Re: Certigna Root Renewal Request

2017-07-22 Thread josselin.allemandou--- via dev-security-policy
The ticket is open since 3 months. This seems to be correct for everyone. Is it possible to close it now ? ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy

Re: Certigna Root Renewal Request

2017-12-01 Thread josselin.allemandou--- via dev-security-policy
Thank you very much for this analysis and the time past on our request. You will find below additional information following your comments --- > “CP and terms and conditions are publicly available in a read‐only manner. > The

Re: Certigna Root Renewal Request

2017-12-11 Thread josselin.allemandou--- via dev-security-policy
Just to let you know that CPSs for certificates that are not used for website authentication will be available by January 15, 2018. CPS for SSL / TLS certificates are already available in French and English versions. Best regards ___

Re: Certigna Root Renewal Request

2018-01-29 Thread josselin.allemandou--- via dev-security-policy
Le jeudi 27 avril 2017 15:22:27 UTC+2, Aaron Wu a écrit : > This request from the Dhimyotis/Certigna is to include the SHA-256 ‘Certigna > Root CA’ certificate and turn on the Websites and Email trust bits. This root > certificate will eventually replace the SHA-1 ‘Certigna’ root certificate >

Re: Certigna Root Renewal Request

2018-02-19 Thread josselin.allemandou--- via dev-security-policy
We hope to have provided all the expected answers and documentation. Could you please tell us if the processing of our integration request will progress. Thank you for your reply. Best regards. ___ dev-security-policy mailing list

Re: Certigna Root Renewal Request

2018-08-22 Thread josselin.allemandou--- via dev-security-policy
Thank you very much Devon for this analysis and the time past on our request. You will find below additional information. Sorry for the delay, I was on vacation. The publication of the updated CP / CPS will be immediate, as soon as you confirm that the level of detail is sufficient for you.

Re: Certigna Root Renewal Request

2018-08-22 Thread josselin.allemandou--- via dev-security-policy
Just in addition, because the point was raised to us, we also take into account the problem related to DNSSEC with the case where the zone is validly DNSSEC-signed and our CAA query times out. As mentioned above, the publication of the updated CP / CPS will be immediate, as soon as you confirm

Re: Certigna Root Renewal Request

2018-08-22 Thread josselin.allemandou--- via dev-security-policy
We confirm that no, this is not the case. This is what we said in the CP / CPS because we thought that these constraints could be regularly encountered and that it could be bad for the business, but as I said in our answer, the controls to report the blocking cases were positioned since the

Re: Certigna Root Renewal Request

2018-08-22 Thread josselin.allemandou--- via dev-security-policy
And just to clarify, when we specified this in the CP / CPS, we thought that the document signed by a legal representative at the time of the certificate request could be sufficient in terms of consent, and that despite our requests, the applicant have not wished to update their CAA

Re: Certigna Root Renewal Request

2018-09-11 Thread josselin.allemandou--- via dev-security-policy
Hello, Thanks Wayne and Devon for your reply. We took the time to respond because we wanted to verify through an audit that the SSL certificate requests processed since September 8th were in compliance with the CA/B Forum requirements for DNS CAA record checks. In general, this has been the

Incident Report - Misissuance of one certificate without DNS CAA authorization (Certigna)

2018-09-11 Thread josselin.allemandou--- via dev-security-policy
The audit of our previous CAA check practices ensured that the CA/B Forum requirements were met except for a single certificate for which the CA was not authorized to issue according to the DNS CAA record. This failure is related to our old practices that led to a control of the DNS CAA

Re: Incident Report - Misissuance of one certificate without DNS CAA authorization (Certigna)

2018-09-11 Thread josselin.allemandou--- via dev-security-policy
Hello, Thank you for your contribution. We hope that the returns below will allow you to better understand our past practices that led to the creation of this ticket. It is important to remember that our CA is also subject to compliance with national standards (e.g. RGS) which are more

Re: Certigna Root Renewal Request

2018-04-12 Thread josselin.allemandou--- via dev-security-policy
We hope to have provided all the expected answers and documentation. Could you please tell us if the processing of our integration request will progress. Thank you for your reply. Best regards. ___ dev-security-policy mailing list

Re: Incident Report - Misissuance of one certificate without DNS CAA authorization (Certigna)

2018-10-15 Thread josselin.allemandou--- via dev-security-policy
Hello, The decision was taken at one of our security committees where all changes and developments that could impact the practices and compliance of our authority are validated. This is why all the actors of these security committees have been made aware of the incident and the fact that we

Re: Incident Report - Misissuance of one certificate without DNS CAA authorization (Certigna)

2018-09-26 Thread josselin.allemandou--- via dev-security-policy
Hello Thank you for your exchanges. We hope that the additions below will answer your questions. Was the action required to manually override the CAA validation failure different from what would be required if the CAA validation had succeeded? Could an operator have just "clicked the same

Re: Incident Report - Misissuance of one certificate without DNS CAA authorization (Certigna)

2018-09-16 Thread josselin.allemandou--- via dev-security-policy
Hello Thank you all for your feedback for which we have tried to provide additional information below. Know that if necessary, you will also find the description of our practices through the following links: • our CPS : * Services CA :