CAcert.org, the basic situation is that, like all CAs, it has
to go through some sort of audit or audit-like process. If you want to
know what they're currently doing with regard to that requirement, I
suggest contacting CAcert directly; I don't want to speak for them.
Frank
--
Frank Hecker
This really should be required reading for anyone interested in
anti-phishing defenses, the SSL UI, and related topics:
http://www.deas.harvard.edu/~rachna/papers/why_phishing_works.pdf
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto
(depending
on how many comments I get), and then I'll make a decision on this request.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
Frank Hecker wrote:
I'm finally getting back to working on requests for CA for their root
certificates to be included in NSS/Mozilla. (Yes, I suck for leaving
this undone for so long; my apologies.)
The first one I'm working on is for StartCom Ltd., bug 289077:
https://bugzilla.mozilla.org
Frank Hecker wrote:
I'm finally getting back to working on requests for CA for their root
certificates to be included in NSS/Mozilla. (Yes, I suck for leaving
this undone for so long; my apologies.)
The first one I'm working on is for StartCom Ltd., bug 289077:
https://bugzilla.mozilla.org
Frank Hecker wrote:
Continuing in my ongoing question to reduce the backlog of CA
applications, I'm now soliciting final comments on the application from
GRCA, bug 274106:
https://bugzilla.mozilla.org/show_bug.cgi?id=274106
snip
Since this request seems pretty straightforward I'm going
Frank Hecker wrote:
I'm working on a number of CA requests to get their certs included in
Mozilla, and I'm now soliciting comments on the application from
Firmaprofesional, bug 342426:
snip
Since this request seems pretty straightforward I'm going to have a
relatively brief comment period
Frank Hecker wrote:
Kyle Hamilton wrote:
Swisscom issues CRLs how often?
snip
Do they have an OCSP responder?
I got answers to these questions; see the bug report (342470).
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
period and then I'll make my final decision.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
Christian Barmala wrote:
Frank Hecker [EMAIL PROTECTED] wrote:
Wells Fargo has successfully completed a formal audit using the WebTrust
criteria.
Who was the auditor?
KPMG. (I thought I put this on my CA certificate page, but I didn't;
I'll add it now.)
Frank
--
Frank Hecker
[EMAIL
that such certificates should work
fine in Firefox and other Mozilla-based products, assuming that the
names are stored in the certificate using SubjectAltName as opposed to
CN. Am I correct in this supposition?
Frank
--
Frank Hecker
[EMAIL PROTECTED
names in the certificate.
In any case I'm surprised that more commercial CAs aren't supporting the
issuance of SSL certificates that handle some of these common situations.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev
Frank Hecker wrote:
Someone brought to my attention today that Go Daddy is now offering a
6-in-1 SSL certificate where they allow you to associate multiple
domain names from different TLDs with a single certificate:
https://www.godaddy.com/gdshop/whatsnew/landing.asp?se=%2Bapp%5Fhdr=ci=4635
:
http://www.hecker.org/mozilla/ca-certificate-list#geotrust
As noted in that entry and in the bug itself, Geotrust has successfully
completed a WebTrust audit and otherwise appears to be in compliance
with our current policy. Therefore I plan to approve this request.
Frank
--
Frank Hecker
[EMAIL
Nelson B wrote:
Frank Hecker wrote:
In looking at Geotrust's request to add more root CA certs (bug 294916)
I happened to notice that Geotrust offers a somewhat similar service,
[snip]
From the product description it appears that one domain
goes in the CN attribute and the rest
misinterpreted the description at
http://www.geotrust.com/products/ssl_certificates/power_server_id.asp
Thanks in advance for any info you can provide on this.
Frank
Nelson B wrote:
Frank Hecker wrote:
In looking at Geotrust's request to add more root CA certs (bug 294916)
I happened to notice
Frank Hecker wrote:
Nelson B wrote:
Frank Hecker wrote:
In looking at Geotrust's request to add more root CA certs (bug
294916) I happened to notice that Geotrust offers a somewhat similar
service, [snip]
From the product description it appears that one domain goes in the
CN attribute
preferences: Advanced - Security - Verification
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
My apologies for the semi-spam, but I thought that readers of this forum
might be interested in this NIST-sponsored PKI-related workshop. (I'll
most likely attend it myself, especially since it's not that far from
where I live.)
Frank
--
Frank Hecker
[EMAIL PROTECTED]
---BeginMessage---
6th
, etc., in other contexts I'm sure the NSS/NSPR/JSS developers
wouldn't mind the publicity.)
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
of a totalitarian state we wouldn't have such
confidence, so I think the North Korean example is a red herring. Per
our policy we always reserve the right to bar a CA from inclusion if we
think things are hinky (to use one of Bruce Schneier's favorite terms).
