E-Tugra has applied to include the “E-Tugra Certification Authority”
root certificate, turn on the Websites and Code Signing trust bits, and
enable EV treatment. This SHA-256 root will eventually replace the “EBG
Elektronik Sertifika Hizmet Sağlayıcısı” root that was included via
Bugzilla Bug #443653.
E-Tugra is a privately owned, commercial CA operating in Ankara, Turkey,
with customers from all geographic areas within Turkey. E-TUGRA has been
certified as one of the four authorized CAs that issues qualified
certificates as well as SSL and code signing of certificates to public
in Turkey.
The request is documented in the following bug:
https://bugzilla.mozilla.org/show_bug.cgi?id=877744
And in the pending certificates list here:
http://www.mozilla.org/projects/security/certs/pending/#E-Tugra
Summary of Information Gathered and Verified:
https://bugzilla.mozilla.org/attachment.cgi?id=784704
Noteworthy points:
* The primary documents are as follows:
Document Repository:
http://www.e-tugra.com.tr/CPS
CPS (English):
http://www.e-tugra.com.tr/Portals/3/engdoc/E-Tugra_SUE_v3.0_8_EN.pdf
CP (English):
http://www.e-tugra.com.tr/Portals/3/engdoc/E-Tugra_SI_v3.0_8_EN.pdf
* CA Hierarchy: This root will be used to issue internally-operated
SubCAs. The subCA certs may be downloaded from
http://www.e-tugra.com/crt/
- “E-Tuğra Nitelikli Elektronik Sertifika Hizmet Sağlayıcısı v2” --
Issues Qualified Certificates
- “E-Tugra Domain Validated CA” -- Issues DV SSL Certificates
- “E-Tugra Organization Validated CA” -- Issues OV SSL
- “E-Tugra Organization Validated CA” -- Issues EV SSL Certificates
* The request is to turn on the Websites and Code Signing trust bits,
and enable EV treatment.
** CPS Section 3.2.2 Authentication of Organization Identity
Premium SSL and CSC (CSC = Code Signing Certificate)
The name and the title of the legal entity are verified on the basis of
official documents of the country of residence of the applicant
according to e-tuğra procedures. The e-mail address submitted by the
authorized person who conducts the application process on behalf of the
certificate owner should be verified by the authorized person. This
verification process is done by sending a distinguished user name and
activation code to the e-mail address of the authorized person.
EV SSL and EV CSC
In verification of EV SSL applications at least the following conditions
should be met:
- The name or the title, legal existence and physical existence of the
legal entity which will take place in the certificate are verified
according to the official documents of the country of residence of the
applicant. In addition to this verification, circular of signature or
another valid official document in applicable legislation is required in
order to show that certificate applicant is authorized to represent the
legal entity and to sign.
- The operational continuity of the certificate applicant is confirmed
by a current official document presented by a public institution or by a
legally authorized person to settle the official document.
- The address of the central office of the legal entity of the
certificate applicant is verified according to the legal documents of
the country of residence. Moreover, telephone numbers, submitted by the
certificate applicant in application forms are cross-checked by legal
records. The applicant is called from the verified telephone number in
order to confirm the application.
- The e-mail address submitted by the authorized person who conducts the
application process on behalf of the certificate applicant should be
verified. This verification is achieved by sending a verification e-mail
message to the authorized person.
- The domain name which will take place in the certificate should belong
to the legal entity or the right and authority to use the domain name
should be given to the legal entity by the domain name’s registered owner.
- All of the conditions to be met in the verification of the identity of
the legal entity in EV SSL certificate applications and the verification
process are conducted according to the “Guidelines for Issuance and
Management of Extended Validation Certificates” published by “CA/Browser
Forum”.
** CPS Section 3.2.5: For Standard SSL, the verification of domain name
authority is made by a successful confirmation answer received from the
contact information of the person in WHOIS records or from addresses
webmaster@<domain_name>, postmaster@<domain_name>, admin@<domain_name>,
administrator@<domain_name>, hostmaster@<domain_name>.
For Premium SSL, there is a need for an official document to support
that the applicant has the authority to act on behalf of the legal entity.
For EV SSL, procedures prepared according to the “Guidelines for
Issuance and Management of Extended Validation Certificates” published
by “CA/Browser Forum” are applied.
** CPS Section 4.1.2: The applications of Standard SSL, Premium SSL and
EV SSL are all done via e-tuğra’s web site. The generation of public and
private key is done by the applicant. During the application the
applicant uploads the CSR necessary for the certificate generation to
the system. After the completion of the application, a private code is
sent to the e-mail address of manager or technical department which
takes place in DNS records in order to verify the Domain Name.
For Premium SSL and EV SSL, documents published on e-tuğra’s web site
are delivered or sent to one of e-tuğra’s RAs together with the
documents showing the authority of the application officials authorized
by the application owner. The application process is ended by inspection
and verification of documents according to e-tuğra procedures.
** CPS Section 4.1.2: The application for “CSC” is done via e-tuğra’s
website. The generation of public and private key is done by the
applicant. During the application the applicant installs the CSR
necessary for the certificate generation to the system. After the
completion of the application, a private code is sent to the e-mail
address provided at the time of application approval.
Documents published on e-tuğra’s website are delivered or sent to one of
e-tuğra’s RAs. The application process is ended by inspection and
verification of documents according to e-tuğra procedures.
* EV Policy OID: 2.16.792.3.0.4.1.1.4
* Root Cert URL:
http://www.e-tugra.com.tr/crt/Etugra_Root.crt
* Test Website:
https://sslev.e-tugra.com.tr
https://sslov.e-tugra.com.tr
https://ssldv.e-tugra.com.tr
* CRL
http://crl.e-tugra.com/etugra_root.crl
http://crl.e-tugra.com/etugra_ssldv.crl (NextUpdate: 24 hours)
http://crl.e-tugra.com/etugra_sslov.crl (NextUpdate: 24 hours)
http://crl.e-tugra.com/etugra_sslev.crl (NextUpdate: 24 hours)
CPS 2.3: CRLs for subCAs are published every 6 (six) hours, 4 (four)
times a day and with a validity time of 24 (twenty four) hours.
* OCSP
http://ocsp.e-tugra.com/status/ocsp
The OCSP response is never cached, no nextUpdate.
* Audit: Annual audits are performed BSI Group The Netherlands B.V.,
according to the ETSI TS 102 042 2.4.1 - SSL NCP-PTC-BR & EV-CP criteria.
Auditor Website:
https://pgplus.bsigroup.com/CertificateValidation/CertificateValidator.aspx?CertificateNumber=ETS+025&ReIssueDate=29%2f07%2f2013&Template=cemea_en
Audit Report:
https://bugzilla.mozilla.org/attachment.cgi?id=784393
* Potentially Problematic Practices – none noted
(
http://wiki.mozilla.org/CA:Problematic_Practices)
This begins the discussion of the request from E-Tugra to include the
“E-Tugra Certification Authority” root certificate, turn on the Websites
and Code Signing trust bits, and enable EV treatment. At the conclusion
of this discussion I will provide a summary of issues noted and action
items. If there are outstanding issues, then an additional discussion
may be needed as follow-up. If there are no outstanding issues, then I
will recommend approval of this request in the bug.
Kathleen