A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Updated April 2021 to match BR v. 1.7.4 and Mozilla Root Store Policy v. 2.7.1 | |||||||||||||||||||||||||
2 | CA's Self-Assessment of CP/CPS documents to CA/Browser Forum Baseline Requirements (BRs) | |||||||||||||||||||||||||
3 | Introduction must include: 1) CA's Legal Name 2) Clear indication (subject and SHA1 or SHA256 fingerprints) about which root certificates are being evaluated, and their full CA hierarchy. In considering a root certificate for inclusion in NSS, Mozilla must also evaluate the current subordinate CAs and the selection/approval criteria for future subordinate CAs. Mozilla's CA Certificate Policy requires full disclosure of non-technically-constrained intermediate certificates chaining up to root certificates in NSS. 3) List the specific version(s) of the BRs that you used. For example: BR version 1.4.2, with the exception of the Domain Validation section 3.2.2.4 for which we used BR version 1.4.1. 4) List the specific versions of the CA's documents that were evaluated, and provide direct URLs to those documents. All provided CA documents must be public-facing, available on the CA's website, and translated into English. 5) If you intend to submit your self-assessment with statements such as "will add/update in our next version of CP/CPS", indicate when you plan to provide the updated documents. Note: When you are doing your BR Self Assessment, if you find that the required information is not currently in your CP/CPS documents, then you may indicate what your CA currently does, how it is currently documented, that the next version of your CP/CPS will contain this information, and when the next version of your CP/CPS will be available. | |||||||||||||||||||||||||
4 | ||||||||||||||||||||||||||
5 | ||||||||||||||||||||||||||
6 | BR/RFC 3647 Section Number | List the specific documents and section numbers of those documents which meet the requirements of each BR section | Explain how the CA's listed documents meet the requirements of each BR section. | |||||||||||||||||||||||
7 | 1.2.1. Revisions Note the Effective Date for each item in the table. Certificates created after each Effective Date are expected to be in compliance with the item. Make sure your CA is in compliance with each of these items. After careful consideration, indicate if your CA is fully compliant with all items in the table, or clearly indicate action that your CA is taking to improve compliance. | |||||||||||||||||||||||||
8 | 1.2.2. Relevant Dates Note the Compliance date for each item in the table. Those are the dates by which your CP/CPS and practices are expected to be updated to comply with the item. Make sure your CA is in compliance with each of these items. After careful consideration, indicate if your CA is fully compliant with all items in the table, or clearly indicate action that your CA is taking to improve compliance. | |||||||||||||||||||||||||
9 | 1.3.2. Registration Authorities Indicate whether your CA allows for Delegated Third Parties, or not. Indicate which sections of your CP/CPS specify such requirements, and how the CP/CPS meets the BR requirements for RAs (including non-delegation of domain validation to RAs). | |||||||||||||||||||||||||
10 | 1.5.2 Contact person BR Section 4.9.3 requires that this section 1.5.2 contain clear instructions for reporting suspected Private Key Compromise, Certificate misuse, or other types of fraud, compromise, misuse, inappropriate conduct, or any other matter related to Certificates. | |||||||||||||||||||||||||
11 | 2.1. Repositories Provide the direct URLs to the CA's repositories | |||||||||||||||||||||||||
12 | 2.2 Publication of information - RFC 3647 "The Certificate Policy and/or Certification Practice Statement MUST be structured in accordance with RFC 3647." | |||||||||||||||||||||||||
