CA: Difference between revisions

From MozillaWiki
Jump to navigation Jump to search
(General cleanup)
(Further tidying up)
Line 1: Line 1:
== Mozilla's CA Certificate Program ==
__NOTOC__
= Mozilla's CA Certificate Program =


Mozilla’s CA Certificate Program governs inclusion of root [https://developer.mozilla.org/en-US/docs/Mozilla/Security/x509_Certificates certificates] in [https://developer.mozilla.org/en-US/docs/NSS Network Security Services (NSS),] a set of open source libraries designed to support cross-platform development of security-enabled client and server applications. The NSS root certificate store is not only used in Mozilla products such as the Firefox browser, but is also used by other companies in a variety of products.
Mozilla’s CA Certificate Program governs inclusion of root [https://developer.mozilla.org/en-US/docs/Mozilla/Security/x509_Certificates certificates] in [https://developer.mozilla.org/en-US/docs/NSS Network Security Services (NSS),] a set of open source libraries designed to support cross-platform development of security-enabled client and server applications. The NSS root certificate store is not only used in Mozilla products such as the Firefox browser, but is also used by other companies in a variety of products.
Line 13: Line 14:
* [[CA:RootTransferPolicy|Root Transfer Policy]]: Mozilla's expectations when the ownership of an included root certificate changes, the organization operating the PKI changes, and/or the private keys of the root certificate are transferred to a new location.  
* [[CA:RootTransferPolicy|Root Transfer Policy]]: Mozilla's expectations when the ownership of an included root certificate changes, the organization operating the PKI changes, and/or the private keys of the root certificate are transferred to a new location.  


== Lists of CAs and Certificates ==
== Lists of Certificates ==


* [[CA:IncludedCAs|Included CA Certificates]]
* [[CA:IncludedCAs|Included CA Certificates]]
* [[CA:RemovedCAcerts|Removed CA Certificates]]
* [[CA:RemovedCAcerts|Removed CA Certificates]]
* [[CA:PendingCAs|Pending CA Certificates]] or certificate trust bit/EV status changes
* [[CA:PendingCAs|Pending CA Certificates]] or certificate trust bit/EV status changes
* [[CA/Dashboard|CA Request Dashboard]] - tracks applications through the process
* [[CA/Dashboard|CA Request Dashboard]] - tracks applications and trust changes through the process
* [[NSS:Release_Versions | NSS:Release_Versions]] shows which product versions a particular root inclusion request was first available in
* [[NSS:Release_Versions | NSS:Release_Versions]] shows which product versions a particular root inclusion request was first available in
* [[CA:SubordinateCAcerts|Public Intermediate Certificates]]
* [[CA:SubordinateCAcerts|Public Intermediate Certificates]]
* [[CA:RevokedSubCAcerts|Revoked Intermediate Certificates]]
* [[CA:RevokedSubCAcerts|Revoked Intermediate Certificates]]
== Program Administration ==
Most information relating to the administration of our program is stored either in [https://bugzilla.mozilla.org/ Bugzilla] or in the [[CA:CommonCADatabase|Common CA Database]].
* [[CA/ca-bugs|Lists of Mis-issuance Incident and Compliance Bugs]]
* [[CA_Bug_Triage|How we mark Bugzilla bugs related to the CA Certificate program]]
== Information for CAs ==
* [[CA|Application Process Overview]]
* [[CA:How_to_apply|How To Apply]]
* [[CA:Root_Change_Process|Making Changes to Included Roots]]
* [[CA:Recommended_Practices|Recommended CA practices]]
* [[CA:Problematic_Practices|Potentially problematic CA practices]]
* [[CA:BRs-Self-Assessment|How to do a self-assessment against the Baseline Requirements (BRs)]]
== Discussion Forums ==
The following Mozilla public forums are relevant to CA evaluation and related issues. Each forum can be accessed either as a mailing list, over the web or as a newsgroup.
* [https://www.mozilla.org/en-US/about/forums/#dev-security-policy mozilla.dev.security.policy] (MDSP). This forum is used for discussions of Mozilla policies related to security in general and CAs in particular, and for wider discussions about the WebPKI. Among other things, it is the preferred forum for the public comment phase of CA evaluation. If you are a regular participant in MDSP, then please add your name to the [[CA:Policy_Participants|Policy Participants]] page.
* [https://www.mozilla.org/en-US/about/forums/#dev-tech-crypto mozilla.dev.tech.crypto]. This forum is used for discussions of the [http://www.mozilla.org/projects/security/pki/nss/ NSS] cryptographic library used in Firefox and other Mozilla-based products, as well as the [http://www.mozilla.org/projects/security/pki/psm/ PSM] module that implements higher-level security protocols for Firefox.
* [https://www.mozilla.org/en-US/about/forums/#dev-security mozilla.dev.security]. This forum is used for discussions of Mozilla security issues in general.


== Common CA Database (aka CA Community in Salesforce) ==
== Common CA Database (aka CA Community in Salesforce) ==
Line 32: Line 58:
** A '''Root Store Member''' is any root store operator participating in the Common CA Database who has signed Mozilla's Common CA Database Agreement.
** A '''Root Store Member''' is any root store operator participating in the Common CA Database who has signed Mozilla's Common CA Database Agreement.
* Note: "Common CA Database" is the new name for "CA Community in Salesforce".
* Note: "Common CA Database" is the new name for "CA Community in Salesforce".
== Maintenance and Enforcement ==
*[[CA:MaintenanceAndEnforcement | Maintaining Confidence in Root Certificates]] -- includes potential problems, prevention, and response.
* CA Mis-Issuance Bugs: https://wiki.mozilla.org/CA/ca-bugs
* Whiteboard tags used in the CA Program https://wiki.mozilla.org/CA_Bug_Triage


