U.S. Federal PKI Management Authority (US FPKI) has applied to add the
�Federal Common Policy CA� root certificate, and to enable all three
trust bits.
The U.S. FPKI Management Authority is a National Government CA that
operates the Federal Common Policy Framework Certification Authority
(FCPCA) on behalf of the Federal PKI Policy Authority. The FCPCA is the
Trust Anchor for the Federal Government. CAs under the FCPCA issue PKI
credentials to Federal employees and contractors. The FCPCA is also
cross certified with the Federal Bridge Certification Authority which
provides a trusted path to cross certified Federal Agencies, commercial
venders, states governments and other bridges.
The request is documented in the following bug:
https://bugzilla.mozilla.org/show_bug.cgi?id=478418
And in the pending certificates list here:
http://www.mozilla.org/projects/security/certs/pending/#US%20FPKI
Summary of Information Gathered and Verified:
https://bugzilla.mozilla.org/attachment.cgi?id=646686
Noteworthy points:
* All documents are in English.
CP:
http://www.idmanagement.gov/fpkipa/documents/CommonPolicy.pdf
CPS:
http://www.idmanagement.gov/fpkipa/documents/FPKI_CPS_v4_1_Redacted_final_20120515.pdf
* This is the root certificate for the U.S. Federal Common Policy
Framework Certificate Authority (FCPCA). The FCPCA only issues
certificates to subordinate CAs. The sub-CAs are operated by the Shared
Service Providers (SSPs). End-entity certificates may be issued to
Federal employees, contractors, affiliated personnel, and devices
operated by or on behalf of Federal agencies. The list of certified SSPs
is provided on the FPKIPA website,
http://www.idmanagement.gov/pages.cfm/page/Federal-PKI.
** All CAs issuing certificates subordinate to the Federal Common Policy
CA must adhere to the X.509 Certificate Policy For The U.S. Federal PKI
Common Policy Framework, which can be found here:
http://www.idmanagement.gov/fpkipa/documents/CommonPolicy.pdf
** Certified PKI Shared Service Providers (SSP):
http://www.idmanagement.gov/pages.cfm/page/Federal-PKI-Policy-Authority-Shared-Service-Provider-Working-Group-Certified-PKI-Shared-Service-Prov
** Entities cross-certified with FBCA:
http://www.idmanagement.gov/pages.cfm/page/Federal-PKI-Management-Authority-entities-crosscertified-with-the-FBCA
**
http://fpkiapps.icam.pgs-lab.com/fbcaApps shows the output of a tool
that crawls the public repositories starting from the Federal Common
Policy CA root certificate and finds all CA certificates with a valid
path back through the AIAs.
* Federal Legacy CAs are cross-certified with the FCPCA or the FBCA.
CP Section 1.1.4: Except for legacy Federal PKIs, interoperation with
CAs that issue under different policies will be achieved through policy
mapping and cross-certification through the Federal Bridge Certification
Authority. Legacy Federal PKIs may perform policy mapping and cross-
certification with either the Common Policy Root CA or Federal Bridge
Certification Authority at their discretion.
* The request is to enable all three trust bits
** In-person identification of human subscribers is required, and all
certificates are manually processed.
** CP section 1.3.4: For this policy, subscribers are limited to Federal
employees, contractors, affiliated personnel, and devices operated by or
on behalf of Federal agencies.
** CP section 3.2.2: Requests for CA certificates shall include the CA
name, address, and documentation of the existence of the CA. Before
issuing CA certificates, an authority for the issuing CA shall verify
the information, in addition to the authenticity of the requesting
representative and the representative�s authorization to act in the name
of the CA.
** CP section
3.2.3.1: The RA shall ensure that the applicant�s identity
information is verified. Identity shall be verified no more than 30 days
before initial certificate issuance. At id-fpki-common-High, the
applicant shall appear at the RA in person. For all other policies, RAs
may accept authentication of an applicant�s identity attested to and
documented by a trusted agent to support identity proofing of remote
applicants, assuming agency identity badging requirements are otherwise
satisfied. Authentication by a trusted agent does not relieve the RA of
its responsibility to perform steps 1), 2), the verification of
identifying information (e.g., by checking official records) in step 3),
and the maintenance of biometrics in step 4), below.