Frank
--
Frank Hecker
[EMAIL PROTECTED
to
post them here. In the meantime I'll work to come up with an initial
draft of proposed changes to the policy text, and will post that to the
bug when done.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto
-equivalent EV audit regime. Second, I would prefer that we use
the standard CAB Forum mechanisms to try and address this issue.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org
Frank Hecker wrote:
I've filed a bug against myself (399214) to update the current Mozilla
CA certificate policy to address the issue of extended validation
certificates.
After thinking about it, I think it may be possible to do this just by
adding a final paragraph to section 6
Eddy Nigg (StartCom Ltd.) wrote:
Frank Hecker wrote:
After thinking about it, I think it may be possible to do this just by
adding a final paragraph to section 6 of the current policy:
snip
Shouldn't be this be part of section 8 as this is a criteria for CA
operations (and its associated
/ shows this as well.
Also, you can try these in Vista/IE7 to see how they're handled there
vs. XP/IE6.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev
Frank Hecker wrote:
However the general changes to be made to the policy are
clear, even if the language is final,
s/final/not final/
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https
.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
solicit requests from
VeriSign and everyone else who'll be issuing EV certs, and those
requests will be handled in the normal way.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https
Eddy Nigg (StartCom Ltd.) wrote:
Frank Hecker wrote:
snip
Your implication here is that the CAB Forum EV guidelines can be used
as stand-alone guidelines comparable to the other criteria referenced
in section 8 (WebTrust for CAs, ETSI TS 101 456 and 102 242, and ANSI
X9.79). I'm
to be included. If I invite a CA to
have their EV root be included (or an existing root be marked as
EV-capable), and they don't respond to that invitation, then I likely
won't feel any obligation to do anything about their EV root.
Frank
--
Frank Hecker
[EMAIL PROTECTED
certificate extension per se. The EV policy OID is just added as
separate metadata to be associated with the pre-loaded root CA
certificate; there is nothing in the CA certificate itself that is
specifically EV-related.
Frank
--
Frank Hecker
[EMAIL PROTECTED
, the subordinate 2 CA lacks that policy OID
(or the anyPolicy OID) and so the EE cert will fail the EV test.
So AFAICT there's no need for NSS to pre-load the subordinate 1 CA cert.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing
Frank Hecker wrote:
OK, absent any objections my plan is to go ahead and commit this change
later today or tomorrow.
Done. The 1.1 release of the Mozilla CA certificate policy is now live
at the standard URL:
http://www.mozilla.org/projects/security/certs/policy/
Thanks to Eddy, Gerv
upgrades and related changes in order
to do testing of the NSS EV code (e.g., for Firefox 3 beta). Such
approval does not constitute approval for permanent upgrades, which will
be handled per policy as discussed above.
Frank
--
Frank Hecker
[EMAIL PROTECTED
auditors' report on management assertions (or whatever it's
called). However you can ask Melanie Raemy of SwissSign about that; just
post a comment in bug 343756 and she should see it.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing
was (one of) the criteria used in the audit. I'm confused by your
question: Is your concern that SAS/KPMG used a variant of ETSI TS
101.456, or a subset of it, or some other practice that did not actually
amount to an audit according to the ETSI TS 101.456 criteria?
Frank
--
Frank Hecker
[EMAIL
if the audit criteria
encompassed both ETSI TS 101.456 and ZertES, as long as the requirements
of ETSI TS 101.456 were satisfied.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org
of the audit letter and other documents; notarized copies
should suffice.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
of independent confirmation is worth doing
in other cases where CAs provide documents like this, especially if the
document in question is the sole or primary source of information we
have relating to independent audits and evaluations.
Frank
--
Frank Hecker
[EMAIL PROTECTED
://bugzilla.mozilla.org/attachment.cgi?id=286696 is in PDF format I
think
Please don't use the CPS documents attached to the bug. The English
version of the CPS is now available in PDF format directly from the
TÜRKTRUST site:
http://www.turktrust.com.tr/pdf/cps_third.pdf
Frank
--
Frank Hecker
comfortable.
See my previous message; the English version of the current CPS is at
http://www.turktrust.com.tr/pdf/cps_third.pdf
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https
that one must have been performed.
This is an issue worth discussing; I don't have any finished thoughts on
it right now.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https
of this on the CA recommended practices wiki
page, as a reminder.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
Nelson B Bolyard wrote:
Frank Hecker wrote:
For the record, I am pretty sure that we have CAs already in the root
list that have issued test certs under their hierarchies. IIRC the last
instance of this I saw was a CA that had a subordinate CA used to
testing purposes, under the root CA
Frank Hecker wrote:
I've therefore signaled my approval of this
application in bug 380635, and will proceed to file an NSS bug for
inclusion of the actual root CA certs.
