Hello -
We have a customer at the VA who uses an Entrust root:
Issuer Entrust
AIA:
http://nfitestweb.managed.entrust.com/AIA/CertsIssuedToNFIMediumSSPCA.p7c
AIA:
ldap://nfitestdir.managed.entrust.com/ou=Entrust%20NFI%20Test%20Shared%20Ser
vice%20Provider,ou=Certification%20Authorities,o
[aside: this is how incident reports should be done, IMHO]
On Fri, Nov 22, 2019 at 07:23:27PM -0800, Apple CA via dev-security-policy
wrote:
> We did not have an accurate understanding of how the vulnerability scanner
> worked. Our understanding of its capabilities lead us to believe it was
> sc
On Sat, Nov 23, 2019 at 1:08 PM O'Donnell, Derek via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:
> We have a customer at the VA who uses an Entrust root:
> Issuer Entrust
>
> AIA:
> http://nfitestweb.managed.entrust.com/AIA/CertsIssuedToNFIMediumSSPCA.p7c
>
> They are rep
3 matches
Mail list logo