Dear Mozilla Community, Four new Root CA reports are now available for review from the CCADB. These reports provide information on Root Certificates trusted for TLS and S/MIME authentication within Mozilla’s Root Store. (These links will go on https://wiki.mozilla.org/CA/Included_Certificates and https://www.ccadb.org/resources.) *TLS ServerAuth Roots*
*Full report (CSV):* https://ccadb.my.salesforce-sites.com/ccadb/Report?Name=MozillaTLSServerAuthenticationCSV A list of *144 Root CAs* with the *websites* trust bit enabled, including: - CA Owner - Certificate Name - SHA-256 Fingerprint - SPKI SHA256 - Valid From / Valid To (GMT) - Full CRL Issued By This CA - JSON Array of Partitioned CRLs - X.509 Certificate (PEM format) *PEM-only version:* https://ccadb.my.salesforce-sites.com/ccadb/Report?Name=MozillaTLSServerAuthenticationPEMOnly *Email S/MIME Roots* *Full report (CSV):* https://ccadb.my.salesforce-sites.com/ccadb/Report?Name=MozillaSMIMECSV A list of *134 Root CAs* with the *email* trust bit enabled, including: - CA Owner - Certificate Name - SHA-256 Fingerprint - SPKI SHA256 - Valid From / Valid To (GMT) - Full CRL Issued By This CA - JSON Array of Partitioned CRLs - X.509 Certificate (PEM format) *PEM-only version:* https://ccadb.my.salesforce-sites.com/ccadb/Report?Name=MozillaSMIMEPEMOnly Please review these reports and share any feedback or suggested changes by next Monday. Thank you, Ben Wilson Mozilla Root Program -- You received this message because you are subscribed to the Google Groups "[email protected]" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaYNWbmgbiySJLUsF-VBO2onv-Yp4CA%2BtDv5bdsmMoovHg%40mail.gmail.com.
