CA/Bug Triage: Difference between revisions

< CA
m (fixed typo)
(→‎Root Inclusion/Change requests and EV Treatment Enablement Requests: Instructions for adding CCADB Case Numbers to Bugzilla Whiteboard)
 
(58 intermediate revisions by 3 users not shown)
Line 1: Line 1:
= CA Program Bugzilla Dashboards =  
= CA Program Bugzilla Dashboards =  
* CA Inclusion/Update Requests: https://wiki.mozilla.org/CA/Dashboard
* CA Inclusion/Update Requests: https://wiki.mozilla.org/CA/Dashboard
* CA Mis-Issuance Bugs: https://wiki.mozilla.org/CA/ca-bugs
* CA Compliance Bugs: https://wiki.mozilla.org/CA/Incident_Dashboard
* Common CA Database (CCADB) Bugs: https://wiki.mozilla.org/CA/CCADB_Dashboard


= Bug Triage in Mozilla's CA Certificate Program =
= Bug Triage in Mozilla's CA Certificate Program =
Line 7: Line 8:
<br /><br />
<br /><br />
The [https://bugzilla.mozilla.org/ Bugzilla] products/components related to the CA Certificate Program are:
The [https://bugzilla.mozilla.org/ Bugzilla] products/components related to the CA Certificate Program are:
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&component=CA%20Certificate%20Mis-Issuance&product=NSS NSS :: CA Certificate Mis-Issuance] - Problems found in certificates issued by Certificate Authorities included in the default certificate store.
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&component=CA%20Certificate%20Compliance&product=CA%20Program CA Program :: CA Certificate Compliance] - Problems found in certificates issued by Certificate Authorities included in the default certificate store.
** Concerns that are raised about certificates being issued by CAs, and the resulting action items for the CAs.
** Concerns that are raised about certificates being issued by CAs, and the resulting action items for the CAs.
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=NSS NSS :: CA Certificate Root Program] - For Certificate Authorities to file requests asking for their certificates to be included in the default certificate store.
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=CA%20Program CA Program :: CA Certificate Root Program] - For Certificate Authorities to file requests asking for their certificates to be included in the default certificate store.
** [[CA|Root inclusion/change requests]]. When approved, the actual code changes are requested via a new Bugzilla Bug in [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&component=CA%20Certificates%20Code&product=NSS NSS :: CA Certificates Code].
** [[CA|Root inclusion/change requests]]. When approved, the actual code changes are requested via a new Bugzilla Bug in [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&component=CA%20Certificates%20Code&product=NSS NSS :: CA Certificates Code].
** [[CA:How_to_apply#Enable_EV_for_an_included_root|EV treatment enablement requests]]. When approved, the actual code changes are requested via a new [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&component=Security%3A%20PSM&product=Core Bugzilla Bug for PSM].
** [[CA:How_to_apply#Enable_EV_for_an_included_root|EV treatment enablement requests]]. When approved, the actual code changes are requested via a new [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&component=Security%3A%20PSM&product=Core Bugzilla Bug for PSM].
** [[CA:SalesforceCommunity#Documents|CA Audit statements]], when they are not published on [http://www.webtrust.org/ webtrust.org], the auditor's website, or the CA's website.
** CA Program-related concerns or action items.
** CA Program related concerns or action items.
** Requests to [https://www.ccadb.org/cas/intermediates#marking-an-intermediate-certificate-as-revoked add certs to OneCRL].
** Requests to [[CA:SalesforceCommunity#Add_Revoked_Intermediate_Certificate_Data_to_Salesforce|add certs to OneCRL]].  
* [https://bugzilla.mozilla.org/buglist.cgi?&query_format=advanced&component=CA%20Documents&product=CA%20Program CA Program :: CA Documents] - For CA audit statements, when they are not on the auditor's website.
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&component=Common%20CA%20Database&product=CA%20Program CA Program :: Common CA Database] - For requesting updates to the [https://www.ccadb.org/ Common CA Database (CCADB)].
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&component=CA%20Certificates%20Code&product=NSS NSS :: CA Certificates Code] - For actual code changes to NSS. Kathleen should be the only person filing these bugs on behalf of the CA  Program.
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&component=CA%20Certificates%20Code&product=NSS NSS :: CA Certificates Code] - For actual code changes to NSS. Kathleen should be the only person filing these bugs on behalf of the CA  Program.
The CA Certificate Program deviates from Mozilla's standardized [[Bugmasters/Process/Triage|Bugzilla Bug Triage]] process by not using bug priorities (P1, P2, P3, or P5), because [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=NSS CA Certificate Root Program bugs] do not directly include code changes to Mozilla's [[RapidRelease/Calendar|release trains]] or iterations.