13 | 2.2 Publication of information - CAA Section 4.2 of a CA's Certificate Policy and/or Certification Practice Statement SHALL state the CA's policy or practice on processing CAA Records for Fully Qualified Domain Names; that policy shall be consistent with these Requirements. It shall clearly specify the set of Issuer Domain Names that the CA recognises in CAA "issue" or "issuewild" records as permitting it to issue. The CA SHALL log all actions taken, if any, consistent with its processing practice. | |||||||||||||||||||||||||
14 | 2.2. Publication of information - BR text "The CA SHALL publicly give effect to these Requirements and represent that it will adhere to the latest published version." --> Copy the specific text that is used into the explanation in this row. (in English) | |||||||||||||||||||||||||
15 | 2.2. Publication of information - test websites "The CA SHALL host test Web pages that allow Application Software Suppliers to test their software with Subscriber Certificates that chain up to each publicly trusted Root Certificate. At a minimum, the CA SHALL host separate Web pages using Subscriber Certificates that are (i) valid, (ii) revoked, and (iii) expired." --> List the URLs to the three test websites (valid, revoked, expired) for each root certificate under consideration. If you are requesting EV treatment, then the TLS cert for each test website must be EV. | |||||||||||||||||||||||||
16 | 2.3. Time or frequency of publication "The CA SHALL ... annually update a Certificate Policy and/or Certification Practice Statement that describes in detail how the CA implements the latest version of these Requirements. The CA SHALL indicate conformance with this requirement by incrementing the version number and adding a dated changelog entry, even if no other changes are made to the document." Indicate your CA's policies/practices to ensure that the BRs are reviewed regularly, and that the CA's CP/CPS is updated annually. | |||||||||||||||||||||||||
17 | 2.4. Access controls on repositories Acknowledge that all Audit, CP, CPS documents required by Mozilla's CA Certificate Policy and the BRs will continue to be made publicly available. | |||||||||||||||||||||||||
18 | 3.2.2.1 Identity If the Subject Identity Information in certificates is to include the name or address of an organization, indicate how your CP/CPS meets the requirements in this section of the BRs. | |||||||||||||||||||||||||
19 | 3.2.2.2 DBA/Tradename If the Subject Identity Information in certificates is to include a DBA or tradename, indicate how your CP/CPS meets the requirements in this section of the BRs. | |||||||||||||||||||||||||
20 | 3.2.2.3 Verification of Country If the subject:countryName field is present in certificates, indicate how your CP/CPS meets the requirements in this section of the BRs. | |||||||||||||||||||||||||
21 | 3.2.2.4 Validation of Domain Authorization or Control Indicate which of the methods of domain validation your CA uses, and where this is described in your CP/CPS. Section 2.2 of Mozilla's Root Store Policy states: "For a certificate capable of being used for SSL-enabled servers, the CA must ensure that the applicant has registered all domain(s) referenced in the certificate or has been authorized by the domain registrant to act on their behalf. This must be done using one or more of the methods documented in section 3.2.2.4 of the CA/Browser Forum Baseline Requirements. The CA's CP/CPS must clearly specify the procedure(s) that the CA employs, and each documented procedure should state which subsection of 3.2.2.4 it is complying with. CAs are not permitted to use 3.2.2.5 (4) ("any other method") to fulfill the requirements of method 3.2.2.4.8 (IP Address)." | Make sure the CP/CPS states what the CA actually does, not what it could do. Such as which of the allowed domain validation methods the CA uses. | ||||||||||||||||||||||||
22 | 3.2.2.4.1 Validating the Applicant as a Domain Contact This method SHALL NOT be used. | This method SHALL NOT be used. | ||||||||||||||||||||||||
23 | 3.2.2.4.2 Email, Fax, SMS, or Postal Mail to Domain Contact If your CA uses this method of domain validation, indicate where in the CP/CPS it is described, and how your CA meets the requirements in this section of the BRs. | |||||||||||||||||||||||||