At a minimum, authentication procedures for employees must include the
following steps:
1) Verify that a request for certificate issuance to the applicant was
submitted by agency management.
2) Verify Applicant�s employment through use of official agency records.
3) Establish applicant�s identity by in-person proofing before the
registration authority, based on either of the following processes:
a) Process #1:
i) The applicant presents a government-issued form of identification
(e.g., an Agency ID badge, a passport, or driver�s license) as proof of
identity, and
ii) The RA examines the presented credential for biometric data that can
be linked to the applicant (e.g., a photograph on the credential itself
or a securely linked photograph of applicant), and
iii) The credential presented in step 3) a) i) above shall be verified
by the RA for currency and legitimacy (e.g., the agency ID is verified
as valid). Typically this is accomplished by querying a database
maintained by the organization that issued the credential, but other
equivalent methods may be used.
b) Process #2:
i) The applicant presents a government-issued form of identification
(e.g., an Agency ID badge, a passport, or driver�s license) as proof of
identity, and
ii) The RA examines the presented credential for biometric data that can
be linked to the applicant (e.g., a photograph on the credential itself
or a securely linked photograph of applicant), and
iii) The applicant presents current corroborating information (e.g.,
current credit card bill or recent utility bill) to the RA. The
identifying information (e.g., name and address) on the credential
presented in step 3) b) i) above shall be verified by the RA for
currency and legitimacy (e.g., the agency ID is verified as valid).
Practice Note: This may be accomplished by querying a database
maintained by the organization that issued the financial instrument or
through use of a commercial credit database. In some instances,
commercial credit card databases will validate name and address of
current cardholders on-line; this validation is acceptable if the card
is presented to the RA. Other methods may be accepted.
** CP section
3.2.3.2: Some computing and communications devices
(routers, firewalls, servers, etc.) and software applications will be
named as certificate subjects. In such cases, the device must have a
human sponsor. The sponsor is responsible for providing the following
registration information:
- Equipment identification (e.g., serial number) or service name (e.g.,
DNS name) or unique software application name
- Equipment or software application public keys
- Equipment or software application authorizations and attributes (if
any are to be included in the certificate)
- Contact information to enable the CA or RA to communicate with the
sponsor when required.
The identity of the sponsor shall be authenticated by:
- Verification of digitally signed messages sent from the sponsor using
a certificate issued under this policy; or
- In-person registration by the sponsor, with the identity of the
sponsor confirmed in accordance with the requirements of section 3.2.3.1.
** CP section 3.2.4: Information that is not verified shall not be
included in certificates.
** CP section 3.2.5: Before issuing CA certificates or signature
certificates that assert organizational authority, the CA shall validate
the individual�s authority to act in the name of the organization. For
pseudonymous certificates that identify subjects by their organizational
roles, the CA shall validate that the individual either holds that role
or has been delegated the authority to sign on behalf of the role.
** CP section 4.1: The Certificate application process must provide
sufficient information to:
Establish the applicant�s authorization (by the employing or sponsoring
agency) to obtain a certificate. (per section 3.2.3)
Establish and record identity of the applicant. (per section 3.2.3)
Obtain the applicant�s public key and verify the applicant�s possession
of the private key for each certificate required. (per section 3.2.1)
Verify any role or authorization information requested for inclusion in
the certificate.
These steps may be performed in any order that is convenient for the PKI
Authorities and applicants that does not defeat security, but all must
be completed before certificate issuance.
* EV-enablement is not being requested at this time.
* Root Cert Download:
http://http.fpki.gov/fcpca/fcpca.crt
* Test Website:
https://http.icam.pgs-lab.com
* CRL:
http://http.fpki.gov/fcpca/fcpca.crl
** LDAP In end-entity cert for the test website.
** CP section 4.9.7: CAs that issue certificates to subscribers or
operate on-line must issue CRLs at least once every 18 hours, and the
nextUpdate time in the CRL may be no later than 48 hours after issuance
time (i.e., the thisUpdate time). For legacy Federal PKIs only, the
nextUpdate time in the CRL may be no later than 180 hours after issuance
time (i.e., the thisUpdate time).