== CA Program Whiteboard Tags ==
The CA Certificate Program deviates from Mozilla's standardized [[Bugmasters/Process/Triage|Bugzilla Bug Triage]] process for bug priorities (P1, P2, P3, P4, P5). Priorities are not used for CA compliance bugs because they do not directly include code changes to Mozilla's [[RapidRelease/Calendar|release trains]] or iterations. Priorities are used, however, for tracking CCADB enhancements and for prioritizing [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=CA%20Program root inclusion requests]. See https://wiki.mozilla.org/CA/Prioritization.
=== CA Certificate Issuance Problems and Incidents ===
 
To report a concern about certificates being issued by a CA in Mozilla's Program:
= Compliance Problems and Incidents =
* https://bugzilla.mozilla.org/enter_bug.cgi?product=NSS&component=CA%20Certificate%20Mis-Issuance
To report a concern about certificates being issued by a CA in Mozilla's Program, or their audit statements:
The bug summary should begin with the CA name, so sorting the bugs by Summary will sort the bugs by CA.
* https://bugzilla.mozilla.org/enter_bug.cgi?product=CA%20Program&component=CA%20Certificate%20Compliance
If the bug concerns CA certificate issuance, then the bug summary should begin with the CA name (followed by a colon and then a space), so that sorting the bugs by Summary will sort the bugs by CA.  
<br /><br />
<br /><br />
Open CA Mis-Issuance bugs: https://wiki.mozilla.org/CA/ca-bugs
Open CA Compliance bugs: https://wiki.mozilla.org/CA/Incident_Dashboard
<br /><br />
<br /><br />
The whiteboard tags for [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&component=CA%20Certificate%20Mis-Issuance&product=NSS NSS :: CA Certificate Mis-Issuance] are:
If the bug concerns audit statements not containing expected information, then the bug summary should begin with auditor's name, so that sorting the bugs by Summary will sort the bugs by auditor name.
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&query_format=advanced&component=CA%20Certificate%20Mis-Issuance&product=NSS&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-investigation &#91;ca-investigation&#93;] -- Concern has been raised about certificates that a CA has issued. Investigation and/or discussion in progress.
<br /><br />
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&query_format=advanced&component=CA%20Certificate%20Mis-Issuance&product=NSS&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-incident-response &#91;ca-incident-response&#93;] -- The concern about a CA's certificates has been confirmed, and the CA has follow-up action items
Open Auditor Compliance bugs: https://wiki.mozilla.org/CA/Auditor_Compliance
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&query_format=advanced&component=CA%20Certificate%20Mis-Issuance&product=NSS&status_whiteboard_type=allwordssubstr&status_whiteboard=compliance &#91;ca-compliance&#93;] -- The concern about a CA's certificates is in regards to failure to comply with Mozilla policy and/or the CA/Browser Forum's Baseline Requirements, and is determined to not be an imminent security concern.
<br /><br />
 
