Giving that there were so many TLS CAs, I don't see any necesssity to add 
another TLS CA unless something new is provided by CA.
Can CA explain what can be improved if accepted to Mozilla Root Program?
在2023年8月29日星期二 UTC+8 05:41:33<Ben Wilson> 写道:

> All,
>
> This email commences a six-week public discussion of CommScope’s request 
> to include the following four (4) certificates as publicly trusted root 
> certificates in one or more CCADB Root Store Member’s program. This 
> discussion period is scheduled to close on October 10, 2023.
>
> The purpose of this public discussion process is to promote openness and 
> transparency. However, each Root Store makes its inclusion decisions 
> independently, on its own timelines, and based on its own inclusion 
> criteria. Successful completion of this public discussion process does not 
> guarantee any favorable action by any root store.  
>
> Anyone with concerns or questions is urged to raise them on this CCADB 
> Public list by replying directly in this discussion thread. Likewise, a 
> representative of the applicant must promptly respond directly in the 
> discussion thread to all questions that are posted.
>
> CCADB Case Number:  00000923 
> <https://ccadb.my.salesforce-sites.com/mozilla/PrintViewForCase?CaseNumber=00000923>;
>  
> Bugzilla:  1673177 <https://bugzilla.mozilla.org/show_bug.cgi?id=1763177> 
>
> Organization Background Information (listed in CCADB):
>
>    - 
>    
>    CA Owner Name: CommScope
>    - 
>    
>    Website(s):  https://www.pki-center.com/, 
>    https://cert.pkiworks.com/Public/Portal, https://www.commscope.com/ 
>    - 
>    
>    Address: 6450 Sequence Drive, San Diego CA  92121
>    - 
>    
>    Problem Reporting Mechanism(s):  
>    https://cert.pkiworks.com/Public/SecurityIncidentReport/ or email to 
>    #[email protected] 
>    - 
>    
>    Organization Type: CAs are owned by wholly owned subsidiaries of 
>    CommScope Holding Company, Inc., a NASDAQ-traded company
>    - 
>    
>    Repository URL:  https://certificates.pkiworks.com/Public/Documents/
>    
> Certificates Requesting Inclusion:
>
>    1. 
>    
>    CommScope Public Trust RSA Root-01:
>    
>
>    - 
>    
>    Certificate download links: (CA Repository 
>    
> <https://cert.pkiworks.com/Public/DownloadCert/CommScope%20Public%20Trust%20RSA%20Root%2D01>,
>  
>    crt.sh 
>    
> <https://crt.sh/?sha256=02BDF96E2A45DD9BF18FC7E1DBDF21A0379BA3C9C2610344CFD8D606FEC1ED81>
>    )
>    - 
>    
>    Use cases served/EKUs: 
>    - 
>       
>       Server Authentication (TLS) 1.3.6.1.5.5.7.3.1
>       - 
>       
>       Client Authentication 1.3.6.1.5.5.7.3.2
>       - 
>    
>    Test websites:
>    - 
>       
>       Valid: https://rsa-current.ca-1.test.pkiworks.com
>       - 
>       
>       Revoked: https://rsa-revoked.ca-1.test.pkiworks.com
>       - 
>       
>       Expired: https://rsa-expired.ca-1.test.pkiworks.com
>       
>
>
>    1. 
>    
>    CommScope Public Trust RSA Root-02: 
>    - 
>       
>       Certificate download links: (CA Repository 
>       
> <https://cert.pkiworks.com/Public/DownloadCert/CommScope%20Public%20Trust%20RSA%20Root%2D02>,
>  
>       crt.sh 
>       
> <https://crt.sh/?sha256=FFE943D793424B4F7C440C1C3D648D5363F34B82DC87AA7A9F118FC5DEE101F1>
>       )
>       - 
>       
>       Use cases served/EKUs: 
>       - 
>          
>          Server Authentication (TLS) 1.3.6.1.5.5.7.3.1
>          - 
>          
>          Client Authentication 1.3.6.1.5.5.7.3.2
>          - 
>       
>       Test websites:
>       - 
>          
>          Valid:  https://rsa-current.ca-2.test.pkiworks.com
>          - 
>          
