# GPKIよ、おととい来やがれ！(タイトルで煽るスタイル)

#### はじめに

GPKIとはなにか？ - IT

の内容が理解できる程度にはわかっているつもりですが。

#### 前提知識

CA/Policy Participants - MozillaWiki

#### 問題

アプリケーション認証局２(Sub) | 政府認証基盤(GPKI)のホームページ

にもあるように、

https://www.gpki.go.jp/selfcert/finger_print.html

にアクセスしようとすると

のようにルート証明書が信用できんといわれるんですね。

それで、ルート証明書を信用してくれるように

mozilla.dev.security.policy › Japan GPKI Root Renewal Request （日本GPKIルート更新要求）

This begins the discussion of the request from the Government of Japan to include the GPKI 'ApplicationCA2 Root' certificate and enable the Websites trust bit.

それに対して、

2018年2月13日火曜日 8時31分43秒 UTC+9 Wayne Thayer

All of my questions regarding the CP/CPS and audits have been answered to my satisfaction. I am left with two concerns:

1. This root was signed on 12-March 2013. The first end-entity certificate that I'm aware of was signed later in 2013. Mozilla began requiring BR audits in 2014, but the first BR assessment for this root was on 30-September 2015. [1] The assessment shows 22 issues. [2] A PITRA was finally performed on January 31, 2017 [3] and no qualifications were noted. This was followed by a clean period-of-time audit. It is clear that hundreds of certificates were issued in this certificate hierarchy while it was not BR compliant, some of which have not yet expired.

2. A number of misissued certificates under this hierarchy have been logged [4], some of which are still valid. Some of these contain significant compatibility problems such as the lack of a SAN and the lack of an OCSP URL. The good news is that all of the bad certificates were issued prior to 2017.

At a minimum, the unexpired misissued certificates should be revoked, just as has been done by other CAs in the Mozilla program. However, given the demonstrated lack of BR compliance from 2013-2016, we should consider rejecting this request and requiring that a new root using a new key pair be generated and submitted for inclusion.

Please be aware that trust in this root will be constrained to .go.jp domains, significantly reducing the risk it presents to Mozilla users.

I would appreciate everyone's constructive feedback on these issues, and any others that are relevant to this inclusion request.

• Wayne

BR: Baseline Requirements

のように、すくなくとも問題の証明書失効させろよ、と言われて、

2018年2月23日金曜日 15時57分38秒 UTC+9 apca2...@gmail.com

We are a certificate authority controlled by the Government of Japan and issued only for servers operated by the government.

For certificates that you point out concerning, they will expire and will be reissued, so we think that the problem will be solved.

We will continue to take BR audits in the future so we will operate as a secure certification authority and we appreciate your continued support.

そのうち失効するし、そうしたら問題ないよね？とかのたまっていたら

2018年2月28日水曜日 7時51分23秒 UTC+9 Wayne Thayer

To conclude this discussion, Mozilla is denying the Japanese Government ApplicationCA2 Root inclusion request. I'd like to thank everyone for your constructive input into the discussion, and I'd like to thank the Japanese Government representatives for their patience and work to address issues as they have been discovered. I will be resolving the bug as "WONTFIX".

We are preparing to revoke certificates immediately, rather than waiting for certificates issued prior to 2017 to expire. However, even if we revoke those certificates, if your judgment is not affected and our request is rejected, there is no point in doing it. Please let us know if our request will be accepted by revoking all the certificates we issued prior to 2017.

I would like to again point out that simply waiting for misissued certificates to expire is not an acceptable response.

2017年までに発行されたすでにある証明書に不備があり、そんなあいまいな状態で信用するとかないわー、それらを失効してから出なおしてくれん？しかも問題の証明書をすぐに失効させろって言ってるのに、期限切れを待つとか何言ってるの？という感じになってRejectされた感じです。

これには大慌てのGPKI担当者、

2018年2月28日水曜日 14時58分50秒 UTC+9 apca2...@gmail.com

This is a misunderstanding. We are preparing to revoke certificates immediately, rather than waiting for certificates issued prior to 2017 to expire. However, even if we revoke those certificates, if your judgment is not affected and our request is rejected, there is no point in doing it. Please let us know if our request will be accepted by revoking all the certificates we issued prior to 2017.

とわずか7時間でレスを返している。

8000円の元ネタは多分

#### その後の経過

2018年3月1日木曜日 1時15分06秒 UTC+9 Elic Mill

So, to be clear, you would only revoke misissued certificates if required to do so by Mozilla -- not because they represent control failures, or in order to demonstrate to other root programs your CA's responsiveness and the seriousness with which you take control failures.

Mozillaが求めてるんなら失効させるだけでいいんじゃない？という非公式見解が出たと思いきや(この人は.govドメインのメールアドレス以外はMozillaの公式見解ではない)、

2018年3月1日 10時55分13秒 UTC+9 shiro

Eric MillさんのコメントはGPKI担当者に向けて「へー、Mozillaに言われたから直すんだ。CAとしての責任を果たすためじゃなくて。」という皮肉だと思います。

なるほど、いまいち腑に落ちてなかったんだけどそういうことか。解釈をミスってた。(追記終わり)

2018年3月1日木曜日 1時26分58秒 UTC+9 Wayne Thayer

My comment was intended to point out that you are violating BR section 4.9.1.1(9) by not revoking these certificates. My comments were not intended to imply that revoking these certificates would change Mozilla's decision to deny this inclusion request.

Elic Millさん、それは違ってて、私のコメントは証明書を失効させないでいるのがBRに違反してるって言いたいだけなんだ。失効させてもMozillaがこの要求(そもそものroot証明書信用してくれという本題)をRejectしたことをひっくり返すことを意図してないんだ。

と速攻でMozillaの公式見解が否定した。時すでに遅し。

#### BR section 4.9.1.1(9)とは

[PDF注意]Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates

4.9.1.1. Reasons for Revoking a Subscriber Certificate

The CA SHALL revoke a Certificate within 24 hours if one or more of the following occurs:

1. The CA is made aware that the Certificate was not issued in accordance with these Requirements or the CA’s Certificate Policy or Certification Practice Statement;

• SHALL: 絶対に従わなければならない条件に使う語
• revoke: 失効させる
• made aware: 認識する
• issue: 発行する
• in accordance with: ～に従って

#### 日経が記事にした

「日経 xTECHの取材に対するモジラのコメント全文」を要約すると、まあこの記事でも散々引用してきたように、てめーらのぶっ壊れた証明書を全部失効させて新しくroot証明書作って出直しやがれ、ということですね。

GPKIを所管する総務省行政管理局は「現在もプレインストール実現に向けて交渉中」としている。

とあり、もう手遅れでは？という思いががが。

#### スラドにも

そもそも、なんでルート証明機関に名乗り出るなんてことを始めちゃったんでしょう？

と、考えていくと、ルートCA用に法律で縛りまくって保護しまくった特殊な立場で法人を用意して、という、それこそ利権ネタに落ち着く。

#### 追記: ところで確定申告の時期ですがe-taxは

e-taxのWebサイト自体は別のCAなのでいいのですが、個人認証システムにGPKIが使われています。