= Whiteboard Tags =
The whiteboard tags for [https://bugzilla.mozilla.org/buglist.cgi?query_format=advanced&component=CA%20Certificate%20Compliance CA Program :: CA Certificate Compliance] include:
* [ca-infosharing] -- For non-incident "lessons learned" and other descriptions of comprehensive steps a CA might take when addressing compliance, or cascading incidents, or to share its compliance-related experiences for the benefit of the ecosystem.
* [https://bugzilla.mozilla.org/buglist.cgi?query_format=advanced&query_format=advanced&component=CA%20Certificate%20Compliance&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-compliance &#91;ca-compliance&#93;] -- For concerns about a CA's certificates failing to comply with [https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/ Mozilla's CA Certificate Policy] and/or the [https://cabforum.org/baseline-requirements-documents/ CA/Browser Forum's Baseline Requirements], and it is not considered to be an [https://www.mozilla.org/en-US/security/#For_Developers imminent security concern].
* [https://bugzilla.mozilla.org/buglist.cgi?query_format=advanced&query_format=advanced&component=CA%20Certificate%20Compliance&status_whiteboard_type=allwordssubstr&status_whiteboard=auditor-compliance &#91;auditor-compliance&#93;] -- For concerns about an auditor failing to properly detect and report on CA compliance issues that occurred during one or more periods when the CA was audited.
* [https://bugzilla.mozilla.org/buglist.cgi?query_format=advanced&query_format=advanced&component=CA%20Certificate%20Compliance&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-revocation-delay &#91;ca-revocation-delay&#93;] or [https://bugzilla.mozilla.org/buglist.cgi?query_format=advanced&query_format=advanced&component=CA%20Certificate%20Compliance&status_whiteboard_type=allwordssubstr&status_whiteboard=leaf-revocation-delay &#91;leaf-revocation-delay&#93;] -- appended after [ca-compliance] whenever a CA fails to abide by the Baseline Requirements' requirement to revoke certificates in a timely fashion.
* [https://bugzilla.mozilla.org/buglist.cgi?query_format=advanced&query_format=advanced&component=CA%20Certificate%20Compliance&status_whiteboard_type=allwordssubstr&status_whiteboard=audit-delay &#91;audit-delay&#93;] -- appended after [ca-compliance] when a CA is unable to provide audit statements within one year and 3 months of the previous audit period end date.
* [https://bugzilla.mozilla.org/buglist.cgi?query_format=advanced&query_format=advanced&component=CA%20Certificate%20Compliance&status_whiteboard_type=allwordssubstr&status_whiteboard=covid-19 &#91;covid-19&#93;] -- appended after [ca-compliance], [audit-delay], or [ca-revocation-delay] when delays are due to mandated restrictions regarding COVID-19.
 
New Whiteboard Tags appended to [ca-compliance] include the following:
 
* [ca-misissuance] mis-issuance of a CA certificate
* [dv-misissuance] mis-issuance of a DV TLS end-entity certificate
* [ov-misissuance] mis-issuance of an OV TLS end-entity certificate
* [ev-misissuance] mis-issuance of an EV TLS end-entity certificate
* [smime-misissuance] mis-issuance of an end-entity email (S/MIME) certificate
* [crl-failure] failure to provide certificate status via CRL; malformed, expired CRL
* [ocsp-failure] failure to provide certificate status via OCSP; malformed, expired OCSP
* [policy-failure] failure to update CP/CPS annually, failure to comply with practice in CP/CPS, misunderstanding requirements, failed implementation
* [disclosure-failure] failure to disclose an ICA, failure to report revocation of an ICA, non-disclosure-of-EV-sources, miscommunication, poor communication, etc.
* [audit-failure] failure to perform an audit, failure to upload audits, etc.
* [audit-finding] see https://www.ccadb.org/cas/incident-report#audit-incident-reports
 
= Vulnerability and Security Incident Reporting =
To report a vulnerability or security incident pertaining to a CA in Mozilla's Program:
 
* https://bugzilla.mozilla.org/enter_bug.cgi?bug_type=task&component=CA%20Security%20Vulnerability&groups=ca-program-security&product=CA%20Program
 
Additionally, and not in lieu of the requirement to publicly report incidents as outlined in section [https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/#24-incidents 2.4 of Mozilla's Root Store Policy], a CA Operator MUST disclose a serious vulnerability or security incident in Bugzilla as a [https://bugzilla.mozilla.org/enter_bug.cgi?bug_type=task&component=CA%20Security%20Vulnerability&groups=ca-program-security&product=CA%20Program secure bug] in accordance with guidance found on the [[CA/Vulnerability_Disclosure|Vulnerability Disclosure wiki page]].


