This is a draft document for public discussion. It reflects the personal opinions of the author, and does not necessarily represent the views of mozilla.org staff and the Mozilla Foundation.
Please post comments and questions to the netscape.public.mozilla.crypto newsgroup or the corresponding mozilla-crypto mailing list, or send them to the document author, Frank Hecker.
As noted in the policy, our decision will be based on the benefits and risks of such inclusion to typical users. We will judge such benefits and risks according to the following criteria, among others:
For more information please see the answers to the questions below.
No. The Mozilla Foundation will not charge fees to or accept other considerations from CAs.
We can't anticipate all the reasons why we might discontinue including a CA certificate. We're simply putting CAs and others on notice that we might do so in the future if we ever felt such an action were necessary and appropriate.
That being said, there are at least two reasons why we might choose to drop a CA's certificate from the included default set (or, alternatively, reset the CA's certificate's trust bits so as to not allow automatic validation of certificates issued by the CA):
We've included in the policy several examples of particular practices that might cause us to consider removing a CA's certificate(s) from the default set (or to not accept the CA into the default set in the first place). However note that this list is not exhaustive.
We mean that the certificates issued by the CA should be used (or usable) in some context relevant to typical users, i.e., individual users, not necessarily security-knowledgeable, who use Firefox, Thunderbird, and related products for personal tasks such as online shopping and banking, using other access-controlled web sites and services, submitting personal information to companies and government agencies, exchanging personal email with others, downloading and installing new software on their personal systems, and comparable activities.
In particular, the CA may do one or more of the following:
In general, no. If a CA is used only to issue certificates for use within a given organization (a "private" or "internal" CA) then we would not see any real benefit to typical users to including a CA certificate for that CA in the default set. A similar objection applies to CAs that are not purely internal but are still operated primarily in support of a particular organization's private business objectives (for example, a CA that issues certificates to that organization's suppliers and customers to facilitate selling to or buying from the organization in question).
Perhaps. We'll make our decision based on the potential benefit to typical users, and this in turn will depend on the type of consortium it is and how "public" the consortium is (e.g., to what extent organizations and individuals in general may join the consortium). For example, if your consortium conducts scientific research, creates industry standards, or otherwise provides services that are of some public benefit then we would consider including your CA certificate in the default set, particularly if consortium membership were open to the general public (organizations and/or individuals) on reasonable terms.
Yes in both cases. The Mozilla Foundation will not discriminate between CAs based on their location, and in particular will not discriminate between U.S.-based CAs and CAs based outside the U.S. (The only possible exception to this would be in cases where the Mozilla Foundation as a U.S.-based entity might be restricted in some way by U.S. laws. For example, it's not clear whether U.S. export control regulations would restrict the Mozilla Foundation from distributing CA certificates for CAs located in countries such as Cuba, North Korea, etc.)
We will also consider including CA certificates for CAs that offer services only in particular countries or other geographic regions (for example, a CA based in Japan that offers web server certificates only to Japanese companies). Even though such a CA's customers may be located only in a certain region, those customers (certificate holders) may communicate with others around the world. (For example, a web server with a certificate from a Japan-only CA may still receive connections from Firefox users located outside Japan.)
Yes, if the CA meets the requirements outlined in the policy, some of which have been designed to handle exactly this case.
In particular, we will accept the results of CA evaluations done by any competent independent party with the necessary access to information about the CA's internal operations; we do not require that the evaluator be an accounting professional (e.g., as in WebTrust audits) or have other formal qualifications or authorizations.
For example, a nonprofit group not able to afford a WebTrust audit could seek a volunteer who would be willing to perform a CA evaluation on a pro bono basis. If the volunteer evaluator is competent and independent (as defined in the policy) then we would accept the results of such an evaluation as valid.
We consider verification measures to be reasonable if they appear to accomplish the stated purpose and are consistent with common industry practice. For example, one common industry practice is to verify the subscriber's control of a domain by sending an email message to an authorized person for that domain, as determined by WHOIS data, and looking for an affirmative response to that message. We consider this to be a "reasonable measure" in the sense we mean.
We simply mean that we might change the policy in the future to add, modify, or delete requirements for subscriber verification, based on evolving industry practices regarding verification and our own assessment of those practices.
First, we might change the policy in the future to add, modify, or delete particular sets of formal criteria, as new criteria are published or we have time to evaluate existing published criteria other than those currently mentioned in the policy. Second, we might choose to accept a different set of criteria for a given CA, provided that the CA can show a clear mapping between those criteria and one or more of the sets of criteria we mention in the polcy.
We'll look at the evaluator's formal qualifications, their resume, their publicly-available writings and work products, and other peoples' opinions of them.
First, note that this issue doesn't arise in the case where an evaluator is specifically authorized to perform particular types of CA evaluations. If an accounting firm has been authorized to perform WebTrust CA audits (i.e., through the formal AICPA/CICA program) or a test lab has been authorized to perform ETSI TS 101 456 audits (e.g., by a government agency implementing a national digital signature law) then we'll take that as prima facie evidence that the firm or test lab in question is competent to perform a CA evaluation.
On the other hand, if the evaluator has no such formal authorization then we'll need to assess competence in other ways; such ways might include:
In general we are looking for information that describes what your CA does and how it operates, in order that we may assess what benefits and risks are associated with including your CA certificate and whether you have met the requirements outlined in the policy.
The requested information falls into the following general classes (note that if you are submitting requests for multiple certificates to be included, please provide information for all CAs associated with such certificates):
Wherever possible please provide publicly-accessible URLs pointing to documents in cross-platform formats such as HTML or PDF. If your documents are not available in English translation then please provide summary information in English sufficient to answer the questions above.
Note that we may elect to publish any or all submitted information for use by users and others; please do not submit any information that you consider to be proprietary or otherwise not suitable for public release. (As an exception to this, note that we will not publish private contact information, e.g., phone numbers and/or email addresses of individual CA employees; we suggest you provide such information to us in order that we may communicate directly with you in the future if needed.)
Submitted requests will be handled as follows:
Version 0.6, April 10. Revised material to reflect draft 12 of the CA certificate policy.
Version 0.5, April 9, 2004. Added draft language discussing risks resulting from various scenarios, and evaluation criteria for CAs.