* OCSP
** The FPKIMA does not run an OCSP responder for the Common Policy CA
itself.
** AIA Extension in end-entity cert for the test website has OCSP: URI:
http://ocsp.managed.entrust.com/OCSP/EMSSSPCAResponder
** CP section 4.9.9: CAs shall support on-line status checking via OCSP
[RFC 2560] for end entity certificates issued under
id-fpki-common-authentication and id-fpki-common-cardAuth. Where on-line
status checking is supported, status information must be updated and
available to relying parties within 18 hours of certificate revocation.
Where on-line status checking is supported and a certificate issued
under id-fpki-common-High is revoked for key compromise, the status
information must be updated and available to relying parties within 6 hours.
* Audit
** Audit Requirements:
http://www.idmanagement.gov/fpkipa/documents/FPKI_Compliance_Audit_Requirements.doc
** Audit Type: ISO 21188:2006
** Auditor: Slandala, and U. S. General Services Administration Office
of General Counsel
** Auditor Website:
http://slandala.com
** Audit of audit:
http://www.idmanagement.gov/fpkima/documents/FPKI-audit-rev2-2012-jec-signed.pdf
** The ISO document says: Control objectives in the areas of CA
environmental controls, CA key life cycle management controls, and
certificate life cycle management controls are presented in 7.2 to 7.6,
representing baseline control criteria with which a CA shall comply and
against which a CA may be evaluated or audited. Such an evaluation may
take the form of an internal audit or external audit using any
appropriate audit methodology as may be defined by the rules of the
contractual environment.
** The FPKI Compliance Audit Requirements also do not specify a
particular audit methodology that must be used but requires that an
annual audit takes place, that it is done by a qualified independent
auditor, who ensured the CPS conforms to the CP and that operational
practices conform to the CPS. See Appendices C & D of
http://www.idmanagement.gov/fpkipa/documents/FPKI_Compliance_Audit_Requirements.doc
for what the CPWG reviews for all audit letters we receive from the FPKI
SSP and Affiliates.
** The CP that is used for the annual audit of the Federal Common Policy
and all subordinate CAs is the X.509 Certificate Policy for the U.S.
Federal PKI Common Policy Framework. All the cross-certified affiliates
of the FBCA are audited against their own CP which has been mapped to
the FBCA CP. Both of these are fully conformant CPs in RFC 3647 format
so adhere to the controls specified in section 7 and the tables in
section 8 of the ISO standard.
*
https://wiki.mozilla.org/CA:SubordinateCA_checklist
** All subCAs are publicly disclosed and separately audited, with the
audit letters reviewed by the FPKIPA.
** All PKIs participating in the Federal PKI must provide a copy of
their annual audit letter to the Federal PKI Policy Authority.
1) The Federal Common Policy CA is the trust anchor for the Common
Policy CP � its only �subordinate� CAs are the Shared Service Provider
(SSP) CAs which are under contract to GSA to provide PKI services which
follow the Common Policy CP. These subordinate CAs could be considered
Third-Party as they are independently run by other organizations, but
they do not issue certificates to the general public. They are
restricted to issuing certificates to Federal employees, federal devices
and contractors approved by the Federal agency the contractor supports.
2) Although in a sense these might be considered Private or Enterprise
CAs as they are restricted in who they can issue subscriber certificates
to, the reason we want the Federal Common Policy CA in the Mozilla trust
store is because these subscriber certificates may be encountered by a
typical Mozilla user doing business with the US Federal government.
3) The SSP CAs are all required to undergo independent third party
audits on an annual basis. And we disclose the CAs � they are all
listed on the
idmanagement.gov site, as well as in our publicly
available repositories available via both LDAP and HTTP. All SSPs
operating under the Common Policy can only issue certificates to
subordinate CAs that also adhere to the Common Policy CP.
4) The cross-certified CAs are not sub-CAs of Common Policy. However,
they also are required to undergo independent third party audits on an
annual basis and are also disclosed both on
idmanagement.gov and in our
same publicly accessible repositories.
** Publication of CA information in the Entity repositories is a local
decision.
