at it ships in its products?
If so, you should post this question in the dev-security-policy list.
Note that Daniel asked me about this first, and I couldn't remember
where this issue fell with respect to policy vs. technology. So I was
the one who suggested he post here.
Frank
--
Frank
or until Certicom further loosens the license language
(which depends on its own business interests, of course).
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
tinguish between ECC
and (e.g.) RSA, AES, etc., and have permitted export of open source
encryption code since 2000 or so.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
ne else. In the
US the original developer may not even be credited, unless that was
specifically provided for in the agreement. (Other countries have a
"moral rights" concept that changes this somewhat.)
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mai
assignment are
to have a single copyright holder for the purposes of enforcing the
copyright (the FSF case) and to be able to relicense the entire work
under a different license (the MySQL AB case).
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto
genuine
interest in supporting GOST and someone willing and able to do the
implementation.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
hread/791684fa7b490e96#
Also, like the list above this list is generated from an XML file.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
from including the SHA-256 root is pretty small.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
, would it not?
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
advice, this answers the question as far as I'm concerned.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
ext 3.0.x release (3.0.11, I believe).
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
. (Does this include the case when Firefox, etc., receive a
full cert chain that includes the old root?)
Is the above a correct reading of your comments?
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.o
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
, and we're still awaiting an
answer. Maybe Frank can make something good happen there.
Unfortunately I don't have any real power with respect to what goes into
Firefox 3.5 :-( However I will do what I can.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailin
hus having
the root "revoked"?
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
albiii wrote:
Please get Mozillla's Window Snider involved. That powerhouse of convincing
attitude can make anything happen ! :-)
Note that Window no longer works for Mozilla:
http://blog.mozilla.com/security/2008/12/10/leaving-mozilla/
Frank
--
Frank Hecker
hec...@mozillafoundatio
arian
localization team to double-check the translation. However they are
volunteers, and I do not want to burden them by asking them to check the
entire CPS translation.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
ngage in. If you and others
disagree with that philosophy then you all are free to try to convince
the appropriate people
https://wiki.mozilla.org/Module_Owners_Activities_Modules#Governance_Submodule:__Module_Ownership_System
to override my views on the matter.
Frank
--
Frank Hecker
hec...@m
s.google.com/group/netscape.public.mozilla.crypto/msg/45e7135322b15f4c
So, consistent with my position back then, I am *not* in favor of our
imposing a policy requirement that CAs (or their resellers) not engage
in spamming. It's not directly relevant to a CA's performance as a CA.
Fra
Humphrey of
Seneca and ask him to add this to the candidate student project list
he's creating.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
commitment yet to support CIDP. So it is best for CAs if their
CRLDP extension references a URI for a full CRL, not a partitioned CRL.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
, are they doing partitioned CRLs like Hongkong
Post? Or is the CRL a full CRL?
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
ioned
CRL. Please correct me if I'm wrong.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
certificates
continue to be recognized in Firefox, etc.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
no support/unknown
status or full support/known status). The third scenario was introduced
by RFC 5280.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
#x27;ve already had the treatment
of the CIDP extension in CRLs as one example, and I think we've
concluded that that particular difference is not an issue. (I agree with
Nelson that the 5280 language on non-support of CIDP is flawed and can
be safely ignored.)
Frank
Nelson B Bolyard wrote:
Frank Hecker wrote, On 2009-02-20 16:53:
"However, implementations that do not support this extension MUST
either treat the status of any certificate *not listed on this CRL*
as unknown or locate another CRL that does not contain any
unrecog
7;ll post as a followup to your earlier
post about RFC 5280.
I'm looking forward to reading your comments on this. As I wrote, I
don't yet fully understand this particular section of RFC 5280.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech
Nelson B Bolyard wrote:
Frank Hecker wrote, On 2009-02-23 11:30:
I have no problem with NSS ignoring CRLs with CIDP extensions in the
context of CRLDP support; however I think that (e.g.) Firefox should not
treat this as an error but should proceed as if no CRL were ever seen.
(I think it'
't speak for the NSS developers, however speaking personally I see
no reason to drop support for manual import of CRLs.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
As.
Gerv Markham was pretty heavily involved in the IDN issues with domain
name registrars. I've copied him on this in hopes he can add more
information.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.o
were not present at
all. That seems to be the approach you've taken. That would seem to be
consistent with the strict wording of the RFC, unless there's something
else in the RFC to the contrary.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev
Frank Hecker wrote:
Option 4: Hongkong Post makes no changes to either its CRLs or its end
entity certs, and NSS ignores partitioned CRLs encountered in CRL DP
processing. In this option Hongkong Post would make no changes
whatsoever to its current practices. NSS would fetch the partitioned
oading the full CRL manually -- in other words, it would
maintain the same situation we're in now in the absence of CRL DP
support in NSS.
Your thoughts?
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
Jean-Marc Desperrier wrote:
Frank Hecker wrote:
[...] Am I right that someone
who wished to check revocation status on EE certs in Firefox could just
download the full CRL and use that? [...]
The right word is indeed *could*.
