Hi Ben,

A scenario came to mind that may deserve further clarity in the text, so I 
wanted to raise it here. Suppose Root CA “A” kicks off the 
information-gathering and review process for Sub CA “B” (as outlined on the 
Wiki page) for the issuance of a subordinate CA certificate containing solely 
id-kp-emailProtection. The discussion ends favorably and Sub CA B is marked in 
CCADB as an “approved” organization. Some time later, Sub CA B wishes to obtain 
a subordinate certificate containing id-kp-serverAuth. Since this organization 
has previously been approved, according to the proposed language, there is no 
need to undergo the review and approval process again despite the difference in 
technical capability and audit requirements of the subordinate CAs.

 

Is this an accurate read of the proposed language?

 

Thanks,

Corey

 

From: [email protected] <[email protected]> On 
Behalf Of Ben Wilson
Sent: Monday, November 1, 2021 2:58 PM
To: [email protected] <[email protected]>
Subject: Re: Policy 2.8: MRSP Issue #233: Wiki page documenting process for 
reviewing externally operated subordinate CAs

 

I am proposing that we create a link in the MRSP to the process for review and 
approval of third-party externally operated CAs as indicated in the following 
commit: 

https://github.com/BenWilson-Mozilla/pkipolicy/commit/9efa9e73f6cff7924d1ed856eadd1902f31bd458
 

 

On Thu, Oct 28, 2021 at 2:56 PM Ben Wilson <[email protected] 
<mailto:[email protected]> > wrote:

All,

 

This email introduces another issue selected to be addressed in the next 
version of the Mozilla Root Store Policy (MSRP), version 2.8, to be published 
in 2022. (See https://github.com/mozilla/pkipolicy/labels/2.8)

 

This is Github Issue #233 <https://github.com/mozilla/pkipolicy/issues/233> .  

 

I have re-published the wiki page for the process of reviewing and approving 
externally operated subordinate CAs.  Here is the URL:

https://wiki.mozilla.org/CA/Subordinate_CA_Checklist#Process_for_Review_and_Approval_of_Externally_Operated_Subordinate_CAs

  

This issue is also related to an m.d.s.p. email that I sent and comments 
received with a subject line: Process for Considering Externally Operated 
Subordinate CAs 
<https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/AA5G1bzOwZQ/m/v4i0_wj9BAAJ>
 .

 

Please provide any additional comments you may have regarding the review and 
approval process for externally operated subordinate CAs.

 

Thanks,

 

Ben Wilson

Mozilla Root Program Manager

 

 

-- 
You received this message because you are subscribed to the Google Groups 
"[email protected] <mailto:[email protected]> " 
group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected] 
<mailto:[email protected]> .
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaZX%2B_vWSyZe2tMGREjurRRV7y66AVMQyLkPz8LE4BbsUw%40mail.gmail.com
 
<https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaZX%2B_vWSyZe2tMGREjurRRV7y66AVMQyLkPz8LE4BbsUw%40mail.gmail.com?utm_medium=email&utm_source=footer>
 .

-- 
You received this message because you are subscribed to the Google Groups 
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/DM6PR14MB2186988AF8FC13FBB890E10A92929%40DM6PR14MB2186.namprd14.prod.outlook.com.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

Reply via email to