** Shared Service Provider Roadmap:
http://www.idmanagement.gov/fpkipa/documents/SSProadmap.pdf
This Shared Service Provider Roadmap is intended to identify the
background information, phases, and activities related to the selection
process for prospective PKI shared service providers. This document
identifies the process by which a vendor qualifies for inclusion on the
Certified PKI SSP List. It also describes requirements that must be met
to maintain certification, as well as contracting considerations.
** CP section 1.1.2: This CP states what assurance can be placed in a
certificate issued by the CA. The certification practice statement (CPS)
states how the CA establishes that assurance. Each CA that issues
certificates under this CP shall have a corresponding CPS.
CP section 1.1.3: This CP applies to certificates issued to CAs,
devices, and Federal employees, contractors and other affiliated personnel.
*
http://wiki.mozilla.org/CA:Problematic_Practices
** External RAs, and distributing generated private keys.
** CP section 1.3.2: The registration authorities (RAs) collect and
verify each subscriber�s identity and information that is to be entered
into the subscriber�s public key certificate. The RA performs its
function in accordance with a CPS approved by the FPKIPA. The RA is
responsible for:
The identification and authentication process.
** CP section 1.3.3: The trusted agent is a person who satisfies all the
trustworthiness requirements for an RA and who performs identity
proofing as a proxy for the RA. The trusted agent records information
from and verifies biometrics (e.g., photographs) on presented
credentials for applicants who cannot appear in person at an RA. The CPS
will identify the parties responsible for providing such services, and
the mechanisms for determining their trustworthiness.
** CP section 8.1: CAs and RAs operating under this policy shall be
subject to a periodic compliance audit at least once per year. As an
alternative to a full annual compliance audit against the entire CPS,
the compliance audit of CAs and RAs may be carried out in accordance
with the requirements as specified in the Triennial Audit Guidance
document located at
http://www.idmanagement.gov/fpkipa/.
Further, the Federal PKI Policy Authority has the right to require
aperiodic compliance audits of CAs operating under this policy. The
Federal PKI Policy Authority shall state the reason for any aperiodic
compliance audit.
** When CAs or RAs generate keys on behalf of the subscriber, then the
private key must be delivered securely to the subscriber. Private keys
may be delivered electronically or may be delivered on a hardware
cryptographic module. In all cases, the following requirements must be met:
- Anyone who generates a private signing key for a subscriber shall not
retain any copy of the key after delivery of the private key to the
subscriber.
- The private key(s) must be protected from activation, compromise, or
modification during the delivery process.
- The subscriber shall acknowledge receipt of the private key(s).
- Delivery shall be accomplished in a way that ensures that the correct
tokens and activation data are provided to the correct subscribers.
- For hardware modules, accountability for the location and state of the
module must be maintained until the subscriber accepts possession of it.
- For electronic delivery of private keys, the key material shall be
encrypted using a cryptographic algorithm and key size at least as
strong as the private key. Activation data shall be delivered using a
separate secure channel.
- The CA must maintain a record of the subscriber acknowledgment of
receipt of the token.
This begins the first discussion of the request from US FPKI to add the
�Federal Common Policy CA� root certificate, and to enable all three
trust bits.
At the conclusion of this discussion, I will provide a summary of issues
noted and action items. If there are no outstanding issues, then this
request can be approved. If there are outstanding issues or action
items, then an additional discussion may be needed as follow-up.
NOTE: This bug (#478418) has been marked as dependent on bug #651246,
�Make libpkix-based certificate path building/validation the default in
PSM�.
https://bugzilla.mozilla.org/show_bug.cgi?id=478418#c31
�� only the newer libPKIX chain-finding code will be able to find chains
to the root contained in this bug. I haven't checked myself whether this
is true, but if it is, then adding this root to NSS won't help you,
unless Mozilla/NSS is also changed to use the newer code by default. And
using the newer code by default is the subject of bug 651246.�
https://bugzilla.mozilla.org/show_bug.cgi?id=478418#c33
�It's important to note that this is -not- simply a website root, it's
much more geared toward enabling the US federal government PIV program
-- which is designed to extremely strongly authenticate individuals,
even more stringently than the Class 2 CAs we currently have in the program�
Kathleen