Re: Certigna Root Renewal Request

2018-11-01 Thread Wayne Thayer via dev-security-policy
Having received no further comments, I am recommending approval of Certigna's inclusion request. I would first like to thank Certigna for their patience as this request spent a long time waiting on Mozilla. The disregard for CAB Forum requirements shown by Certigna's CAA exception process is a ve

Re: Certigna Root Renewal Request

2018-10-24 Thread Wayne Thayer via dev-security-policy
On Wed, Oct 24, 2018 at 3:02 PM David E. Ross via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > On 10/24/2018 1:07 PM, Wayne Thayer wrote: > > On Tue, Oct 23, 2018 at 1:46 PM David E. Ross via dev-security-policy < > > dev-security-policy@lists.mozilla.org> wrote: > > > >>

Re: Certigna Root Renewal Request

2018-10-24 Thread David E. Ross via dev-security-policy
On 10/24/2018 1:07 PM, Wayne Thayer wrote: > On Tue, Oct 23, 2018 at 1:46 PM David E. Ross via dev-security-policy < > dev-security-policy@lists.mozilla.org> wrote: > >> On 10/23/2018 11:45 AM, Wayne Thayer wrote: >>> I believe that the discussion over Certigna's reported CAA misissuance >>> [1][2

Re: Certigna Root Renewal Request

2018-10-24 Thread Wayne Thayer via dev-security-policy
On Tue, Oct 23, 2018 at 1:46 PM David E. Ross via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > On 10/23/2018 11:45 AM, Wayne Thayer wrote: > > I believe that the discussion over Certigna's reported CAA misissuance > > [1][2] has reached an end, even though some questions r

Re: Certigna Root Renewal Request

2018-10-23 Thread David E. Ross via dev-security-policy
On 10/23/2018 11:45 AM, Wayne Thayer wrote: > I believe that the discussion over Certigna's reported CAA misissuance > [1][2] has reached an end, even though some questions remain unanswered. If > anyone has additional comments or concerns about this inclusion request, > please respond by Friday 26

Re: Certigna Root Renewal Request

2018-10-23 Thread Wayne Thayer via dev-security-policy
I believe that the discussion over Certigna's reported CAA misissuance [1][2] has reached an end, even though some questions remain unanswered. If anyone has additional comments or concerns about this inclusion request, please respond by Friday 26-October. This request [3] has been in discussion si

Re: Certigna Root Renewal Request

2018-09-12 Thread Wayne Thayer via dev-security-policy
On Tue, Sep 11, 2018 at 12:37 AM josselin.allemandou--- via dev-security-policy wrote: > Hello, > > Thanks Wayne and Devon for your reply. > > We took the time to respond because we wanted to verify through an audit > that the SSL certificate requests processed since September 8th were in > compl

Re: Certigna Root Renewal Request

2018-09-11 Thread josselin.allemandou--- via dev-security-policy
Hello, Thanks Wayne and Devon for your reply. We took the time to respond because we wanted to verify through an audit that the SSL certificate requests processed since September 8th were in compliance with the CA/B Forum requirements for DNS CAA record checks. In general, this has been the c

Re: Certigna Root Renewal Request

2018-08-28 Thread asymmetric--- via dev-security-policy
On Wednesday, August 22, 2018 at 2:10:06 AM UTC-7, josselin@gmail.com wrote: > Thank you very much Devon for this analysis and the time past on our request. > > You will find below additional information. Sorry for the delay, I was on > vacation. The publication of the updated CP / CPS will

Re: Certigna Root Renewal Request

2018-08-22 Thread Wayne Thayer via dev-security-policy
Thank you for your response. On Wed, Aug 22, 2018 at 11:51 AM josselin.allemandou--- via dev-security-policy wrote: > We confirm that no, this is not the case. This is what we said in the CP / > CPS because we thought that these constraints could be regularly > encountered and that it could be b

Re: Certigna Root Renewal Request

2018-08-22 Thread josselin.allemandou--- via dev-security-policy
And just to clarify, when we specified this in the CP / CPS, we thought that the document signed by a legal representative at the time of the certificate request could be sufficient in terms of consent, and that despite our requests, the applicant have not wished to update their CAA registration

Re: Certigna Root Renewal Request

2018-08-22 Thread josselin.allemandou--- via dev-security-policy
We confirm that no, this is not the case. This is what we said in the CP / CPS because we thought that these constraints could be regularly encountered and that it could be bad for the business, but as I said in our answer, the controls to report the blocking cases were positioned since the begi

Re: Certigna Root Renewal Request

2018-08-22 Thread Wayne Thayer via dev-security-policy
On Wed, Aug 22, 2018 at 2:10 AM josselin.allemandou--- via dev-security-policy wrote: > > > > CPS Section 4.2.1: If the request is valid and allows to obtain with > accuracy the authorization to issue the certificate by

