPS section 3.2.3 - OV SSL Server Certificates and Object Signing
Certificates (issued to an individual):
1. DigiCert or the RA obtains a legible copy, which discernibly shows
the Applicant’s face, of at least one currently valid government‐issued
photo ID (passport, driver’s license, military ID, national ID, or
equivalent document type). DigiCert or the RA inspects the copy for any
indication of alteration or falsification.
2. DigiCert may additionally cross‐check the Applicant’s name and
address for consistency with available third party data sources.
3. If further assurance is required, then the Applicant must provide an
additional form of identification, such as recent utility bills,
financial account statements, credit card, an additional ID credential,
or equivalent document type.
4. DigiCert or the RA confirms that the Applicant is able to receive
communication by telephone, postal mail/courier, or fax.
If DigiCert cannot verify the Applicant’s identity using the procedures
described above, then the Applicant must submit a Declaration of
Identity that is witnessed and signed by a Registration Authority,
Trusted Agent, notary, lawyer, accountant,
postal carrier, or any entity certified by a State or National
Government as authorized to confirm identities.
** For Validation of Authority see CPS section 3.2.5 for details,
because this depends on the usage and verification level of the certificate.
CPS section 3.2.5 – Object Signing Certificates: The requester’s contact
information is verified with an authoritative source within the
applicant’s organization (e.g. corporate, legal, IT, HR, or other
appropriate organizational sources) using a reliable method of
communication. The contact information is then used to confirm the
authenticity of the certificate request.
* EV Policy OID: 2.16.840.1.114412.2.1
EV treatment is requested for all of the new root certs.
* Root Cert URLs
https://www.digicert.com/digicert-root-certificates.htm
https://www.digicert.com/CACerts/DigiCertAssuredIDRootG2.crt
https://www.digicert.com/CACerts/DigiCertAssuredIDRootG3.crt
https://www.digicert.com/CACerts/DigiCertGlobalRootG2.crt
https://www.digicert.com/CACerts/DigiCertGlobalRootG3.crt
https://www.digicert.com/CACerts/DigiCertTrustedRootG4.crt
* Test Websites
https://assured-id-root-g2.digicert.com
https://assured-id-root-g3.digicert.com
https://global-root-g2.digicert.com/
https://global-root-g3.digicert.com/
https://trusted-root-g4.digicert.com/
* OCSP
http://ocsp.digicert.com
* Audit: Annual audits are performed by KPMG according to the WebTrust
CA and WebTrust EV criteria.
https://cert.webtrust.org/SealFile?seal=1527&file=pdf (2013.07.12)
https://cert.webtrust.org/SealFile?seal=1527&file=pdf (2013.07.12)
* Potentially Problematic Practices
(
http://wiki.mozilla.org/CA:Problematic_Practices)
** Certificates referencing hostnames or private IP addresses:
DigiCert is currently issuing certificates with private/internal names.
Per the BRs and Section 3.1.1 of our CPS, we plan to halt this process
and revoke all existing certificates by the deadline. All such
certificates currently being issued have an expiration date before
October 1, 2016. DigiCert is also actively working with ICANN to ensure
these names do not impact the release of the new gTLDs.
This begins the discussion of the request from DigiCert to include 5 new
root certificates that will eventually replace the 3 DigiCert root
certificates that are currently included in NSS. The new root certs are
“DigiCert Assured ID Root G2” (SHA-256), “DigiCert Assured ID Root G3”
(ECC), “DigiCert Global Root G2” (SHA-256), “DigiCert Global Root G3”
(ECC), and “DigiCert Trusted Root G4” (SHA-384). The request is to turn
on all 3 trust bits and enable EV for all of the new root certs.
At the conclusion of this discussion I will provide a summary of issues
noted and action items. If there are outstanding issues, then an
additional discussion may be needed as follow-up. If there are no
outstanding issues, then I will recommend approval of this request in
the bug.
Kathleen