=== Root Inclusion/Change requests and EV Treatment Enablement Requests===
= Root Inclusion/Change requests and EV Treatment Enablement Requests=
A representative of a CA may begin the process of root inclusion, change, or ev-enablement by filing a Bugzilla Bug as described here:  
A representative of a CA may begin the process of root inclusion, change, or ev-enablement by filing a Bugzilla Bug as described here:  
* https://wiki.mozilla.org/CA:How_to_apply
* https://wiki.mozilla.org/CA/Application_Process
The whiteboard tags for [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=NSS NSS :: CA Certificate Root Program] are:
Root Inclusion Requests are prioritized as described here:
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=NSS&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-initial &#91;ca-initial&#93;] -- not enough information to begin the Information Verification phase, or not yet assigned to someone to do the Information Verification
* https://wiki.mozilla.org/CA/Prioritization
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=NSS&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-verifying &#91;ca-verifying&#93;] -- in Information Verification phase
The whiteboard tags for [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=CA%20Program CA Program :: CA Certificate Root Program] are:
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=NSS&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-ready-for-discussion &#91;ca-ready-for-discussion yyyy-mm-dd&#93;] -- Information Verification phase complete. Ready for public discussion. In parentheses add date when Information Verification phase was completed.
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=CA%20Program&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-initial &#91;ca-initial&#93;] -- not enough information to begin the Information Verification phase, or not yet assigned to someone to do the Information Verification
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=NSS&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-in-discussion &#91;ca-in-discussion&#93;] -- in discussion in the mozilla.dev.security.policy forum.
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=CA%20Program&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-verifying &#91;ca-verifying&#93;] -- in [[CA/Application_Verification#Information_Verification|Information Verification]] phase. This is a high-level review to ensure that all [[CA/Information_Checklist|required data]] has been provided in Bugzilla and the CCADB and that the appropriate tests have been run.
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=NSS&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-discussion-hold &#91;ca-discussion-hold&#93;] -- discussion on hold, pending CA actions.
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=CA%20Program&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-ready-for-discussion &#91;ca-ready-for-discussion yyyy-mm-dd&#93;] -- Information Verification phase is complete. Ready for [[CA/Application_Verification#Public_discussion|public discussion]] and detailed CP/CPS review.  
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=NSS&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-hold &#91;ca-hold&#93;] -- CA's request is on hold, typically because the CA is a super-CA, so all of their subCAs have to achieve inclusion first.
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=CA%20Program&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-in-discussion &#91;ca-in-discussion&#93;] -- in discussion in the [https://groups.google.com/a/ccadb.org/g/public CCADB public mailing list].
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=NSS&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-pending-approval &#91;ca-pending-approval&#93;] -- final notice of intent to approve the CA's request
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=CA%20Program&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-cps-review &#91;ca-cps-review&#93;] -- [[CA/Application_Verification#Detailed_Review|Detailed Review]], which requires that the relevant CP/CPS and audit documents be [[CA/Required_or_Recommended_Practices#CP.2FCPS_Documents_will_be_Reviewed.21|thoroughly reviewed]]. As a result of such review(s), the CA may be required to update their CP/CPS to become fully aligned with [https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/ Mozilla's Root Store Policy].
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=NSS&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-approved &#91;ca-approved&#93;] -- request is approved, pending code changes in NSS, also including certs which are in NSS and pending code changes in PSM
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=CA%20Program&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-discussion-hold &#91;ca-discussion-hold&#93;] -- discussion on hold, pending CA actions.
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=CA%20Program&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-hold &#91;ca-hold&#93;] -- CA's request is on hold, typically because the CA is a super-CA, so all of their subCAs have to achieve inclusion first.
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=CA%20Program&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-pending-approval &#91;ca-pending-approval&#93;] -- final notice of intent to approve the CA's request
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=CA%20Program&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-approved &#91;ca-approved&#93;] -- request is approved, pending code changes in NSS, also including certs which are in NSS and pending code changes in PSM
* [https://bugzilla.mozilla.org/buglist.cgi?query_format=advanced&short_desc_type=allwordssubstr&short_desc=&product=CA%20Program&component=CA%20Certificate%20Root%20Program&resolution=---&resolution=FIXED&resolution=INVALID&resolution=WONTFIX&resolution=DUPLICATE&resolution=WORKSFORME&resolution=INCOMPLETE&resolution=SUPPORT&resolution=EXPIRED&resolution=MOVED&longdesc_type=allwordssubstr&longdesc=&bug_file_loc_type=allwordssubstr&bug_file_loc=&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-denied&keywords_type=allwords&keywords=&bug_id=&bug_id_type=anyexact&votes=&votes_type=greaterthaneq&emailtype1=substring&email1=&emailtype2=substring&email2=&emailtype3=substring&email3=&chfieldvalue=&chfieldfrom=&chfieldto=Now&j_top=AND&f1=noop&o1=noop&v1= &#91;ca-denied&#93;] -- request was denied. Under normal circumstances the CA may submit a new root inclusion request for a new root certificate that fully complies with Mozilla's Root Store policy.
 