Re: Certigna Root Renewal Request

2018-08-22 Thread josselin.allemandou--- via dev-security-policy
Just in addition, because the point was raised to us, we also take into account the problem related to DNSSEC with the case where the zone is validly DNSSEC-signed and our CAA query times out. As mentioned above, the publication of the updated CP / CPS will be immediate, as soon as you confirm

Re: Certigna Root Renewal Request

2018-08-22 Thread josselin.allemandou--- via dev-security-policy
Thank you very much Devon for this analysis and the time past on our request. You will find below additional information. Sorry for the delay, I was on vacation. The publication of the updated CP / CPS will be immediate, as soon as you confirm that the level of detail is sufficient for you. T

Re: Certigna Root Renewal Request

2018-08-02 Thread asymmetric--- via dev-security-policy
Hello, Based on the updated documentation, I've compiled the following questions for clarification: CPS Section 1.4.2 states "Unless stated otherwise, in this document, “RA” covers the Registration Authority and Delegate Registration Authorities." CPS Section 3.2 calls out DRAs ab

Re: Certigna Root Renewal Request

2018-05-28 Thread westmail24--- via dev-security-policy
Hello, This request will be rejected or will be pending? Enjoy, Andrew. ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy

Re: Certigna Root Renewal Request

2018-04-12 Thread josselin.allemandou--- via dev-security-policy
We hope to have provided all the expected answers and documentation. Could you please tell us if the processing of our integration request will progress. Thank you for your reply. Best regards. ___ dev-security-policy mailing list dev-security-polic

Re: Certigna Root Renewal Request

2018-02-19 Thread josselin.allemandou--- via dev-security-policy
We hope to have provided all the expected answers and documentation. Could you please tell us if the processing of our integration request will progress. Thank you for your reply. Best regards. ___ dev-security-policy mailing list dev-security-policy@l

Re: Certigna Root Renewal Request

2018-01-29 Thread josselin.allemandou--- via dev-security-policy
Le jeudi 27 avril 2017 15:22:27 UTC+2, Aaron Wu a écrit : > This request from the Dhimyotis/Certigna is to include the SHA-256 ‘Certigna > Root CA’ certificate and turn on the Websites and Email trust bits. This root > certificate will eventually replace the SHA-1 ‘Certigna’ root certificate > t

Re: Certigna Root Renewal Request

2017-12-11 Thread josselin.allemandou--- via dev-security-policy
Just to let you know that CPSs for certificates that are not used for website authentication will be available by January 15, 2018. CPS for SSL / TLS certificates are already available in French and English versions. Best regards ___ dev-security-polic

Re: Certigna Root Renewal Request

2017-12-01 Thread josselin.allemandou--- via dev-security-policy
Thank you very much for this analysis and the time past on our request. You will find below additional information following your comments --- > “CP and terms and conditions are publicly available in a read‐only manner. > The C

Re: Certigna Root Renewal Request

2017-10-11 Thread asymmetric--- via dev-security-policy
Certigna BR Review Adding onto Nick’s suggestions, here are some notes from my review of this application request: Noteworthy good aspects: - The supplied PKI diagrams are clear and useful for understanding the hierarchy and purpose of each CA. Thank you for providing this. - CPs are in RFC 3

Re: Certigna Root Renewal Request

2017-09-15 Thread J. Allemandou via dev-security-policy
Thank you very much Nick for this analysis and the time past on our request. You will find below additional information. The publication of the updated CP / CPS will be immediate, as soon as you confirm that the level of detail is sufficient for you. Thank you in advance for your help and your

Re: Certigna Root Renewal Request

2017-09-08 Thread Nick Lamb via dev-security-policy
Thanks Kathleen, I have briefly inspected this BR Self Assessment document. Nothing terrifying leaped out at me that would lead me to ask that Mozilla deny the renewal, however I did find things worth mentioning here. The only listed 3.2.2.4 method is 3.2.2.4.5, Domain Authorization Document.

Re: Certigna Root Renewal Request

2017-09-08 Thread Kathleen Wilson via dev-security-policy
> This request from the Dhimyotis/Certigna is to include the > SHA-256 ‘Certigna Root CA’ certificate and turn on the > Websites and Email trust bits. This root certificate will > eventually replace the SHA-1 ‘Certigna’ root certificate > that was included via Bugzilla #393166. > ... > The req

Re: Certigna Root Renewal Request

2017-07-22 Thread josselin.allemandou--- via dev-security-policy
The ticket is open since 3 months. This seems to be correct for everyone. Is it possible to close it now ? ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy

Re: Certigna Root Renewal Request

2017-05-17 Thread Aaron Wu via dev-security-policy
All, I will greatly appreciate your help in reviewing and commenting on this root inclusion request from Certigna. Thanks, Aaron ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-

Certigna Root Renewal Request

2017-04-27 Thread awu--- via dev-security-policy
This request from the Dhimyotis/Certigna is to include the SHA-256 ‘Certigna Root CA’ certificate and turn on the Websites and Email trust bits. This root certificate will eventually replace the SHA-1 ‘Certigna’ root certificate that was included via Bugzilla #393166. Dhimyotis, t e name of th