User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.6) Gecko/20040113 Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.6) Gecko/20040113 From the original email: CALLENS Bart wrote: > Dear, > > as a Certification Authority that is allready present in the Belgian CA > Marketplace since 1998, we are seeking opportunities to work together > with leading software vendors and foundations to enhance the awareness > and usage of security and more specifically PKI based security by > end-users. Therefore we are wondering what would be the conditions, > possibilities and procedures to be included in the authority list of the > Mozilla browser (and firefox&camino browser). > > Certipost E-Trust is the former Belgacom E-Trust, you may have heard > from. Certipost is a joint-venture between Belgacom, the Belgian > national leading Telecom operator, and the Belgian Post Group. > > You will find more information on Certipost on its'corporate website > :www.certipost.be . You will find more information on the certification > services of Certipost (by its Business Unit Certipost E-Trust) on the > product website www.e-trust.be. > > In short, we are active as Certfication Service Provider and accepted by > the Belgian Social Security since 1998. We are compliant with the > European Directive and Belgian Law on Digital Signatures. As > Certification Service Provider, issuing qualified Certificates, we were > recently (september 2003)controlled by the Belgian Ministery of > economical affairs. We are also accepted as Trusted Root CA in the MS > Windows environment. > > Thank you in advance for your feed-back ! > > Bart. > > Bart Callens > Product Development Manager > ________________________________ > Certipost > Quai de Willebroek 22 Willebroekkaai > 1000 Brussel - Bruxelles Reproducible: Always Steps to Reproduce: 1. 2. 3.
This is an enhancement request.
Severity: normal → enhancement
I confirm that this is an enhancement request.
Status: UNCONFIRMED → NEW
Ever confirmed: true
Frank: do you have an email address for Mr Callens in your archives? Gerv
I have sent the following email to Bart.Callens@staff.certipost.be: Dear Mr Callens, Three years ago, you requested inclusion of the root certificate of your Certificate Authority in Mozilla products. https://bugzilla.mozilla.org/show_bug.cgi?id=239488 Since that time, we have formalised a CA Certificate policy, detailing how we process such requests: http://www.mozilla.org/projects/security/pki/nss/ca-certificates/policy.html We hope that this will bring clarity to the process. Due to the age of the request, the above mentioned bug report has been closed. If inclusion of your certificate(s) is still desired, please could you file a new bug report as specified in section 14 of the policy, including all the information requested by that clause. Many thanks, Gerv
Status: NEW → RESOLVED
Last Resolved: 12 years ago
Resolution: --- → WONTFIX
Dear Mr Markham thank you for your e-mail. Please find hereunder the requested information about our CA Certificates to be included in Mozilla products. Could you indicate further steps/timings for the actual inclusion ? Please let us know if additional information would be required in order to include our CA Certificates in the Mozilla products. Best regards, Bart. the certificate data (or links to the data) for the CA certificate(s) requested for inclusion; The 4 (self-signed) CA Certificates that are requested to be included are available for download on following location : http://www.certipost.be/download/Root%20and%20Primary%20CA%20certs.zip for each CA certificate requested for inclusion, whether or not the CA issues certificates for each of the following purposes within the CA hierarchy associated with the CA certificate: SSL-enabled servers, digitally-signed and/or encrypted email, or digitally-signed executable code objects; 1_Root SSL-enabled servers, digitally-signed and/or encrypted email, or digitally-signed executable code objects; 1.1_PrimaryQualifiedCA digitally-signed email 1.2_PrimaryNormalisedCA SSL-enabled servers, digitally-signed and/or encrypted email, or digitally-signed executable code objects; 1.3_PrimaryLightweightCA SSL-enabled servers, digitally-signed and/or encrypted email, or digitally-signed executable code objects; a Certificate Policy and Certification Practice Statement (or links to a CP and CPS) or equivalent disclosure document(s) for the CA or CAs in question; cfr attachment and information as to how the CA has fulfilled the requirements stated above regarding its verification of certificate signing requests and its conformance to a set of acceptable operational criteria. Detail description of this is included in the CPS in attachment. Finally, Certipost E-Trust is controlled by the Belgian Federal Public Service Economy, SMEs, Self-employed and Energy in conformity with the Belgian law of 9 July 2001 and European Directive on Digital Signatures, fixing certain rules related to the legal framework for electronic signatures and certification services. The list of controlled entities is published on http://www.mineco.fgov.be/information_society/e-signatures/list_e_signature_fr.pdf. Best regards, Bart.
Status: RESOLVED → REOPENED
Resolution: WONTFIX → ---
It seems Bart has opened another bug as well. Gerv
Status: REOPENED → RESOLVED
Last Resolved: 12 years ago → 12 years ago
Resolution: --- → DUPLICATE
Duplicate of bug: 369519
You need to log in before you can comment on or make changes to this bug.