== Override Default Root Certificate Settings ==
== Override Default Root Certificate Settings ==
Line 65: Line 84:
** [[CA:Terminology | High Level Terminology]]
** [[CA:Terminology | High Level Terminology]]
* [[CA:Certificate Download Specification|Certificate download specification]]. This document describes the data formats used by Mozilla products for installing certificates.
* [[CA:Certificate Download Specification|Certificate download specification]]. This document describes the data formats used by Mozilla products for installing certificates.
== Discussion Forums ==
The following Mozilla public forums are relevant to CA evaluation and related issues. Each forum can be accessed either as a mailing list, over the web or as a newsgroup.
* [https://www.mozilla.org/en-US/about/forums/#dev-security-policy mozilla.dev.security.policy] (MDSP). This forum is used for discussions of Mozilla policies related to security in general and CAs in particular, and for wider discussions about the WebPKI. Among other things, it is the preferred forum for the public comment phase of CA evaluation. If you are a regular participant in MDSP, then please add your name to the [[CA:Policy_Participants|Policy Participants]] page.
* [https://www.mozilla.org/en-US/about/forums/#dev-tech-crypto mozilla.dev.tech.crypto]. This forum is used for discussions of the [http://www.mozilla.org/projects/security/pki/nss/ NSS] cryptographic library used in Firefox and other Mozilla-based products, as well as the [http://www.mozilla.org/projects/security/pki/psm/ PSM] module that implements higher-level security protocols for Firefox.
* [https://www.mozilla.org/en-US/about/forums/#dev-security mozilla.dev.security]. This forum is used for discussions of Mozilla security issues in general.


== Work in Progress ==
== Work in Progress ==


* [[CA:BRs-Self-Assessment | CA Self-Assessment of BRs]]
* [[CA:BRs-Self-Assessment | CA Self-Assessment of BRs]]
* [[CA:SHA1elimination | Phasing out SHA-1 Certificates]]
* [[CA:ImprovingRevocation | Plan for Improving Revocation Checking in Firefox]]
* [[CA:ImprovingRevocation | Plan for Improving Revocation Checking in Firefox]]
* [[NSS:BurnDownList | SSL Burn Down List]] -- Collecting/prioritizing NSS and PSM work.
* [[CA:OCSP-HardFail | OCSP Hard Fail]] -- What needs to be done before we can set OCSP to hard fail by default?
* [[CA:CAInclusionProcessIssues | Sandbox for identifying and resolving issues with the CA Inclusion Process]]


== Templates ==
== Templates ==


* [[CA:Email_templates|Email Templates used by CCADB]]
* [[CA:Email_templates|Email Templates used by CCADB]]

Revision as of 15:02, 4 May 2017

Mozilla's CA Certificate Program

Mozilla’s CA Certificate Program governs inclusion of root certificates in Network Security Services (NSS), a set of open source libraries designed to support cross-platform development of security-enabled client and server applications. The NSS root certificate store is not only used in Mozilla products such as the Firefox browser, but is also used by other companies in a variety of products.

Policy

Lists of Certificates

Program Administration

Most information relating to the administration of our program is stored either in Bugzilla or in the Common CA Database.

Information for CAs

Discussion Forums

The following Mozilla public forums are relevant to CA evaluation and related issues. Each forum can be accessed either as a mailing list, over the web or as a newsgroup.

  • mozilla.dev.security.policy (MDSP). This forum is used for discussions of Mozilla policies related to security in general and CAs in particular, and for wider discussions about the WebPKI. Among other things, it is the preferred forum for the public comment phase of CA evaluation. If you are a regular participant in MDSP, then please add your name to the Policy Participants page.
  • mozilla.dev.tech.crypto. This forum is used for discussions of the NSS cryptographic library used in Firefox and other Mozilla-based products, as well as the PSM module that implements higher-level security protocols for Firefox.
  • mozilla.dev.security. This forum is used for discussions of Mozilla security issues in general.

Common CA Database (aka CA Community in Salesforce)

Mozilla's CA Program uses the Common CA Database, also known as the CA Community in Salesforce, which is a highly customized CRM used for managing CA Program data. The Common CA Database enables CAs to directly provide the data for all of the publicly disclosed and audited subordinate CAs chaining up to root certificates in Mozilla's program, and to also directly provide data about their revoked intermediate certificates. A Primary Point of Contact for each included CA will be given a CA Communitylicense, so that each of the CAs in Mozilla's program can input, access, and update their intermediate certificate data directly in the Common CA Database.

  • CA Members of the Common CA Database
    • A CA Member is any CA participating in the Common CA Database via Community licenses, subject to Mozilla policies. CA Members have restricted access to certain parts of the data in the Common CA Database. They can only modify the data regarding intermediate certificates chaining up to their own root certificates. They have read-only access to root certificate data, and they do not have access to Cases regarding root inclusion/change requests.
  • Root Store Members of the Common CA Database
    • A Root Store Member is any root store operator participating in the Common CA Database who has signed Mozilla's Common CA Database Agreement.
  • Note: "Common CA Database" is the new name for "CA Community in Salesforce".

Override Default Root Certificate Settings

Users of Mozilla products may override the default root certificate settings by either deleting the root certificate or by changing the trust bit settings of a root certificate.

How to Apply for Root Inclusion or Changes

  • Process Overview
  • How to Apply -- A guide for CAs wishing to include their certificate in Mozilla's Root CA store, and also a guide for CAs wishing to add trust bits or enable EV for a certificate that is already included in Mozilla's Root CA store.
  • Root Change Process -- How to request a change to a root certificate that is currently included in NSS. This includes the process for disabling or removing a root certificate from NSS.

Work in Progress

Templates