Filed bug 410821 for inclusion of the TURKTRUST certs into NSS:
https://bugzilla.mozilla.org/show_bug.cgi?id=410821
.
Next step is figuring out the basic parameters for each request. Till
later...
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
by MIC in their public statement. I don't know if they
used the actual WebTrust criteria themselves, or something else judged
equivalent; this is worth asking about, and I have done so.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing
submit them now.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
regarding the CAs
we're looking at first.
Does this help answer your question?
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
certificates
directly, but has subordinate CAs which do so. (As you note, this is a
common setup in many countries.) That's why Gerv and I invested a fair
amount of effort trying to determine what these subordinate CAs actually do.
Frank
--
Frank Hecker
[EMAIL PROTECTED
to
specify the final criteria and guidelines only, to emphasize that the
drafts are obsolete and deprecated.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo
Eddy Nigg (StartCom Ltd.) wrote:
Frank Hecker wrote:
snip
To make this more concrete, I'll file a bug with a proposed policy
change to reflect this line of thinking.
OK. Please send me the bug number for reference, thanks!
https://bugzilla.mozilla.org/show_bug.cgi?id=413545
A proposed
Nelson Bolyard wrote:
Yes, Sorry. Bug 413375 .
See my comments in the bug. The bottom line is that IMO we need more
information before we can reasonably discuss policy changes related to
the issues you raise.
Frank
--
Frank Hecker
[EMAIL PROTECTED
Frank Hecker wrote:
The first step is getting a complete list of all
current EV-related CA requests. I believe the following is the complete
list, based on searching bugzilla:
I've got several of these listed now on the pending list, as noted
below; I 'll get the remainder up as soon as I
/show_bug.cgi?id=413545
Based on comments thus far this seems to be a relatively
non-controversial change, so I'm going to go ahead and make it after one
final call for comments.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
previous message.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
time I want to start the comment period
now.)
Note that the WebTrust EV audit for Digicert was done under the final EV
guidelines and WebTrust EV criteria, so its acceptance under our policy
is not dependent on making the proposed policy change discussed in my
earlier message.
Frank
--
Frank
time I want to start the comment period
now.)
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
Paul Hoffman wrote:
Will there be a cutoff for when Mozilla requires audits against the
final guidelines instead of allowing draft guidelines?
Yes, per the revised policy the cutoff date is June 30.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev
Frank Hecker wrote:
I've therefore proposed a new revision 1.2 of the policy to accept all
valid WebTrust EV audits, whether against the draft or final criteria
and guidelines, for all CA EV applications submitted on or before June
30 of this year:
https://bugzilla.mozilla.org
about for long-term NSS/PSM planning. It's sort of a special case
of the general problem of having NSS/PSM be able to take special actions
(either built-in or user-specified) based on certificate policy values.
Frank
--
Frank Hecker
[EMAIL PROTECTED
agreements, etc.
That's another factor that I have to take into consideration; I've been
and remain reluctant to hold new CA applicants to standards that aren't
clearly spelled out in our policy, if we're not yet applying those same
standards to older CAs.)
Frank
--
Frank Hecker
[EMAIL
, for example, we might not impose exactly the same audit
requirements as we would for other CAs.)
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
Go Daddy's request, as per the mozilla.org CA
certificate policy:
http://www.mozilla.org/projects/security/certs/policy/
and plan to officially approve this request after a public comment period.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev
OID(s) included.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
to that root would be a warning
message of some sort. (As always, if people think something like this
would be worthwhile, we can always consider funding the work.)
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto
for the Mozilla Foundation to
fund.)
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
Frank Hecker wrote:
Digicert has applied to upgrade an existing root CA certificate for EV
use, as documented in the following bug:
https://bugzilla.mozilla.org/show_bug.cgi?id=403644
and in the pending certificates list:
http://www.mozilla.org/projects/security/certs/pending
or not this is actually being done in practice, I think the EV
guidelines are pretty clear that it is not sufficient merely for the
root CA to be audited; the audit requirements extend to each and every
subordinate CA issuing EV certs.
Frank
--
Frank Hecker
[EMAIL PROTECTED
Frank Hecker wrote:
QuoVadis has applied to upgrade an existing root CA certificate for EV
use, as documented in the following bug:
https://bugzilla.mozilla.org/show_bug.cgi?id=403665
snip
I have evaluated QuoVadis's request, as per the mozilla.org CA
certificate policy:
http
certificate referenced in bug 407168; it is not
related to any other thawte CAs that might already be in the root list.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org
. In
the meantime I worked on a few other EV requests from CAs that don't
have dominant market share.
(More later, I have to run out for an emergency errand...)
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto
(Back from errand...)
Frank Hecker wrote:
Is your concern that the CPS is dated after the audit? First, feel free
to ask in the bug what changes were made between the audit and the date
of publication of the 1.0 CPS. (I'll do it as well if you don't do it
first.)