'''CCADB''':  To maintain consistency and improve searchability across Bugzilla bugs associated with CCADB cases, please include a standardized CCADB case number tag in the whiteboard field using the following format:


=== CA Audit Statement Bugs ===  
'''[ccadb-case-NNNNNNN]''', where NNNNNNN is the CCADB root inclusion case number.
* [https://bugzilla.mozilla.org/buglist.cgi?&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=NSS&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-audit &#91;ca-audits&#93;] -- One bug may be created per CA to store audit statements that are not published on [http://www.webtrust.org/ webtrust.org], the auditor's website, or the CA's website.  
 
** [https://bugzilla.mozilla.org/enter_bug.cgi?alias=&assigned_to=kwilson@mozilla.com&blocked=&bug_file_loc=http%3A%2F%2F&bug_severity=enhancement&bug_status=NEW&component=CA%20Certificate%20Root%20Program&product=NSS Link to create ca-audit bug]
'''Examples:'''
** Make sure the bug has the correct product/component for the CA Certificate Program, which is [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=NSS NSS :: CA Certificate Root Program]
 
Whiteboard: [ca-verifying] [ccadb-case-1943001]
 
Whiteboard: [ca-cps-review] [ccadb-case-2000456]
 
(Place the tag following the existing [ca-*] workflow label.)
 
= CA Audit Statement Bugs =
* [https://bugzilla.mozilla.org/buglist.cgi?&query_format=advanced&product=CA%20Program&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-audit &#91;ca-audits&#93;] -- One bug may be created per CA to store audit statements or CP/CPS documents.  
** [https://bugzilla.mozilla.org/enter_bug.cgi?product=CA%20Program&component=CA%20Documents Link to create ca-audit bug]
** Make sure the bug has the correct product/component for the CA Certificate Program, which is [https://bugzilla.mozilla.org/buglist.cgi?&query_format=advanced&component=CA%20Documents&product=CA%20Program CA Program :: CA Documents]
** Add [ca-audits] to the Whiteboard
** Add [ca-audits] to the Whiteboard
** Add Comment: "Closing this bug, but this bug may continue to be used for uploading annual audit statements for this CA."
** Close bug as RESOLVED | WORKSFORME


===CA Program Process or Policy Related Bugs===
=CA Program Process or Policy Related Bugs=
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=NSS&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-program &#91;ca-program&#93;] -- bugs related to CA Program process, wiki pages, or policy. Note that most [https://github.com/mozilla/pkipolicy/issues CA Program Policy issues] are tracked on Github.
* [https://bugzilla.mozilla.org/buglist.cgi?query_format=advanced&query_format=advanced&product=CA%20Program&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-program &#91;ca-program&#93;] -- bugs related to CA Program process, wiki pages, or policy. Note that most [https://github.com/mozilla/pkipolicy/issues CA Program Policy issues] are tracked on Github.
 
=Certificate Revocation Related Bugs=
* [https://bugzilla.mozilla.org/buglist.cgi?query_format=advanced&query_format=advanced&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-onecrl &#91;ca-onecrl&#93;] -- bugs related to updating entries in OneCRL. Under normal circumstances a Bugzilla Bug is not needed for this. Rather, the CA should [http://ccadb.org/cas/intermediates report the revocation via the Common CA Database].
* [https://bugzilla.mozilla.org/buglist.cgi?short_desc=CCADB%20entries%20generated&short_desc_type=allwordssubstr OneCRL Entries Generated] -- bugs for verifying OneCRL entries before they are pushed to production. These bugs are automatically generated from CCADB for standard revocations of intermediate certificates that are reported by CAs. Otherwise these bugs are generated by manually running the tools for specially requested additions to OneCRL.
 
