All,

This is a reminder that the public discussion period for Microsec's
inclusion application closes on Friday, December 19, 2025.

Thank you
-Chris, on behalf of the CCADB Steering Committee

On Fri, Nov 7, 2025 at 9:19 AM Chris Clements <[email protected]> wrote:

> All,
>
> This email commences a six-week public discussion of Microsec’s request to
> include the following certificate as publicly trusted root certificates in
> one or more CCADB Root Store programs. This discussion period is scheduled
> to close on December 19, 2025.
>
> The purpose of this public discussion process is to promote openness and
> transparency. However, each Root Store makes its inclusion decisions
> independently, on its own timelines, and based on its own inclusion
> criteria. Successful completion of this public discussion process does not
> guarantee any favorable action by any root store.
>
> Anyone with concerns or questions is urged to raise them on this CCADB
> Public list by replying directly in this discussion thread. Likewise, a
> representative of Microsec Ltd. must promptly respond directly in the
> discussion thread to all questions posted.
>
> CCADB Case Number: 00001692
> <https://ccadb.my.salesforce-sites.com/mozilla/PrintViewForCase?CaseNumber=00001692>
>
> Organization Background Information (listed in CCADB):
>
>    -
>
>    CA Owner Name: Microsec Ltd.
>    -
>
>    Website: https://e-szigno.hu/en/
>    -
>
>    Address: Ángel Sanz Briz út 13. Graphisoft Park Southern Area,
>    Building C Budapest, H-1033 Hungary
>    -
>
>    Problem Reporting Mechanisms: [email protected],
>    https://e-szigno.hu/security-events-report
>    -
>
>    Organization Type: Private Corporation
>    -
>
>    Repository URL: https://e-szigno.hu/documents-and-policies
>
> Certificates Requesting Inclusion:
>
> e-Szigno TLS Root CA 2023 (requesting inclusion into three root stores)
>
>    -
>
>    Certificate links: (CA Repository
>    <https://www.e-szigno.hu/tlsrootca2023.crt> / crt.sh
>    
> <https://crt.sh/?q=B49141502D00663D740F2E7EC340C52800962666121A36D09CF7DD2B90384FB4>
>    )
>    -
>
>    SHA-256 Certificate Fingerprint:
>    B49141502D00663D740F2E7EC340C52800962666121A36D09CF7DD2B90384FB4
>    -
>
>    Intended use cases served/EKUs:
>    -
>
>       Server Authentication (TLS) 1.3.6.1.5.5.7.3.1
>       -
>
>       Client Authentication 1.3.6.1.5.5.7.3.2
>       -
>
>    Test websites:
>    -
>
>       Valid: https://eqtlsca2023-valid.e-szigno.hu
>       -
>
>       Revoked: https://eqtlsca2023-revoked.e-szigno.hu/
>       -
>
>       Expired: https://eqtlsca2023-expired.e-szigno.hu
>       -
>
>       DV Automation: None
>       -
>
>       OV Automation: None
>       -
>
>       EV Automation: None
>
> Existing Publicly Trusted Root CAs from Microsec:
>
> Microsec e-Szigno Root CA 2009:
>
>    -
>
>    Certificate links: (CA Repository
>    <http://www.e-szigno.hu/rootca2009.crt> / crt.sh
>    
> <https://crt.sh/?q=3C5F81FEA5FAB82C64BFA2EAECAFCDE8E077FC8620A7CAE537163DF36EDBF378>
>    )
>    -
>
>    SHA-256 Certificate Fingerprint:
>    3C5F81FEA5FAB82C64BFA2EAECAFCDE8E077FC8620A7CAE537163DF36EDBF378
>    -
>
>    Trust Bits/EKUs: Client Authentication;Code Signing;Secure
>    Email;Server Authentication;Encrypting File System;Time Stamping;IP
>    Security Tunnel Termination;IP Security User
>    -
>
>    Included in: Apple, Google Chrome, Microsoft, Mozilla
>    -
>
>    Certificate corpus: here
>    
> <https://search.censys.io/search?resource=certificates&q=3C5F81FEA5FAB82C64BFA2EAECAFCDE8E077FC8620A7CAE537163DF36EDBF378+and+labels%3Dever-trusted>
>    (Censys login required)
>
> e-Szigno Root CA 2017:
>
>    -
>
>    Certificate links: (CA Repository
>    <https://www.e-szigno.hu/rootca2017.crt> / crt.sh
>    
> <https://crt.sh/?q=BEB00B30839B9BC32C32E4447905950641F26421B15ED089198B518AE2EA1B99>
>    )
>    -
>
>    SHA-256 Certificate Fingerprint:
