ANSSI has applied to add the SHA256-RSA4096 root certificate of the
French Government CA, “IGC/A AC racine Etat francais” and turn on all
three trust bits. The SHA1-RSA2048 root certificate of the French
Government CA is currently included in NSS (bug #368970).
ANSSI (Agence nationale de la sécurité des systèmes d'information) is
the French Network and Information Security Agency, a part of the French
Government. It issues certificates for French Government websites, which
are used by the general public.
The request is documented in the following bug:
https://bugzilla.mozilla.org/show_bug.cgi?id=693450
And in the pending certificates list here:
http://www.mozilla.org/projects/security/certs/pending/#ANSSI%20(Government%20of%20France)
Summary of Information Gathered and Verified:
https://bugzilla.mozilla.org/attachment.cgi?id=667137
Noteworthy points:
* The primary documents are the Référentiel Général de Sécurité (RGS)
and CP documents for each type of certificate issued, which are in French.
RGS Documents:
http://www.ssi.gouv.fr/fr/reglementation-ssi/referentiel-general-de-securite/
IGCA-PC:
http://www.ssi.gouv.fr/IMG/pdf/IGCA_PC_v2-1.pdf
CP for SSL/TLS authentication certs:
http://www.ssi.gouv.fr/IMG/pdf/RGS_PC-Type_Authentification_Serveur_V2-3.pdf
CP for e-sign certs for servers:
http://www.ssi.gouv.fr/IMG/pdf/RGS_PC-Type_Cachet_V2_3.pdf
CP for email certs for people working for the Foreign Affairs Ministry:
http://crl.diplomatie.gouv.fr/AC_Utilisateurs/AC_UTILISATEURS_PC_Signature_Agent_V1.5.pdf
CP for email certs for people working for another Administration working
with the Foreign Affairs Ministry:
http://crl.diplomatie.gouv.fr/AC_Utilisateurs/AC_UTILISATEURS_PC_Signature_Externe_V1.3.pdf
Variables de Temps:
http://www.ssi.gouv.fr/IMG/pdf/RGS_Variables_de_temps_V2-3.pdf
IGC/A FAQ:
http://www.ssi.gouv.fr/fr/menu/pied-de-page/aide-et-accessibilite/foire-aux-questions/faq-igc-a.html
CA Hierarchy Diagram:
https://bugzilla.mozilla.org/attachment.cgi?id=566036
(Note that another subCA has been created for Ministère de l'Intérieur.)
The IGC/A root issues subordinate CAs for government or administrative
organizations only. All subCAs are operated by French governmental IT
services and controlled by ISS services. Each of the subordinate CAs may
issue end-entity certificates or additional subordinate CAs to be used
for divisions within that organization. Each organization is required to
follow the CP and the Government RGS, and be audited.
The request is to turn on all three trust bits.
* Organizational verification is described in IGCA-PC section 3.2.
Translations:
3.2.2, Validating the identity of the administrative authority (AA)
… The AE of the IGC/A verifies that AA is an administrative authority
within the scope of application of this PC. If the information provided
was incomplete or insufficient to identify the AA, AE may request
additional information from the applicant (for example references a
decree specifying the public service mission or ministry AA, the
directory of the French administration, etc..), or contact a trusted
third party can identify the AA (eg Ministry of HFD or HFDS).
3.2.4 Validation of the identity of the applicant, agent or witness
3.2.6 Validation of Authority of Applicant
The AE of the IGC/A can contact the FSSI, the HFD or HFDS a relevant
ministry to ensure the authority of the applicant with the AA concerned
by the application.
* CP for SSL/TLS authentication certs:
** Page 25: The recording of a server to which a certificate must be
delivered is made via the recording of the corresponding RCAS (i.e.
person responsible for the use of the certificate).
The RCAS will have to demonstrate that the name of the domain included
in the FQDN of the server belongs really to the entity represented by
the RCAS.
A RCAS can be brought to change during the current validity of the SSL
certificate of the corresponding server. In that case, every new RCAS
also has to be the object of a recording procedure.
The recording of a RCAS, and a corresponding IT server, can be made
either directly with the registration authority (RA), or via a
representative of certification of the entity (called MC). In the last
case the MC must be beforehand recorded by the RA."
