TÜRKTRUST has applied to add the “TÜRKTRUST Elektronik Sertifika Hizmet
Sağlayıcısı” root certificate, turn on the websites and code signing
trust bits, and enable EV.
TÜRKTRUST Information Security Services Inc. is an IT company based in
Turkey. TÜRKTRUST is an authorized qualified electronic certificate
service provider according to the Turkish Electronic Signature Law.
TÜRKTRUST issues qualified certificates, time-stamping services, SSL
certificates, and object signing certificates.
The request is documented in the following bug:
https://bugzilla.mozilla.org/show_bug.cgi?id=433845
And in the pending certificates list here:
http://www.mozilla.org/projects/security/certs/pending/#TURKTRUST
Summary of Information Gathered and Verified:
https://bugzilla.mozilla.org/attachment.cgi?id=621695
Noteworthy points:
* The primary documents are the CP and CPS, which are provided in English.
Document Repository:
http://www.turktrust.com.tr/en/bilgideposu.html
CP:
http://www.turktrust.com.tr/en/files/bilgidepo/TURKTRUST_CP_V-05_%5BEN%5D_(01.11.2011).pdf
CPS:
https://bugzilla.mozilla.org/attachment.cgi?id=612540
This is an offline root with internally-operated subordinate CAs which
sign end-entity certificates. The subCAs are:
1) “TÜRKTRUST Nitelikli Elektronik Sertifika Hizmetleri” -- Issues
Qualified Certificates
2) “TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri”– Issues
SSL Certificates
3) “TÜRKTRUST EV SSL Sunucu Sertifikası Hizmetleri H3 - Sürüm 2” –
Issues EV SSL Certificates
The request is to turn on the websites and code signing trust bits.
* CPS section 1: As regards to SSL (Secure Socket Layer) Certificate, EV
(Extended Validation) SSL Certificate and OSC (Object Signing
Certificate) services, TURKTRUST conforms to the current version of the
CA/Browser Forum Guidelines for Issuance and Management of Extended
Validation Certificates published at
http://www.cabforum.org and “ETSI
TS 102 042 Electronic Signatures Infrastructure (ESI); Policy
Requirements for Certification Authorities Issuing Public Key
Certificates”.
* CPS section 1.2:
- SSL Certificates are issued and maintained in conformity with
“Normalized Certificate Policy” defined in ETSI TS 102 042.
- OSC is issued and maintained in conformity with “Normalized
Certificate Policy” defined in ETSI TS 102 042.
- EV SSL certificates are issued and maintained in conformity with
“Extended Validity Certificate Policy” defined in ETSI TS 102 042.
* CPS section
3.1.5.4: DN in TURKTRUST OSC is formed as below:
-- “CN” contains complete name of the subscriber, which is based on the
official documentation according to the legislation of residence. --
“SERIALNUMBER” contains a trade registration number or code of the
subscriber, where the number or code is based on the official
documentation according to the legislation of residence.
* CPS section
3.2.2.1: The name of legal entity is verified against the
official documents of the country of residence of the applicant.
Verification herein is executed according to the TURKTRUST procedures.
The e-mail address submitted by the authorized person who conducts the
application operations on behalf of the subscriber should be verified.
This verification is done with a unique user name and activation code
sent to the authorized person’s e-mail address.
* CPS section 3.2.5: In cases where the name of a legal entity is to be
contained in a certificate, the applicant must submit an official
document showing the authority of the applicant to act on behalf of the
legal entity.
The request is to also enable EV.
* CPS section
3.2.2.2: In verification of an EV SSL application, minimum
criteria to be met are as follows:
- The name of legal entity is verified against the official documents of
the country of residence of the applicant. Additional to this
verification, circular of signature or an equivalent official document
in applicable legislation, showing the authority of the applicant to act
on behalf of the legal entity is required.
- Operational existence of the legal entity is confirmed via a third
party, who is a buyer of a product or service of the legal entity. Where
possible, an official document, obtained from a public agency or a
legally authorized person to do so, proving the operational existence
suffices to verify.