24 | 3.2.2.4.3 Phone Contact with Domain Contact This method has been replaced by 3.2.2.4.15 and SHALL NOT be used. (Validations completed as of 31-May-2019 may be used until 20-August-2021.) | This method SHALL NOT be used. | ||||||||||||||||||||||||
25 | 3.2.2.4.4 Constructed Email to Domain Contact If your CA uses this method of domain validation, indicate where in the CP/CPS it is described, and how your CA meets the requirements in this section of the BRs. | |||||||||||||||||||||||||
26 | 3.2.2.4.5 Domain Authorization Document "This method SHALL NOT be used." | This method SHALL NOT be used. | ||||||||||||||||||||||||
27 | 3.2.2.4.6 Agreed‐Upon Change to Website Replaced with BR section 3.2.2.4.18 (effective 3/3/2020) | This method SHALL NOT be used. | ||||||||||||||||||||||||
28 | 3.2.2.4.7 DNS Change If your CA uses this method of domain validation, indicate where in the CP/CPS it is described, and how your CA meets the requirements in this section of the BRs. | |||||||||||||||||||||||||
29 | 3.2.2.4.8 IP Address If your CA uses this method of domain validation, indicate where in the CP/CPS it is described, and how your CA meets the requirements in this section of the BRs. | |||||||||||||||||||||||||
30 | 3.2.2.4.9 Test Certificate "This method SHALL NOT be used." | This method SHALL NOT be used. | ||||||||||||||||||||||||
31 | 3.2.2.4.10. TLS Using a Random Number If your CA uses this method of domain validation, indicate where in the CP/CPS it is described, and how your CA meets the requirements in this section of the BRs. This subsection contains major vulnerabilities. If the CA uses this method, then the CA should describe how they are mitigating those vulnerabilities. If not using this method, the CPS should say so. | Further explanation is required if this method is used. | ||||||||||||||||||||||||
32 | 3.2.2.4.11 Any Other Method "This method SHALL NOT be used." | This method SHALL NOT be used. | ||||||||||||||||||||||||
33 | 3.2.2.4.12 Validating Applicant as a Domain Contact "This method may only be used if the CA is also the Domain Name Registrar, or an Affiliate of the Registrar, of the Base Domain Name." If your CA uses this method of domain validation, indicate where in the CP/CPS it is described, and how your CA meets the requirements in this section of the BRs. | Use of this method is restricted, per the BRs. | ||||||||||||||||||||||||
34 | 3.2.2.4.13 Email to DNS CAA Contact If your CA uses this method of domain validation, indicate where in the CP/CPS it is described, and how your CA meets the requirements in this section of the BRs. | |||||||||||||||||||||||||
35 | 3.2.2.4.14 Email to DNS TXT Contact If your CA uses this method of domain validation, indicate where in the CP/CPS it is described, and how your CA meets the requirements in this section of the BRs. | |||||||||||||||||||||||||
36 | 3.2.2.4.15 Phone Contact with Domain Contact If your CA uses this method of domain validation, indicate where in the CP/CPS it is described, and how your CA meets the requirements in this section of the BRs. | |||||||||||||||||||||||||
37 | 3.2.2.4.16 Phone Contact with DNS TXT Record Phone Contact If your CA uses this method of domain validation, indicate where in the CP/CPS it is described, and how your CA meets the requirements in this section of the BRs. | |||||||||||||||||||||||||
38 | 3.2.2.4.17 Phone Contact with DNS CAA Phone Contact If your CA uses this method of domain validation, indicate where in the CP/CPS it is described, and how your CA meets the requirements in this section of the BRs. | |||||||||||||||||||||||||
39 | 3.2.2.4.18 Agreed-Upon Change to Website v2 If your CA uses this method of domain validation, indicate where in the CP/CPS it is described, and how your CA meets the requirements in this section of the BRs. | |||||||||||||||||||||||||
40 | 3.2.2.4.19 Agreed-Upon Change to Website - ACME If your CA uses this method of domain validation, indicate where in the CP/CPS it is described, and how your CA meets the requirements in this section of the BRs. | |||||||||||||||||||||||||
