Add Certainly R1 and E1 Root Certificates
Categories
(CA Program :: CA Certificate Root Program, task, P2)
Tracking
(Not tracked)
People
(Reporter: wthayer, Assigned: bwilson)
References
Details
(Whiteboard: [ca-approved] - In NSS 3.80, FF 103)
Attachments
(7 files, 1 obsolete file)
Certainly would like to request the inclusion of our RSA (R1) and ECDSA (E1) root certificates.
These roots will only issue TLS server and client authentication certificates.
CCADB Case: https://ccadb-public.secure.force.com/mozilla/PrintViewForCase?CaseNumber=00000829
The CA certificates, CP/CPS, and other policy documents may be found at https://certainly.com/repository/
The following audit reports are attached to this bug: Root Key Generation Ceremony, Key Protection period, and WTCA and WTBR point-in-time.
Reporter | ||
Comment 1•4 years ago
|
||
Reporter | ||
Comment 2•4 years ago
|
||
Reporter | ||
Comment 3•4 years ago
|
||
Reporter | ||
Comment 4•4 years ago
|
||
Assignee | ||
Updated•4 years ago
|
Reporter | ||
Comment 5•4 years ago
|
||
Assignee | ||
Updated•4 years ago
|
Reporter | ||
Comment 6•4 years ago
|
||
Ben, ALV is failing because (1) the reports are point-in-time, and (2) they are not hosted on the Auditor's website. Are these acceptable errors, or do I need to do something to correct them?
Assignee | ||
Comment 7•4 years ago
|
||
I wouldn't worry because those are acceptable errors given the current state of your audits, inclusion application, and the processing capabilities of the ALV system.
Assignee | ||
Updated•3 years ago
|
Assignee | ||
Updated•3 years ago
|
Reporter | ||
Comment 8•3 years ago
|
||
Version 1.3 of the Certainly CP/CPS has been published to https://certainly.com/repository/
Reporter | ||
Comment 9•3 years ago
|
||
Attaching an updated self-assessment based on Mozilla's new template and CP/CPS version 1.3.
Assignee | ||
Updated•3 years ago
|
Reporter | ||
Comment 10•3 years ago
|
||
Attaching Certainly's value statement (https://wiki.mozilla.org/CA/Quantifying_Value).
Assignee | ||
Comment 11•3 years ago
|
||
This review was conducted on 4-Mar-2022 based on an earlier CA Compliance Self Assessment.
Assignee | ||
Comment 12•3 years ago
|
||
Public discussion started today 4-4-2022 with closing of public discussion anticipated for 25-Apr-2022 - https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/EhXhiHfWGC8/m/58CH8CMwBgAJ
Assignee | ||
Comment 13•3 years ago
|
||
Public discussion closed today with a recommendation that Certainly's request be approved - https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/EhXhiHfWGC8/m/3PcJHizqAAAJ
Assignee | ||
Comment 14•3 years ago
|
||
The 7-day last-call period has now passed without comment.
Comment 15•3 years ago
|
||
As per Comment #14, and on behalf of Mozilla I approve this request from Certainly LLC to include the following root certificates:
** Certainly Root R1 (Websites)
** Certainly Root E1 (Websites)
I will file the NSS bug for the approved changes.
Comment 16•3 years ago
|
||
I have filed bug #1768970 against NSS for the actual changes.
Updated•3 years ago
|
Updated•2 years ago
|
Description
•