- Address of the legal entity’s place of business is verified according
to the legal documents of the country of residence. Moreover, telephone
numbers, submitted by the applicant, are checked if they are exactly
matched with the official records. In case of mismatch, correction is
required. Verified telephone is the called for applicant to confirm the
application.
- The e-mail address submitted by the authorized person who conducts the
application operations on behalf of the subscriber should be verified.
This verification is done with a unique user name and activation code
sent to the authorized person’s e-mail address.
- The following conditions should be met as well:
-- The legal entity is the owner of the DNS registry, or
-- The legal entity is given the exclusive right and authority to use the
DNS name.
All conditions that apply for authentication of legal entity for an EV
SSL applicant are given in Appendix. Given the conditions here, the
process of authentication of legal persons is conducted according to the
TURKTRUST procedures.
* CPS Appendix 6.I: To verify the Applicant’s registration, or exclusive
control, of the Domain Name(s) to be listed in the EV Certificate,
TURKTRUST verifies that each such Domain Name is registered with an
Internet Corporation for Assigned Names and Numbers (ICANN)- approved
registrar or a registry listed by the Internet Assigned Numbers
Authority (IANA). For Government Entity Applicants, TURKTRUST relies on
the Domain Name listed for that entity in the records of the QGIS in the
Applicant’s Jurisdiction.
TURKTRUST compares any registration information that is publicly
available from the WHOIS database with the verified Subject organization
information and confirms that it is neither misleading nor inconsistent.
TURKTRUST further confirms that the Applicant is aware of its
registration or exclusive control of the Domain Name.
* EV Policy OID: 2.16.792.3.0.3.1.1.5
* Root Cert URL:
http://www.turktrust.com.tr/sertifikalar/TURKTRUST_Elektronik_Sertifika_Hizmet_Saglayicisi_s3.crt
* Test Website:
https://evssl.turktrust.com.tr
* CRL
http://www.turktrust.com.tr/sil/TURKTRUST_Kok_SIL_s3.crl
http://www.turktrust.com.tr/sil/TURKTRUST_SSL_SIL_s3.crl
http://www.turktrust.com.tr/sil/TURKTRUST_EV_SSL_H3_S2.crl
CPS Section 4.10.1: TURKTRUST publishes CRL twice a day within 12
(twelve) hour intervals with a validity period of 24 (twentyfour) hours
even if there is no change in the status of certificates.
* OCSP
http://ocsp.turktrust.com.tr
* Audit: Audits are performed by the Turkish Information and
Communication Technologies Authority (ICTA) and the BSI Group The
Netherlands B.V. according to the ETSI TS 101 456 and ETSI TS 102 042 -
SSL NCP & EV-CP criteria. TURKTRUST is listed as an Electronic
Certificate Service Provider and a statement from ICTA is provided here:
http://www.btk.gov.tr/bilgi_teknolojileri/elektronik_imza/eshs.php
The ETSI certificate from BSI was attached to the bug,
https://bugzilla.mozilla.org/attachment.cgi?id=585759.
TURKTRUST is also listed as a certified provider on the BSI website, and
can be found using “ETS 019” as the Certificate Number:
http://www.bsigroup.com/en/Assessment-and-certification-services/Client-directory/CertificateClient-Directory-Search/
* Potentially Problematic Practices
(
http://wiki.mozilla.org/CA:Problematic_Practices):
** External Registration Authorities may be used.
* CPS 1.3.2: Registration authorities are CA units that offer services
to end users directly such as certificate application, renewal and
revocation. These units establish customer records; perform
identification and authentication processes and direct relevant
certificate requests to issuing certification authorities.
Actions associated with registration centers may be performed by
registration units within the TURKTRUST center in response to
certificate requests arriving from TURKTRUST sales representatives as
well as by registration centers affiliated with TURKTRUST. In both
cases, certificate requests are relayed to the TURKTRUST’s issuing
certification authority and the certificates are issued.
This begins the discussion of the request from TÜRKTRUST to add the
“TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı” root certificate,
turn on the websites and code signing trust bits, and enable EV. At the
conclusion of this discussion I will provide a summary of issues noted
and action items. If there are outstanding issues, then an additional
discussion may be needed as follow-up. If there are no outstanding
issues, then I will recommend approval of this request in the bug.
Kathleen