The address of that CRL *does not* appear inside the certificate
? (In other words, if we were to
include the Hongkong Post root in NSS then there's no possibility of NSS
throwing errors unless someone tries to use the partitioned CRLs.)
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla
tation
of partitioned CRLs unless we see many other CAs using them.
I think implementation of partitioned CRLs is already blocked by
insufficient developer resources, independent of what our policy might
say on the matter.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-
for us. If everybody agree with, we can send
you the fair portion of CPS in english and our auditor will confirm you
the genuineness of the document.
To repeat what I wrote elsewhere: This plan is acceptable to us.
Fran
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing
from the CPS that was referenced in your audit.
Kathleen, as I understand it, Yannick Leplard of Certigna has proposed
doing option 2 above, and that would be acceptable to us as far as I'm
concerned.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev
y has published
a useful set of guidelines for how to properly redact Microsoft Work
documents published as PDF files:
http://www.fas.org/sgp/othergov/dod/nsa-redact.pdf
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
rom the CPS.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
manual" that is
internal-only.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
David E. Ross wrote:
On 2/10/2009 12:06 PM, Frank Hecker wrote:
If you cannot publish the CPS because it contains private information, I
suggest as an alternative that you provide some sort of official
Certigna document that summarizes the portions of the CPS that are of
most interest to us
Eddy Nigg wrote:
On 02/10/2009 10:06 PM, Frank Hecker:
If you cannot publish the CPS because it contains private information, I
suggest as an alternative that you provide some sort of official
Certigna document that summarizes the portions of the CPS that are of
most interest to us (i.e., those
es, please feel free.
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
ibble about whether particular measures are "reasonable" or
not. However traditionally the major concerns we've had were with CAs
that did not have any CPS or CP language at all about verifying email
addresses.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto m
document that summarizes the portions of the CPS that are of
most interest to us (i.e., those relating to validation of subcriber
information).
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo
agree, especially for the non-EV case. Use of CRLs is going to
continue to be widespread for some time to come, so I think we really
have no choice but to invest in better CRL support (including putting
Mozilla funding into this if needed).
Frank
--
Frank Hecker
hec...@mozillafoundation.org
-
ricted community like tax preparers, but I think the
chances of any nationwide certificate use by all taxpayers are very low
given the failure of past efforts (like those of the USPS) to establish
a general US government-to-citizen PKI.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-
nt of Mozilla (i.e., not employees or contractors of MoCo,
MoFo, etc.).
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
who commented.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
r post.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
threads.
Given the problems we've had in getting this group up and running, I'd
prefer to wait a few more days before we start switching policy-related
discussions over to it.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
Eddy Nigg wrote:
On 02/05/2009 04:05 AM, Frank Hecker:
* In the near term I think we should make it a recommended practice that
CAs should revoke certificates whose private keys are known to be
compromised, as well as certificates for which subscriber verification
is known to be invalid.
Well
a CPS said something like "Causes for
certificate revocation include ... compromise of the private key". This
leaves it somewhat unclear whether the CA can unilaterally revoke or not.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@l
, but that's just my view.
Actually if Kathleen can take over the bulk of the CA request processing
then I think I would have time for dealing with some of these policy
issues. The only unsustainable thing is having me be on the critical
path for CA evaluation.
Frank
--
Frank Hecker
hec..
cases we need to worry
about, which is one reason why I'd like us to first get some experience
with what CAs are actually putting in their CPSs.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
7;t see it as necessary, since the facts were known to
all.)
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
ring there.
OK, thanks for the info. I guess we'll just wait for this to resolve
itself, then we can verify that the new group is operating properly (and
the mailing list also) and then make an announcement in m.d.t.crypto and
m.d.security.
Frank
--
Frank Hecker
hec...@mozillafoundation.
mplies that
the new group is up and running, while I can't find it either in
Thunderbird (i.e., via NNTP) or on the Google Groups site.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
te any larger problem of incompetence or
maliciousness.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
in NSS or PSM to blacklist certs which we think
are suspect even if the CA does not?
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
ry to bug
394419 and then ping me for final approval?
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
nd encouraging S-TRUST to move to a scheme where they use a
longer-lived root for these certs.
Kathleen, could you post a summary to bug 370627, and then ping me for
final approval?
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla
and nothing
warranted a comment from my side either. Green light on.
I've reviewed the material as well and I agree that this should go forward.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
s are raised in the next couple of days, then I
will assume it’s OK to move forward with inclusion.
You have my approval to move forward with this. Feel free to post a
summary to bug 368970 and then ping me when you're done so I can add my
formal approval.
Frank
--
Frank
ome resolution of some of
the earlier issues left hanging.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
previously-validated CSRs to the CA, and get back certificates in
return.) In these cases the enterprises are essentially acting as RAs.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla
o be taken), but I don't
recall it being made explicit in the post.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
eir own
internal systems (e.g., HR databases).
Frank
--
Frank Hecker
hec...@mozillafoundation.org
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
practices and a corresponding (reasonably)
common meaning on what EV meant.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
lem or this MD5
thing, where someone else might be able to do a MITM attack, capture our
IMAP and SMTP passwords and access our mail accounts, capture our blog
passwords and be able to post as us, etc.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
_
run afoul of the whole "qualified certificate" issue in
the EU. (However in practice we don't accord qualified certificates any
special treatment, so it may be a moot point.)