=Common CA Database (CCADB)=
* [https://bugzilla.mozilla.org/buglist.cgi?query_format=advanced&query_format=advanced&status_whiteboard_type=allwordssubstr&status_whiteboard=ccadb-api &#91;ccadb-api&#93;] -- for requesting API access to the CCADB as per https://github.com/mozilla/CCADB-Tools/tree/master/API_AddUpdateIntermediateCert
* [https://bugzilla.mozilla.org/buglist.cgi?query_format=advanced&resolution=---&query_format=advanced&status_whiteboard_type=allwordssubstr&status_whiteboard=ccadb-bug &#91;ccadb-bug&#93;] -- for issues or problems using the CCADB.
* All [https://bugzilla.mozilla.org/buglist.cgi?query_format=advanced&resolution=---&component=Common%20CA%20Database "CA Program : Common CA Database" Bugzilla Bugs] that do not have a whiteboard tag are considered to be enhancement requests that will be prioritized and schedule by the CCADB Steering Committee.
 
The Priority field is used for CCADB Enhancement Requests and bugs as follows:
* P1 - Development in progress
* P2 - Design complete
* P3 - Prioritized
* P4 or not set - To be prioritized and scheduled later


===Certificate Revocation Related Bugs===
Bugs that unintentionally remove pre-existing functionality or negatively impact CCADB users should have priority over Enhancements, and should be set to P1. Low impact bugs will start at P4 and be considered with ERs. If it's a low LOE bug (less than 4 hours of work) it can go from P4 to P1 without prioritization/design.
* [https://bugzilla.mozilla.org/buglist.cgi?resolution=---&query_format=advanced&query_format=advanced&component=CA%20Certificate%20Root%20Program&product=NSS&status_whiteboard_type=allwordssubstr&status_whiteboard=ca-onecrl &#91;ca-onecrl&#93;] -- bugs related to updating entries in OneCRL. Under normal circumstances a Bugzilla Bug is not needed for this. Rather, the CA should [[CA:SalesforceCommunity#Add_Revoked_Intermediate_Certificate_Data_to_the_CCADB|report the revocation via the Common CA Database]].

Latest revision as of 00:54, 2 December 2025

CA Program Bugzilla Dashboards

Bug Triage in Mozilla's CA Certificate Program

Mozilla’s CA Certificate Program governs inclusion of root certificates in Network Security Services (NSS), a set of open source libraries designed to support cross-platform development of security-enabled client and server applications. The NSS root certificate store is not only used in Mozilla products such as the Firefox browser, but is also used by other companies in a variety of products.

The Bugzilla products/components related to the CA Certificate Program are:

The CA Certificate Program deviates from Mozilla's standardized Bugzilla Bug Triage process for bug priorities (P1, P2, P3, P4, P5). Priorities are not used for CA compliance bugs because they do not directly include code changes to Mozilla's release trains or iterations. Priorities are used, however, for tracking CCADB enhancements and for prioritizing root inclusion requests. See https://wiki.mozilla.org/CA/Prioritization.

Compliance Problems and Incidents

To report a concern about certificates being issued by a CA in Mozilla's Program, or their audit statements:

If the bug concerns CA certificate issuance, then the bug summary should begin with the CA name (followed by a colon and then a space), so that sorting the bugs by Summary will sort the bugs by CA.

Open CA Compliance bugs: https://wiki.mozilla.org/CA/Incident_Dashboard

If the bug concerns audit statements not containing expected information, then the bug summary should begin with auditor's name, so that sorting the bugs by Summary will sort the bugs by auditor name.

