Dear Mozilla Community,

Four new Root CA reports are now available for review from the CCADB. These
reports provide information on Root Certificates trusted for TLS and S/MIME
authentication within Mozilla’s Root Store. (These links will go on
https://wiki.mozilla.org/CA/Included_Certificates and
https://www.ccadb.org/resources.)
*TLS ServerAuth Roots*

*Full report (CSV):*
https://ccadb.my.salesforce-sites.com/ccadb/Report?Name=MozillaTLSServerAuthenticationCSV

A list of *144 Root CAs* with the *websites* trust bit enabled, including:

   -

   CA Owner
   -

   Certificate Name
   -

   SHA-256 Fingerprint
   -

   SPKI SHA256
   -

   Valid From / Valid To (GMT)
   -

   Full CRL Issued By This CA
   -

   JSON Array of Partitioned CRLs
   -

   X.509 Certificate (PEM format)

*PEM-only version:*
https://ccadb.my.salesforce-sites.com/ccadb/Report?Name=MozillaTLSServerAuthenticationPEMOnly
*Email S/MIME Roots*

*Full report (CSV):*
https://ccadb.my.salesforce-sites.com/ccadb/Report?Name=MozillaSMIMECSV

A list of *134 Root CAs* with the *email* trust bit enabled, including:

   -

   CA Owner
   -

   Certificate Name
   -

   SHA-256 Fingerprint
   -

   SPKI SHA256
   -

   Valid From / Valid To (GMT)
   -

   Full CRL Issued By This CA
   -

   JSON Array of Partitioned CRLs
   -

   X.509 Certificate (PEM format)

*PEM-only version:*
https://ccadb.my.salesforce-sites.com/ccadb/Report?Name=MozillaSMIMEPEMOnly
Please review these reports and share any feedback or suggested changes by
next Monday.

Thank you,
Ben Wilson
Mozilla Root Program

-- 
You received this message because you are subscribed to the Google Groups 
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaYNWbmgbiySJLUsF-VBO2onv-Yp4CA%2BtDv5bdsmMoovHg%40mail.gmail.com.

Reply via email to