>          Revoked:  https://rsa-revoked.ca-2.test.pkiworks.com
>          - 
>          
>          Expired:  https://rsa-expired.ca-2.test.pkiworks.com
>          2. 
>    
>    CommScope Public Trust ECC Root-01
>    - 
>       
>       Certificate download links: (CA Repository 
>       
> <https://cert.pkiworks.com/Public/DownloadCert/CommScope%20Public%20Trust%20ECC%20Root%2D01>,
>  
>       crt.sh 
>       
> <https://crt.sh/?sha256=11437CDA7BB45E41365F45B39A38986B0DE00DEF348E0C7BB0873633800BC38B>
>       )
>       - 
>       
>       Use cases served/EKUs: 
>       - 
>          
>          Server Authentication (TLS) 1.3.6.1.5.5.7.3.1
>          - 
>          
>          Client Authentication 1.3.6.1.5.5.7.3.2 
>          - 
>       
>       Test websites:
>       - 
>          
>          Valid: https://ecc-current.ca-1.test.pkiworks.com
>          - 
>          
>          Revoked: https://ecc-revoked.ca-1.test.pkiworks.com
>          - 
>          
>          Expired: https://ecc-expired.ca-1.test.pkiworks.com
>          
>
>
>    1. 
>    
>    CommScope Public Trust ECC Root-02
>    - 
>       
>       Certificate download links: (CA Repository 
>       
> <https://cert.pkiworks.com/Public/DownloadCert/CommScope%20Public%20Trust%20ECC%20Root%2D02>,
>  
>       crt.sh 
>       
> <https://crt.sh/?sha256=2FFB7F813BBBB3C89AB4E8162D0F16D71509A830CC9D73C262E5140875D1AD4A>
>       )
>       - 
>       
>       Use cases served/EKUs: 
>       - 
>          
>          Server Authentication (TLS) 1.3.6.1.5.5.7.3.1
>          - 
>          
>          Client Authentication 1.3.6.1.5.5.7.3.2 
>          - 
>       
>       Test websites:
>       - 
>          
>          Valid: https://ecc-current.ca-2.test.pkiworks.com
>          - 
>          
>          Revoked: https://ecc-revoked.ca-2.test.pkiworks.com
>          - 
>          
>          Expired: https://ecc-expired.ca-2.test.pkiworks.com
>          
> Relevant Policy and Practices Documentation: 
>
> The following applies to all four (4) applicant root CAs:
>
>    - 
>    
>    https://certificates.pkiworks.com/Public/DownloadDocument/18 (CP/CPS 
>    v. 2.6 dated 2/10/2023)
>    
>
> Most Recent Self-Assessment:
>
> The following applies to all four (4) applicant root CAs:
>
>    - 
>    
>    https://bugzilla.mozilla.org/attachment.cgi?id=9281545  (completed 
>    6/15/2022)  
>    
> Audit Statements:
>
>    - 
>    
>    Auditor: BDO <https://www.bdo.com/>  (enrolled 
>    
> <https://www.cpacanada.ca/en/business-and-accounting-resources/audit-and-assurance/overview-of-webtrust-services/licensed-webtrust-practitioners-international>
>  
>    through WebTrust)
>    - 
>    
>    Audit Criteria: WebTrust
>    - 
>    
>    Date of Audit Issuance: 9/5/2022
>    - 
>    
>    For Period Ending: 6/30/2022
>    - 
>    
>    Audit Statement(s):  
>    - 
>       
>       Standard Audit 
>       
> <https://www.cpacanada.ca/generichandlers/CPACHandler.ashx?attachmentid=56a7beb3-090f-40f0-87aa-599d7d9cc97a>
>        
>       - 
>       
>       BR (SSL) Audit  
>       
> <https://www.cpacanada.ca/generichandlers/CPACHandler.ashx?attachmentid=407c0ecd-44de-4bbe-90ed-c71913f1101e>
>       
> Risk-vs-Value Justification:
>
>    - 
>    
>    
>    
> https://www.pki-center.com/Content/Mozilla%20Value%20Proposition%20Released.pdf
>    
> Thank you,
>
>
> Ben, on behalf of the CCADB Steering Committee
>

-- 
You received this message because you are subscribed to the Google Groups 
"CCADB Public" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/ccadb.org/d/msgid/public/0680bca9-4238-4b86-9a45-cebf141841afn%40ccadb.org.

Reply via email to