41 | 3.2.2.4.20 TLS Using ALPN - If your CA uses this method of domain validation, indicate where in the CP/CPS it is described, and how your CA meets the requirements in this section of the BRs. | |||||||||||||||||||||||||
42 | 3.2.2.5 Authentication for an IP Address If your CA allows IP Addresss to be listed in certificates, indicate which methods your CA uses and how your CA meets the requirements in this section of the BRs. Section 2.2 of Mozilla's root store policy says: "the CA must ensure that the applicant has control over all IP Address(es) referenced in the certificate. This must be done using one or more of the methods documented in section 3.2.2.5 of the CA/Browser Forum Baseline Requirements. The CA's CP/CPS must clearly specify the procedure(s) that the CA employs, and each documented procedure should state which subsection of 3.2.2.5 it is complying with." | Method 3.2.2.5.4, Any Other Method, SHALL NOT be used. "After July 31, 2019, CAs SHALL maintain a record of which IP validation method, including the relevant BR version number, was used to validate every IP Address." | ||||||||||||||||||||||||
43 | 3.2.2.6 Wildcard Domain Validation If your CA allows certificates with a wildcard character (*) in a CN or subjectAltName of type DNS‐ID, then indicate how your CA meets the requirements in this seciton of the BRs. | |||||||||||||||||||||||||
44 | 3.2.2.7 Data Source Accuracy Indicate how your CA meets the requirements in this section of the BRs. | |||||||||||||||||||||||||
45 | 3.2.2.8 CAs MUST check and process CAA records Indicate how your CA meets the requirements in this section of the BRs. Section 2.2 of the BRs states: "CA's Certificate Policy and/or Certification Practice Statement ... shall clearly specify the set of Issuer Domain Names that the CA recognises in CAA "issue" or "issuewild" records as permitting it to issue." | |||||||||||||||||||||||||
46 | 3.2.3. Authentication of Individual Identity | |||||||||||||||||||||||||
47 | 3.2.5. Validation of Authority | |||||||||||||||||||||||||
48 | 3.2.6. Criteria for Interoperation or Certification Disclose all cross-certificates in the CA hierarchies under evaluation. | |||||||||||||||||||||||||
49 | 4.1.1. Who Can Submit a Certificate Application Indicate how your CA identifies suspicious certificate requests. | |||||||||||||||||||||||||
50 | 4.1.2. Enrollment Process and Responsibilities | |||||||||||||||||||||||||
51 | 4.2. Certificate application processing BR section 2.2 says that section 4.2 of the CP/CPS SHALL state the CA's policy or practice on processing CAA Records for Fully Qualified Domain Names. | |||||||||||||||||||||||||
52 | 4.2.1. Performing Identification and Authentication Functions Indicate how your CA identifies high risk certificate requests. Re-use of domain / IP address validation is limited to 398 days and re-use of other validation information is limited to 825 days | |||||||||||||||||||||||||
53 | 4.2.2. Approval or Rejection of Certificate Applications "CAs SHALL NOT issue certificates containing Internal Names." | |||||||||||||||||||||||||
54 | 4.3.1. CA Actions during Certificate Issuance | |||||||||||||||||||||||||
55 | 4.9.1.1 Reasons for Revoking a Subscriber Certificate Indicate how your CA's CP/CPS lists the reasons for revoking end entity certificates and is consistent with the timeframes required by this section of the BRs. | |||||||||||||||||||||||||
56 | 4.9.1.2 Reasons for Revoking a Subordinate CA Certificate Indicate how your CA's CP/CPS lists the reasons for revoking subordinate CA certificates and is consistent with the timeframes required by this section of the BRs. | |||||||||||||||||||||||||
57 | 4.9.2. Who Can Request Revocation | |||||||||||||||||||||||||
58 | 4.9.3. Procedure for Revocation Request The CA SHALL publicly disclose the instructions through a readily accessible online means and in section 1.5.2 of their CPS. | |||||||||||||||||||||||||
59 | 4.9.5. Time within which CA Must Process the Revocation Request | |||||||||||||||||||||||||
60 | 4.9.7. CRL Issuance Frequency Indicate if your CA publishes CRLs. If yes, then please test your CA's CRLs. | |||||||||||||||||||||||||