Open Auditor Compliance bugs: https://wiki.mozilla.org/CA/Auditor_Compliance

Whiteboard Tags

The whiteboard tags for CA Program :: CA Certificate Compliance include:

  • [ca-infosharing] -- For non-incident "lessons learned" and other descriptions of comprehensive steps a CA might take when addressing compliance, or cascading incidents, or to share its compliance-related experiences for the benefit of the ecosystem.
  • [ca-compliance] -- For concerns about a CA's certificates failing to comply with Mozilla's CA Certificate Policy and/or the CA/Browser Forum's Baseline Requirements, and it is not considered to be an imminent security concern.
  • [auditor-compliance] -- For concerns about an auditor failing to properly detect and report on CA compliance issues that occurred during one or more periods when the CA was audited.
  • [ca-revocation-delay] or [leaf-revocation-delay] -- appended after [ca-compliance] whenever a CA fails to abide by the Baseline Requirements' requirement to revoke certificates in a timely fashion.
  • [audit-delay] -- appended after [ca-compliance] when a CA is unable to provide audit statements within one year and 3 months of the previous audit period end date.
  • [covid-19] -- appended after [ca-compliance], [audit-delay], or [ca-revocation-delay] when delays are due to mandated restrictions regarding COVID-19.

New Whiteboard Tags appended to [ca-compliance] include the following:

  • [ca-misissuance] mis-issuance of a CA certificate
  • [dv-misissuance] mis-issuance of a DV TLS end-entity certificate
  • [ov-misissuance] mis-issuance of an OV TLS end-entity certificate
  • [ev-misissuance] mis-issuance of an EV TLS end-entity certificate
  • [smime-misissuance] mis-issuance of an end-entity email (S/MIME) certificate
  • [crl-failure] failure to provide certificate status via CRL; malformed, expired CRL
  • [ocsp-failure] failure to provide certificate status via OCSP; malformed, expired OCSP
  • [policy-failure] failure to update CP/CPS annually, failure to comply with practice in CP/CPS, misunderstanding requirements, failed implementation
  • [disclosure-failure] failure to disclose an ICA, failure to report revocation of an ICA, non-disclosure-of-EV-sources, miscommunication, poor communication, etc.
  • [audit-failure] failure to perform an audit, failure to upload audits, etc.
  • [audit-finding] see https://www.ccadb.org/cas/incident-report#audit-incident-reports

Vulnerability and Security Incident Reporting

To report a vulnerability or security incident pertaining to a CA in Mozilla's Program:

Additionally, and not in lieu of the requirement to publicly report incidents as outlined in section 2.4 of Mozilla's Root Store Policy, a CA Operator MUST disclose a serious vulnerability or security incident in Bugzilla as a secure bug in accordance with guidance found on the Vulnerability Disclosure wiki page.

Root Inclusion/Change requests and EV Treatment Enablement Requests

A representative of a CA may begin the process of root inclusion, change, or ev-enablement by filing a Bugzilla Bug as described here:

Root Inclusion Requests are prioritized as described here:

The whiteboard tags for CA Program :: CA Certificate Root Program are:

CCADB: To maintain consistency and improve searchability across Bugzilla bugs associated with CCADB cases, please include a standardized CCADB case number tag in the whiteboard field using the following format:

[ccadb-case-NNNNNNN], where NNNNNNN is the CCADB root inclusion case number.

Examples:

Whiteboard: [ca-verifying] [ccadb-case-1943001]

Whiteboard: [ca-cps-review] [ccadb-case-2000456]

(Place the tag following the existing [ca-*] workflow label.)

CA Audit Statement Bugs

CA Program Process or Policy Related Bugs

Certificate Revocation Related Bugs

  • [ca-onecrl] -- bugs related to updating entries in OneCRL. Under normal circumstances a Bugzilla Bug is not needed for this. Rather, the CA should report the revocation via the Common CA Database.
  • OneCRL Entries Generated -- bugs for verifying OneCRL entries before they are pushed to production. These bugs are automatically generated from CCADB for standard revocations of intermediate certificates that are reported by CAs. Otherwise these bugs are generated by manually running the tools for specially requested additions to OneCRL.

Common CA Database (CCADB)

The Priority field is used for CCADB Enhancement Requests and bugs as follows:

  • P1 - Development in progress
  • P2 - Design complete
  • P3 - Prioritized
  • P4 or not set - To be prioritized and scheduled later

Bugs that unintentionally remove pre-existing functionality or negatively impact CCADB users should have priority over Enhancements, and should be set to P1. Low impact bugs will start at P4 and be considered with ERs. If it's a low LOE bug (less than 4 hours of work) it can go from P4 to P1 without prioritization/design.