On 04/16/2012 12:39 PM, From Gervase Markham:
> Well, not quite. There is DV, which is defined by a long document (the
> BRs), there's EV, which is defined by a long document (the EV
> Guidelines), and then there's OV, which is 'defined' by one paragraph
> in the BRs, which effectively says "do make sure this info is right,
> chaps, OK?".
11.2 Verification of Subject Identity Information
If the Applicant requests a Certificate that will contain Subject
Identity Information comprised only of the
countryName field, then the CA SHALL verify the country associated with
the Subject using a verification process
meeting the requirements of Section 11.2.5 and that is described in the
CA’s Certificate Policy and/or Certification Practice Statement. If the
Applicant requests a Certificate that will contain the countryName field
and other Subject Identity Information, then the CA SHALL verify the
identity of the Applicant, and the authenticity of the Applicant
Representative’s certificate request using a verification process
meeting the requirements of this Section 11.2 and that is described in
the CA’s Certificate Policy and/or Certification Practice Statement. The
CA SHALL inspect any document relied upon under this Section for
alteration or falsification.
Forum Guideline CA / Browser Forum Baseline Requirements, v. 1.0 15
11.2.1 Identity
If the Subject Identity Information is to include the name or address of
an organization, the CA SHALL verify the
identity and address of the organization and that the address is the
Applicant’s address of existence or operation.
The CA SHALL verify the identity and address of the Applicant using
documentation provided by, or through
communication with, at least one of the following:
1. A government agency in the jurisdiction of the Applicant’s legal
creation, existence, or recognition;
2. A third party database that is periodically updated, which the CA has
evaluated in accordance with Section
11.6;
3. A site visit by the CA or a third party who is acting as an agent for
the CA; or
4. An Attestation Letter.
The CA MAY use the same documentation or communication described in 1
through 4 above to verify both the
Applicant’s identity and address.
Alternatively, the CA MAY verify the address of the Applicant (but not
the identity of the Applicant) using a utility
bill, bank statement, credit card statement, government-issued tax
document, or other form of identification that
meets the requirements of Section 11.6.
11.2.2 DBA/Tradename
If the Subject Identity Information is to include a DBA or tradename,
the CA SHALL verify the Applicant’s right to
use the DBA/tradename using at least one of the following:
1. Documentation provided by, or communication with, a government agency
in the jurisdiction of the
Applicant’s legal creation, existence, or recognition;
2. Documentation or communication provided by a third party source that
meets the requirements of Section
11.6;
3. Communication with a government agency responsible for the management
of such DBAs or tradenames;
4. An Attestation Letter accompanied by documentary support that meets
the requirements of Section 11.6; or
5. A utility bill, bank statement, credit card statement,
government-issued tax document, or other form of
identification that meets the requirements of Section 11.6.
11.2.3 Authenticity of Certificate Request
If the Applicant for a Certificate containing Subject Identity
Information is an organization, the CA SHALL use a
Reliable Method of Communication to verify the authenticity of the
Applicant Representative’s certificate request.
The CA MAY use the sources listed in section 11.2.1 to verify the
Reliable Method of Communication. Provided
that the CA uses a Reliable Method of Communication, the CA MAY
establish the authenticity of the certificate
request directly with the Applicant Representative or with an
authoritative source within the Applicant’s
organization, such as the Applicant’s main business offices, corporate
offices, human resource offices, information technology offices, or
other department that the CA deems appropriate.
In addition, the CA SHALL establish a process that allows an Applicant
to specify the individuals who may request
Certificates. If an Applicant specifies, in writing, the individuals who
may request a Certificate, then the CA
SHALL NOT accept any certificate requests that are outside this
specification. The CA SHALL provide an
Applicant with a list of its authorized certificate requesters upon the
Applicant’s verified written request.
11.2.4 Verification of Individual Applicant
If an Applicant subject to this Section 11.2 is a natural person, then
the CA SHALL verify the Applicant’s name,
Applicant’s address, and the authenticity of the certificate request.
Forum Guideline
CA / Browser Forum Baseline Requirements, v. 1.0 16
The CA SHALL verify the Applicant’s name using a legible copy, which
discernibly shows the Applicant’s face, of
at least one currently valid government-issued photo ID (passport,
drivers license, military ID, national ID, or
equivalent document type). The CA SHALL inspect the copy for any
indication of alteration or falsification.
The CA SHALL verify the Applicant’s address using a form of
identification that meets Section 11.6, such as a
government ID, utility bill, or bank or credit card statement. The CA
MAY rely on the same government-issued ID
that was used to verify the Applicant’s name.
The CA SHALL verify the certificate request with the Applicant using a
Reliable Method of Communication.
11.2.5 Verification of Country
If the subject:countryName field is present, then the CA SHALL verify
the country associated with the Subject
using one of the following: (a) the IP Address range assignment by
country for either (i) the web site’s IP address, as indicated by the
DNS record for the web site or (ii) the Applicant’s IP address; (b) the
ccTLD of the requested
Domain Name; (c) information provided by the Domain Name Registrar; or
(d) a method identified in Section
11.2.1. The CA SHOULD implement a process to screen proxy servers in
order to prevent reliance upon IP
addresses assigned in countries other than where the Applicant is
actually located.
11.5 High Risk Requests
The CA SHALL identify high risk certificate requests, and conduct such
additional verification activity, and take
such additional precautions, as are reasonably necessary to ensure that
such requests are properly verified under these Requirements.
The CA MAY identify high risk requests by checking appropriate lists of
organization names that are most
commonly targeted in phishing and other fraudulent schemes, and by
automatically flagging certificate requests that match these lists for
further scrutiny before issuance. Examples of such lists include:
internal databases maintained by the CA that include previously revoked
Certificates and previously rejected certificate requests due to
suspected phishing or other fraudulent usage.
The CA SHALL use information identified by the CA’s high-risk criteria
to flag suspicious certificate requests. The
CA SHALL follow a documented procedure for performing additional
verification of any certificate request flagged
as suspicious or high risk.
11.6 Data Source Accuracy
Before relying on a data source to verify Subject Identity Information,
the CA SHALL evaluate the data source’s
accuracy and reliability. The CA SHALL NOT use a data source to verify
Subject Identity Information if the CA’s
evaluation determines that the data source is not reasonably accurate or
reliable.
--
Regards
Signer: Eddy Nigg, StartCom Ltd.
XMPP:
star...@startcom.org
Blog:
http://blog.startcom.org/
Twitter:
http://twitter.com/eddy_nigg