>    BEB00B30839B9BC32C32E4447905950641F26421B15ED089198B518AE2EA1B99
>    -
>
>    Trust Bits/EKUs: Client Authentication;Code Signing;Document
>    Signing;Secure Email;Server Authentication;Time Stamping
>    -
>
>    Included in: Google Chrome, Microsoft, Mozilla
>    -
>
>    Certificate corpus: here
>    
> <https://search.censys.io/search?resource=certificates&q=BEB00B30839B9BC32C32E4447905950641F26421B15ED089198B518AE2EA1B99+and+labels%3Dever-trusted>
>    (Censys login required)
>
> e-Szigno TLS Root CA 2023:
>
>    -
>
>    Certificate links: (CA Repository
>    <https://www.e-szigno.hu/tlsrootca2023.crt> / crt.sh
>    
> <https://crt.sh/?q=B49141502D00663D740F2E7EC340C52800962666121A36D09CF7DD2B90384FB4>
>    )
>    -
>
>    SHA-256 Certificate Fingerprint:
>    B49141502D00663D740F2E7EC340C52800962666121A36D09CF7DD2B90384FB4
>    -
>
>    Trust Bits/EKUs: Client Authentication;Server Authentication
>    -
>
>    Included in: Microsoft
>    -
>
>    Certificate corpus: here
>    
> <https://search.censys.io/search?resource=certificates&q=B49141502D00663D740F2E7EC340C52800962666121A36D09CF7DD2B90384FB4+and+labels%3Dever-trusted>
>    (Censys login required)
>
> Relevant Policy and Practices Documentation:
>
>    -
>
>    Document Repository: https://e-szigno.hu/documents-and-policies
>    -
>
>    Markdown/AsciiDoc CP/CPS: https://github.com/microsec/regulations
>    -
>
>    CP: https://e-szigno.hu/docs/latest-regulation/eidas_hr_all_all/eng
>    -
>
>    CPS: https://e-szigno.hu/docs/latest-regulation/eidas_szsz_all_all/eng
>
> Most Recent Self-Assessment:
>
>    -
>
>
>    
> https://docs.google.com/spreadsheets/d/1FB1yKjnLeuX7O-8k6Fj199aNT_xA3anGySqNiLPTXDs/edit?gid=2064058180#gid=2064058180
>
>
> Audit Statements:
>
>    -
>
>    Auditor: Hunguard
>    -
>
>    Audit Criteria: ETSI EN 319 411
>    -
>
>    Recent Audit Statement(s):
>    -
>
>       Root Key Generation
>       <https://bugzilla.mozilla.org/attachment.cgi?id=9371119> (June 7,
>       2023)
>       -
>
>       Standard Audit
>       
> <https://www.hunguard.hu/wp-content/uploads/2024/11/Attestation_letter_010_standard_v10_ds.pdf>
>       (Period: September 10, 2023 - September 9, 2024)
>       -
>
>       TLS BR Audit
>       
> <https://www.hunguard.hu/wp-content/uploads/2024/11/Attestation_letter_010_TLS-BR_v10_ds.pdf>
>       (Period: September 10, 2023 - September 9, 2024)
>       -
>
>       TLS EVG Audit
>       
> <https://www.hunguard.hu/wp-content/uploads/2024/11/Attestation_letter_010_TLS-EV_v10_ds.pdf>
>       (Period: September 10, 2023 - September 9, 2024)
>
> Incident Summary (Bugzilla incidents from previous 24 months):
>
>    -
>
>    1865880 <https://bugzilla.mozilla.org/show_bug.cgi?id=1865880>:
>    Microsec: Findings in 2023 Audit
>    -
>
>    1886257 <https://bugzilla.mozilla.org/show_bug.cgi?id=1886257>:
>    Microsec: Misissuance an EV TLS certificate without CPSuri
>    -
>
>    1886998 <https://bugzilla.mozilla.org/show_bug.cgi?id=1886998>:
>    Microsec: Late response to a CPR
>    -
>
>    1887110 <https://bugzilla.mozilla.org/show_bug.cgi?id=1887110>:
>    Microsec: Delayed revocation of the misissued certificates
>    -
>
>    1889699 <https://bugzilla.mozilla.org/show_bug.cgi?id=1889699>:
>    Microsec: Disallowed subject attribute field in DV certificate
>    -
>
>    1925239 <https://bugzilla.mozilla.org/show_bug.cgi?id=1925239>:
>    Microsec: Expired Certificates on test Pages for Revocation
>    -
>
>    1952519 <https://bugzilla.mozilla.org/show_bug.cgi?id=1952519>:
>    Microsec: Inconsistent Disclosure of S/MIME BR Audit Information in CCADB
>
>
> Thank you
>
> -Chris, on behalf of the CCADB Steering Committee
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"CCADB Public" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion visit 
https://groups.google.com/a/ccadb.org/d/msgid/public/CAAbw9mCy61vE7_7B0_H%3DF8ZqhQs5uz3v1BiW%2BW%2BZSDdZNStevg%40mail.gmail.com.

Reply via email to