" turn on all three trust bits for the RCA1 and RCA3 root certs, and turn
on the websites and code signing trust bits for the RCA2 root cert."

Are they asking for the same bits/CA that they already had with the
precious CAs?

Maybe this is not the adequate forum but have they consider Microsoft new
requirements<http://social.technet.microsoft.com/wiki/contents/articles/1760.windows-root-certificate-program-technical-requirements-version-2-0.aspx>
?
"

*Separation of SSL and Code Signing Key Uses*

Intermediate CA certificates under root certificates submitted for
distribution by the Program must be configured to separate server
authentication (SSL) from code signing and time stamping uses. A single
issuing CA must not be used to issue both server authentication and code
signing certificates.
"

BR

[email protected]
+34 666 429 224 (Spain)
gplus.to/chemalogo
@chemalogo <https://twitter.com/chemalogo/>
www.linkedin.com/in/chemalogo
Skype: chemalogo


On Wed, May 7, 2014 at 1:21 AM, Kathleen Wilson <[email protected]> wrote:

> On 4/24/14, 1:16 PM, Kathleen Wilson wrote:
>
>> On 4/7/14, 5:42 PM, Kathleen Wilson wrote:
>>
>>> QuoVadis has applied to include the “QuoVadis Root CA 1 G3”, “QuoVadis
>>> Root CA 2 G3”, and “QuoVadis Root CA 3 G3” root certificates, turn on
>>> all three trust bits for the RCA1 and RCA3 root certs, and turn on the
>>> websites and code signing trust bits for the RCA2 root cert. The request
>>> is to also enable EV treatment for the “QuoVadis Root CA 2 G3” root
>>> certificate. These SHA256 root certs will eventually replace the
>>> corresponding QuoVadis root certificates that were included in NSS in
>>> bugs #238381 and #365281.
>>>
>>>
>> Does anyone have any questions or comments about this request from
>> QuoVadis?
>>
>> Kathleen
>>
>>
>>
>
> Should I take the lack of input on this request to mean that everyone is
> OK with it?
> Or does it just mean that folks need more time to consider this request?
>
> Thanks,
>
> Kathleen
>
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to