** Page 26: In order for a certificate request to be accepted, the
request must include at least:
- A written certificate request, dated less than 3 months, signed by a
legal representative of the entity, mentioning FQDN concerned ;
- A mandate dated less than 3 months, appointing the future RCAS as
being authorized to be RCAS for the one or many machines on which will
be deployed the SSL certificate. This mandate must be signed by a legal
representative of the entity and signed jointly, for acceptance, by the
future RCAS;
- A document, valid the day of recording, mentioning delegation or
sub-delegation of the authority responsible for the administrative entity ;
- An official document of identity (id card or passport) of current
validity, of the future RCAS, containing a photo, which is presented to
the RA which keeps a copy ;
- A proof of ownership by the entity of the FQDN of the server;
- The e-mail address allowing the RA to contact the RCAS ;
- The general conditions of use signed.
** Comment: In addition, French governmental servers must have .
gouv.fr
domain names, and these domain names are given through a restricted
manual procedure. Then there is at least a double control of the ability
of a RCAS to manage SSL certificate.
* CP for email certs for people working for the Foreign Affairs Ministry:
** Section 3.1.2: email address must be of the form
surnam...@diplomatie.gouv.fr
** Section 4.1.2: Information required:
- The certificate profile;
- The full name of the bearer;
- The unique identifier (logon at OROBAS);
- The agent code (identifier at OROBAS);
- The email address of the bearer.
** Section 4.2.1: Validation of the certificate subscriber is done by
checking the database AROBAS, containing all agents’ e-mail addresses.
** Comment: According to IGCA-PC, as far as end entities are
administrative agents, the e-mail addresses are stored in Active or
e-mail servers directories. PKI refers to these directories for a
technical verification. An organizational verification is lead also by
the subscriber hierarchy, which validates the certification request, and
by the RA which is often the IT service.
* CP for email certs for people working for another Administration
working with the Foreign Affairs Ministry:
** Section 3.1.2: email address must be of the form
surnam...@domaine.fr
* Section 3.2.2: The identity of entities is verified. Indeed, carriers
are using their certificate(s) as part of their business within their
entity to which they depend and can legally bind that entity.
Certificates are issued only to holders belonging to entities related to
the Ministry (eg Matignon, Elysee, other department).
** Section 3.2.5: Validation of the authority of the Trustee shall be
effected by the Registration Authority.
** Section 4.1.2: Information required:
- The certificate profile;
- The full name of the bearer;
- The email address of the bearer.
- The connecting entity.
** Section 4.2.1: Validation of the certificate request is based on
prior knowledge by the EA that the representative is authorized to
forward requests of certificates.
* EV treatment is not requested.
* Root Cert URL:
http://www.ssi.gouv.fr/IMG/crt/igcaRSA4096-072011.crt
* Test Website:
https://test4096.igc.agriculture.gouv.fr/
* CRL
http://www.ssi.gouv.fr/fr/sigelec/igca/revocation/igca4096.crl
http://igc-crl.agriculture.gouv.fr/crl/crl-ac-serveurs-standard.crl
(NextUpdate: 6 days)
Variables de Temps document: F_PUB_LCR = Minimal frequency of
publication of the CRL = 72 hours or 24h)
* OCSP: Not provided.
* Audit: The audits are done by the French Secretariat Général de la
Défense Nationale, which acts as the French national security authority,
according to the ETSI TS 102042 criteria.
http://www.ssi.gouv.fr/site_rubrique31.html
http://www.ssi.gouv.fr/fr/anssi/services-securises/igc-a/attestation-audits.html
https://bug666771.bugzilla.mozilla.org/attachment.cgi?id=661038
* Potentially Problematic Practices – None Noted
(
http://wiki.mozilla.org/CA:Problematic_Practices):
This begins the discussion of the request from ANSSI to add the “IGC/A
AC racine Etat francais” root certificate and turn on all three trust
bits. At the conclusion of this discussion I will provide a summary of
issues noted and action items. If there are outstanding issues, then an
additional discussion may be needed as follow-up. If there are no
outstanding issues, then I will recommend approval of this request in
the bug.
Kathleen