Hi, this is my reply in the bugzilla

Hi all,

what Fanck is saying is true and we haven´t started to issue any cert using
this new path. 

Regarding the info that is in this bug I´m really shocked because the
majority of them are revoked and don´t understand why have been included
here. 


For those which are not revoked are due to use different curves (P-384,
P-521) that have been discussed in the mozilla m.d.s.p as well as the CAB
Forum and there´s no conclusion yet, but in any case we´re not allowing to
use them anymore. There´re curves allowed in the BRs that Mozilla does not
include. 

1. The un-revoked test certificates are those pre-sign ones with uncompleted
ctlog. So they are not completed certificates.
https://crt.sh/?opt=cablint&id=134843670
https://crt.sh/?opt=cablint&id=134843674
https://crt.sh/?opt=cablint&id=134843685
https://crt.sh/?opt=cablint&id=139640371

2. Other un-revoked certificates have the same error “ ERROR: Unallowed key
usage for EC public key (Key Encipherment) ”
https://crt.sh/?opt=cablint&id=153404034
https://crt.sh/?opt=cablint&id=160150786
https://crt.sh/?opt=cablint&id=149445010
https://crt.sh/?opt=cablint&id=150133570


And what I don´t understand are those comments of "very sloppy isuance
practices" , "many non-BR compliants", "specially given the historic issues
with StartCom" and consider them very unfair. These are subjective opinions
which are very dangerous and not fair. 
This is a totally new system that is not related with "the historic issues"
at all, so whatever happened in the past is not related (and we could talk a
lot of why StartCom was distrusted in the past), only the name is the same.
Some of the issues are also related what has been discussing in the CABF
related to the Unicode and punnycode in domanins, etc. and even there´s no
conclussion as the ballot failed, we decided to revoke those to avoid issues
but you include them here as non BR compliants and very sloppy issuance
practices.

Finally I´d like to understand also why has been asked to create OneCRL
entries for these subCAs.

I may think this post and some other comments in the m.d.s.p are malicious
and don´t know why.

Regards

Best regards

Iñigo Barreira
CEO
StartCom CA Limited


-----Original Message-----
From: dev-security-policy
[mailto:dev-security-policy-bounces+inigo=startcomca....@lists.mozilla.org]
On Behalf Of Franck Leroy via dev-security-policy
Sent: jueves, 3 de agosto de 2017 9:59
To: [email protected]
Subject: Re: StartCom cross-signs disclosed by Certinomis

Hello,

the 2 CA certificates signed by Certinomis has been retained till a full
successful webtrust audit.

On end of June the audit report form PwC was available but with still some
minor issues. I asked StartCom to correct them.

On July 14th the audit report and the policy were updated and published on
StartCom website.

The first of August I received the agreement from my management to send the
CA certificates to StartCom. So I disclose them in the CCADB, with the
corresponding policy documents and audit reports before sending them to
Inigo.

So StartCom was not able to use the path our Root before yesterday.

If there are some previous issued TLS certificates that does not comply with
BR, then theses TLS certificates has to be revoked.

Best regards
Franck Leroy
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to