61 | 4.9.9. On-line Revocation/Status Checking Availability | |||||||||||||||||||||||||
62 | 4.9.10. On-line Revocation Checking Requirements Indicate how your CA meets all of the requirements listed in this section, including support of GET, update frequency (recently updated), and preventing errounious return of "good" status. | |||||||||||||||||||||||||
63 | 4.9.12 "CA's CP/CPS MUST clearly specify the methods that parties may use to demonstrate private key compromise." (MRSP 6) | |||||||||||||||||||||||||
64 | 4.9.13 Certificate suspension must not be supported | |||||||||||||||||||||||||
65 | 4.10.1. Operational Characteristics | |||||||||||||||||||||||||
66 | 4.10.2. Service Availability | |||||||||||||||||||||||||
67 | 5. MANAGEMENT, OPERATIONAL, AND PHYSICAL CONTROLS | |||||||||||||||||||||||||
68 | 5.2.2. Number of Individuals Required per Task | |||||||||||||||||||||||||
69 | 5.3.1. Qualifications, Experience, and Clearance Requirements | |||||||||||||||||||||||||
70 | 5.3.3. Training Requirements and Procedures | |||||||||||||||||||||||||
71 | 5.3.4. Retraining Frequency and Requirements | |||||||||||||||||||||||||
72 | 5.3.7. Independent Contractor Controls | |||||||||||||||||||||||||
73 | 5.4.1. Types of Events Recorded Indicate how your CA meets the requirements of this section. | |||||||||||||||||||||||||
74 | 5.4.3. Retention Period for Audit Logs | |||||||||||||||||||||||||
75 | 5.4.8. Vulnerability Assessments Indicate how your CA meets the requirements of this section. | |||||||||||||||||||||||||
76 | 5.5.2. Retention Period for Archive | |||||||||||||||||||||||||
77 | 5.7.1. Incident and Compromise Handling Procedures Indicate how your CA meets the requirements of this section, including notifying Mozilla in the event of key compromise. | |||||||||||||||||||||||||
78 | 6.1.1. Key Pair Generation | |||||||||||||||||||||||||
79 | 6.1.1.3 Subscriber Key Pair Generation - the CA SHALL NOT generate a Key Pair on behalf of a Subscriber, and SHALL NOT accept a certificate request using a Key Pair previously generated by the CA. | |||||||||||||||||||||||||
80 | 6.1.2. Private Key Delivery to Subscriber | |||||||||||||||||||||||||
81 | 6.1.5. Key Sizes | |||||||||||||||||||||||||
82 | 6.1.6. Public Key Parameters Generation and Quality Checking | |||||||||||||||||||||||||
83 | 6.1.7. Key Usage Purposes | |||||||||||||||||||||||||
84 | 6.2. Private Key Protection and Cryptographic Module Engineering Controls | |||||||||||||||||||||||||
85 | 6.2.5. Private Key Archival | |||||||||||||||||||||||||
86 | 6.2.6. Private Key Transfer into or from a Cryptographic Module | |||||||||||||||||||||||||
87 | 6.2.7. Private Key Storage on Cryptographic Module | |||||||||||||||||||||||||
88 | 6.3.2 Certificates issued SHOULD NOT have a Validity Period greater than 397 days and MUST NOT have a Validity Period greater than 398 days. Indicate how your CA meets the requirements of this section. | |||||||||||||||||||||||||
89 | 6.5.1. Specific Computer Security Technical Requirements The CA SHALL enforce multi-factor authentication for all accounts capable of directly causing certificate issuance. Indicate how your CA meets the requirements of this section. | |||||||||||||||||||||||||
90 | 7.1. Certificate profile CAs SHALL generate non-sequential Certificate serial numbers greater than 0 containing at least 64 bits of output from a CSPRNG. Indicate how your CA meets the requirements of this section. | |||||||||||||||||||||||||
91 | 7.1.1. Version Number(s) | |||||||||||||||||||||||||
92 | 7.1.2. Certificate Content and Extensions; Application of RFC 5280 | |||||||||||||||||||||||||
93 | 7.1.2.1 Root CA Certificate | |||||||||||||||||||||||||
94 | 7.1.2.2 Subordinate CA Certificate | |||||||||||||||||||||||||
95 | 7.1.2.3 Subscriber Certificate | |||||||||||||||||||||||||
96 | 7.1.2.4 All Certificates | |||||||||||||||||||||||||
97 | 7.1.2.5 Application of RFC 5280 | |||||||||||||||||||||||||
98 | 7.1.3. Algorithm Object Identifiers | |||||||||||||||||||||||||
99 | 7.1.3.1 SubjectPublicKeyInfo | |||||||||||||||||||||||||
100 | 7.1.3.2 Signature AlgorithmIdentifier |