Frank
--
Frank Hecker
hec...@mozillafoundation.org
___
de
cause us significant liability in the event of a breach. We support DV
certs in browsers for that market.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
up, but you shouldn't expect an immediate response if you post
something or email me. I'm going to try to post a summary of where
things are either tonight or tomorrow morning.
--
Frank Hecker
hec...@mozillafoundation.org
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
turned out, people didn't want to do that for various
reasons, but I myself am not wedded to the idea that the default root
list should never be changed by downstream distributors.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
___
dev-tech-cryp
t future Comodo
WebTrust audits could and IMO should look at the question of how Comodo
deals with resellers and affiliates, as part of the task of determining
whether Comodo is operating in accordance with its CPS.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
_
Kyle Hamilton wrote:
https://bugzilla.mozilla.org/show_bug.cgi?id=426575
UTN-UserFIRST-Hardware is enabled for EV per that bug.
My apologies, you are right and my recollection was wrong.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
___
dev
by a non-EV
legacy root.
(AFAIK this scenario was/is not unique to Comodo. I believe all the
VeriSign EV CAs work this way as well: a newly added and EV-enabled EV
root cross-signed by a non-EV legacy root.)
Frank
--
Frank Hecker
hec...@mozillafoundatio
Michael Ströder wrote:
Frank Hecker wrote:
From my point of view I'd wait on more
information regarding items 2 and 3 above before making a recommendation.
Could you please define a time-frame within Comodo MUST react?
Comodo (in the person of Robin Alden) has already made a reply:
Eddy Nigg wrote:
My blog article and exposure has provoked somebody to come forward with
additional evidences concerning the reseller activities of Comodo. In
order to protect the innocent I decided to provide this information
confidentially to Frank Hecker for now. Stay tuned.
To expand on
.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
ites is special-cased),
but it could affect non-EV sites under other Comodo brands (I mean,
other than the PositiveSSL brand) and it could also affect other CAs
whose CA certs are cross-signed by the UTN-UserFirst-Hardware root.
Frank
--
Frank Hecker
hec...@mozill
r nature we can directly verify, and some we can't.
For example, we can certainly verify how Certstar is operating currently
(as Eddy and I did), and if certs get revoked we can verify that by
downloading the CRLs that get issued.
Frank
--
Frank Hecker
hec...@m
he ultimate legal authority resides in
the board of the Mozilla Foundation (of which Mitchell and Brendan are
members).
For more background on this see
http://www.mozilla.org/hacking/module-ownership
http://blog.lizardwrangler.com/2008/05/30/governance-and-module-ownership/
Frank
--
Frank
actual security threat to users. Right now we have no real
idea as to the extent of the problem (e.g., how many certs might have
been issued without proper validation, how many of those were issued to
malicious actors, etc.).
Frank
--
Frank Hecker
hec
e typical interval between security updates for Firefox and
other Mozilla-based products.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
Eddy Nigg wrote:
For those interested, Frank opened a bug to investigate this incident:
https://bugzilla.mozilla.org/show_bug.cgi?id=470897
Actually Nelson opened this bug.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
___
dev-tech-crypto
arding items 2 and 3 above before making a recommendation.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
ight now.
Why does everything have to have an explicit 'threat model' before
cryptography can be applied?
Well, it doesn't necessarily. My concern in this case had more to do
with justifying any extra work that might be involved on our end in
terms of getting the documents
#x27;m running a Mac with VMware Fusion I can check it out on
a variety of platforms with different PDF readers.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
bird, SeaMonkey, et.al. (And of course, just because email is a
secondary use now doesn't mean it will always be so.)
Frank
--
Frank Hecker
hec...@mozillafoundation.org
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.
n't address protection of Bugzilla
comments. Besides, any such attempt would likely be quickly detected
when Kathleen or I upload documents ourselves.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
___
dev-tech-crypto mailing list
dev-tech-
rting them to the start of the public discussion period and asking
them to respond to this question.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinf
or the specific regulations, and get them translated.
That's a good idea, I'll do that. I'd like to get a definitive answer on
this question, since I know I've seen this practice with other CAs,
including I think at least one not in Germany.
Frank
--
Frank
m glad that after a diet of Hungarian and Japanese we have
something more to your taste :-)
Frank
--
Frank Hecker
hec...@mozillafoundation.org
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
r preparing these!
As we did with SECOM Trust, I'm planning to have a single one-week
discussion period. After that week, if there are no outstanding issues
relating to the request then I am going to go ahead and officially
approve it. (Otherwise we'll postpone further discussion until
l likely cause delays
with their application.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
ndeed have these, but not all.
Frank
--
Frank Hecker
hec...@mozillafoundation.org
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
ew request. The current request is to enable the new root
for SSL use only.
Note that I have in fact reviewed various sections of the CPS and CP,
using Google Translate. I didn't see anything in them that was
inconsistent with what I've written above.
Frank
--
Frank Hecker
hec...@m
1 - 100 of 437 matches
Mail list logo