D-TRUST has applied to add the “D-TRUST Root Class 3 CA 2 2009” and
“D-TRUST Root Class 3 CA 2 EV 2009” root certificates to NSS. The
request is to turn on the Websites trust bit for both root certs, and to
enable EV for the “D-TRUST Root Class 3 CA 2 EV 2009” root cert.
D-TRUST GmbH, founded in Berlin in 1998, is a wholly owned subsidiary of
Bundesdruckerei and is the only German trust center authorized to
perform sovereign tasks. The development and marketing of high-security
products for the electronic signature are carried out in
Bundesdruckerei's high-security value printing building. The primary
market is the German speaking area (Austria, Germany, Switzerland) and
B2B focused.
The request is documented in the following bug:
https://bugzilla.mozilla.org/show_bug.cgi?id=467891
And in the pending certificates list here:
http://www.mozilla.org/projects/security/certs/pending/#D-TRUST
Summary of Information Gathered and Verified:
https://bugzilla.mozilla.org/attachment.cgi?id=664275
Noteworthy points:
* The primary documents are the CP and CPS, which are translated into
English.
Document Repository:
http://ssl.d-trust.net/support/repository.php
http://www.d-trust.net/internet/files/D-TRUST_Root_PKI_CPS-EN.pdf
http://www.d-trust.net/internet/files/D-TRUST_Root_PKI_CP-EN.pdf
The “D-TRUST Root Class 3 CA 2 2009” root currently has one
internally-operated subordinate CA, “D-TRUST SSL Class 3 CA 1 2009”,
which signs end-entity certificates.
The “D-TRUST Root Class 3 CA 2 EV 2009” root currently has one
internally-operated subordinate CA, “D-TRUST SSL Class 3 CA 1 EV 2009”,
which signs end-entity certificates.
The request is to turn on the Websites trust bit for both root certs. EV
treatment is requested for the “D-TRUST SSL Class 3 CA 1 EV 2009” root cert.
* Only Class 3 certs are issued within the hierarchy of these roots.
* CP section 1.5.3: Class 3 SSL-EV-certificates as well as their Sub-
and Root-CAs adhere to the specifications of the CA/Browser Forum
Guidelines for Extended Validation Certificates [GL-BRO]. In the case of
inconsistencies between this document and above mentioned guidelines,
the [GL-BRO] takes precedence for Class 3 SSL EV CAs as well as their
Sub- and Root-CAs.
** CP section 1.6.3: [GL-BRO] = Guidelines for Extended Validation
Certificates, CA/Browser Forum, Version 1.2 October 2009
* CP section 3.2.2:
** Class 3: High-level identification and assessment. Personal
participant identification as well as a thourough assessment of the
applicant-data are conducted along the procedures defined for the
creation of qualified certificates. Legal entities are verified in
adherence with the [ETSI-F]- guidelines. The verification encompasses
all of the DN-components.
** Class 3 EV-certificates: Identification and authentication as well as
data verification follow the standards stated in [GL-BRO] and section
12.2 [GL-BRO].
* CPS Section 4.2.1: An organization’s domain and possibly further
attributes such as e-mail addresses are verified by a domain-enquiry in
the official registers (WHOIS). Class 3-2: It is questioned whether the
subscriber has the exclusive control of the domain. The findings are
documented. With EV certificates in addition a review of the domain name
for known phishing domains of blacklists is carried out. Domains that
are not subject to registration (non Top-Level Domains) are not allowed.
* EV Policy OID: 1.3.6.1.4.1.4788.2.202.1
* Root Cert URLs:
https://www.d-trust.net/cgi-bin/D-TRUST_Root_Class_3_CA_2_2009.crt
https://www.d-trust.net/cgi-bin/D-TRUST_Root_Class_3_CA_2_EV_2009.crt
* Test Websites:
https://certdemo-ov-valid.ssl.d-trust.net
https://certdemo-ev-valid.ssl.d-trust.net
* CRL
http://www.d-trust.net/crl/d-trust_root_class_3_ca_2_2009.crl
http://www.d-trust.net/crl/d-trust_root_class_3_ca_2_ev_2009.crl
NextUpdate: 7 days
CPS section 2.3: Even if no revocation has occurred in the meantime, the
CSP publishes a new CRL every day.
* OCSP
http://root-c3-ca2-2009.ocsp.d-trust.net
http://ssl-c3-ca1-2009.ocsp.d-trust.net
http://root-c3-ca2-ev-2009.ocsp.d-trust.net
http://ssl-c3-ca1-ev-2009.ocsp.d-trust.net
Comment #24: “Our responder just gives real time certificate status
answers, we do not practice OCSP stapeling or similar - so, expiration
time is immediately after response.”
* Audit: Audits are performed against the ETSI TS 102 042 criteria by
TUVIT, and the ETSI certificates are posted on the TUVIT website.
https://www.tuvit.de/en/certification-overview-1265_trusted-site-etsi-certificates-1334_ENX_HTML.htm
Annual surveillance audits are performed by TUVIT, and the ETSI
certificates are updated annually to reflect this.
https://www.tuvit.de/data/content_data/tuevit_en/6719UE_s.pdf
https://www.tuvit.de/data/content_data/tuevit_en/6720UE_s.pdf (EV)
* Potentially Problematic Practices – None Noted
(
http://wiki.mozilla.org/CA:Problematic_Practices):
This begins the discussion of the request from D-TRUST to add the
“D-TRUST Root Class 3 CA 2 2009” and “D-TRUST Root Class 3 CA 2 EV 2009”
root certificates to NSS. The request is to turn on the Websites trust
bit for both root certs, and to enable EV for the “D-TRUST Root Class 3
CA 2 EV 2009” root cert.
At the conclusion of this discussion I will provide a summary of issues
noted and action items. If there are outstanding issues, then an
additional discussion may be needed as follow-up. If there are no
outstanding issues, then I will recommend approval of this request in
the bug.
Kathleen