Don't bother, I already
assuming more logic here than there actually
is; I don't look as much at market share as might be justifiable.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo
, it is a coincidence, because these are two different sets of
certs. I presume you're referring to the message to m.d.planning, which
was then copied to m.d.t.crypto; that message was primarily about the
new VeriSign ECC roots, which are *not* going to be evaluated in time
for Firefox 3.0.
Frank
--
Frank Hecker
Frank Hecker wrote:
Here's my interpretation of what happened: KPMG audited against the True
businessID CPS of July 27, 2007
s/July 27, 2007/July 1, 2007/g
The version number of the document is 2.7, which is probably why I made
this particular error.
Frank
--
Frank Hecker
[EMAIL PROTECTED
Frank Hecker wrote:
The new CPS didn't exist at the time of the audit, but it did exist at
the time of the audit report.
Actually, the new CPS was in fact written and approved during the audit
period; see
https://bugzilla.mozilla.org/show_bug.cgi?id=407168#c26
The bottom line: I think
question that had a non-trivial answer.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
Certification Authority root:
COMODO EV SSL CA and COMODO EV SGC CA. These two subordinates are
the issuing CAs for end entity certs.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https
to the other eight
Comodo roots.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
, for exactly this reason.)
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
references is basically a case of Comodo
being honest and admitting that LiteSSL certs are adequate for some
purposes (e.g., securing a low-value personal or small group site like
my own) but not for others (e.g., running an online store). That
statement strikes me as unexceptional.
Frank
--
Frank
word here is knowingly. This
language in the policy was intended to cover cases where CAs were
willing and knowing accomplices to fraud.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https
with regard to LiteSSL certs, and ended up
introducing ambiguity into the CPS. However I don't think this amounts
to LiteSSL certs being totally insecure and unreliable; they appear to
be garden-variety domain-validated certs, no more and no less.
Frank
--
Frank Hecker
[EMAIL PROTECTED
EV intermediate CA certificates under
this root and the mentioning of DV,IV etc is wrong perhaps?
Yes, this is my mistake. I'll correct the entry for COMODO Certification
Authority in the pending list.
Frank
--
Frank Hecker
[EMAIL PROTECTED
steps as if they were new
roots.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
be useful then people are
free to contibute it or (if no one is willing or able to do it) the
Mozilla Foundation could help fund its creation.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https
Nelson B Bolyard wrote:
Frank Hecker wrote, On 2008-03-18 05:17:
Right now we don't have any technical mechanism to accept only EV
certificates issued within a CA hierarchy, but not EV certs from within
that same hierarchy.
snip
I suspect you meant ... to accept EV certs, but not NON-EV
COMODO
Certification Authority, which we already use for issuing one of our brands
of DV certificate.
Could you identify the subordinate CA in question and the Comodo brand
it's being used in conjunction with? This is information I'd like to add
the pending list entry.
Frank
--
Frank Hecker
on this product over the years, and especially to the folks at
Red Hat who finally managed to get the whole product released under open
source licenses.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto
Frank Hecker wrote:
thawte has applied to add a new EV root CA certificate to the Mozilla
root store, as documented in the following bug:
https://bugzilla.mozilla.org/show_bug.cgi?id=407163
snip
I have evaluated this request, as per the mozilla.org CA certificate
policy:
http
Frank Hecker wrote:
GeoTrust has applied to add a new EV root CA certificate to the Mozilla
root store, as documented in the following bug:
https://bugzilla.mozilla.org/show_bug.cgi?id=407168
snip
I have evaluated this request, as per the mozilla.org CA certificate
policy:
http
cert arena, for wildcard
certs or otherwise.
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
to worry about the GPL or LGPL terms).
Frank
--
Frank Hecker
[EMAIL PROTECTED]
___
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
Eddy Nigg (StartCom Ltd.) wrote:
We aren't talking here about a possible gain in material only (money,
credit cards), but also eavesdropping and acquiring information.
Breached privacy is a *LOSS* for the relying party and LOST trust in the
software upon which the relying party relies,
Robin Alden wrote:
Issuing
long-lived DV certs and wildcard DV certs may be particular practices
worth our having some formal positions on, even if they're not
addressed
by our official policy.
[Robin said...]
There I have to disagree to some degree.
You have a policy which tells us
Robin Alden wrote:
Perhaps my problem then is understanding the process at all. You seem to
suggest that once our application for EV status is approved we somehow
become immune to changes in your CA policy. Why do you feel that Mozilla
has no control over the CAs other than at the point of
Robin Alden wrote:
Is there anything remaining which would now hold up approval of our CA
requests?
I have to go through all this and write up my final statement on the
issues at hand. I think all issues have been responded to one way or
another.
Frank
1 - 100 of 300 matches
Mail list logo