Request to include CA cert for Certipost E-Trust

RESOLVED DUPLICATE of bug 369519

Status

NSS
CA Certificate Root Program
--
enhancement
RESOLVED DUPLICATE of bug 369519
15 years ago
a year ago

People

(Reporter: Frank Hecker, Assigned: Frank Hecker)

Tracking

Firefox Tracking Flags

(Not tracked)

Details

(Assignee)

Description

15 years ago
User-Agent:       Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.6) Gecko/20040113
Build Identifier: Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.6) Gecko/20040113

From the original email:

CALLENS Bart wrote:
> Dear,
>
> as a Certification Authority that is allready present in the Belgian CA
> Marketplace since 1998, we are seeking opportunities to work together
> with leading software vendors and foundations to enhance the awareness
> and usage of security and more specifically PKI based security by
> end-users. Therefore we are wondering what would be the conditions,
> possibilities and procedures to be included in the authority list of the
> Mozilla browser (and firefox&camino browser).
>
> Certipost E-Trust is the former Belgacom E-Trust, you may have heard
> from. Certipost is a joint-venture between Belgacom, the Belgian
> national leading Telecom operator, and the Belgian Post Group.
>
> You will find more information on Certipost on its'corporate website
> :www.certipost.be . You will find more information on the certification
> services of Certipost (by its Business Unit Certipost E-Trust) on the
> product website www.e-trust.be.
>
> In short, we are active as Certfication Service Provider and accepted by
> the Belgian Social Security since 1998. We are compliant with the
> European Directive and Belgian Law on Digital Signatures. As
> Certification Service Provider, issuing qualified Certificates, we were
> recently (september 2003)controlled by the Belgian Ministery of
> economical affairs. We are also accepted as Trusted Root CA in the MS
> Windows environment.
>
> Thank you in advance for your feed-back !
>
> Bart.
>
> Bart Callens
> Product Development Manager
> ________________________________
> Certipost
> Quai de Willebroek 22 Willebroekkaai
> 1000 Brussel - Bruxelles 

Reproducible: Always
Steps to Reproduce:
1.
2.
3.
(Assignee)

Updated

15 years ago
Depends on: 233453
Assignee: hecker → hecker
This is an enhancement request.
Severity: normal → enhancement
I confirm that this is an enhancement request.
Status: UNCONFIRMED → NEW
Ever confirmed: true
QA Contact: ca-certificates
Frank: do you have an email address for Mr Callens in your archives?

Gerv
I have sent the following email to Bart.Callens@staff.certipost.be:

Dear Mr Callens,

Three years ago, you requested inclusion of the root certificate of your
Certificate Authority in Mozilla products.
https://bugzilla.mozilla.org/show_bug.cgi?id=239488

Since that time, we have formalised a CA Certificate policy, detailing how we
process such requests:
http://www.mozilla.org/projects/security/pki/nss/ca-certificates/policy.html
We hope that this will bring clarity to the process.

Due to the age of the request, the above mentioned bug report has been closed.
If inclusion of your certificate(s) is still desired, please could you file a
new bug report as specified in section 14 of the policy, including all the
information requested by that clause.

Many thanks,

Gerv
Status: NEW → RESOLVED
Last Resolved: 12 years ago
Resolution: --- → WONTFIX

Comment 6

12 years ago
Dear Mr Markham

 

thank you for your e-mail. 

 

Please find hereunder the requested information about our CA Certificates to be included in Mozilla products. Could you indicate further steps/timings for the actual inclusion ?


Please let us know if additional information would be required in order to include our CA Certificates in the Mozilla products.

 

Best regards,


Bart.

 

 

the certificate data (or links to the data) for the CA certificate(s) requested for inclusion; 

 

The 4 (self-signed) CA Certificates that are requested to be included are available for download on following location : 

 

http://www.certipost.be/download/Root%20and%20Primary%20CA%20certs.zip

 

for each CA certificate requested for inclusion, whether or not the CA issues certificates for each of the following purposes within the CA hierarchy associated with the CA certificate: 

SSL-enabled servers, 

digitally-signed and/or encrypted email, or 

digitally-signed executable code objects; 

 

1_Root 

 

SSL-enabled servers, 

digitally-signed and/or encrypted email, or 

digitally-signed executable code objects; 

 

 

1.1_PrimaryQualifiedCA

 

digitally-signed email

 

1.2_PrimaryNormalisedCA

 

SSL-enabled servers, 

digitally-signed and/or encrypted email, or 

digitally-signed executable code objects; 

 

1.3_PrimaryLightweightCA

 

SSL-enabled servers, 

digitally-signed and/or encrypted email, or 

digitally-signed executable code objects; 

 

 

a Certificate Policy and Certification Practice Statement (or links to a CP and CPS) or equivalent disclosure document(s) for the CA or CAs in question;

 

cfr attachment

 

and 

 

information as to how the CA has fulfilled the requirements stated above regarding its verification of certificate signing requests and its conformance to a set of acceptable operational criteria.

 

Detail description of this is included in the CPS in attachment. 


Finally, Certipost E-Trust is controlled by the Belgian Federal Public Service Economy, SMEs, Self-employed and Energy in conformity with the Belgian law of 9 July 2001 and European Directive on Digital Signatures, fixing certain rules related to the legal framework for electronic signatures and certification services. The list of controlled entities is published on http://www.mineco.fgov.be/information_society/e-signatures/list_e_signature_fr.pdf.

 

Best regards,


Bart.

Reopening.

Gerv
Status: RESOLVED → REOPENED
Resolution: WONTFIX → ---
It seems Bart has opened another bug as well.

Gerv
Status: REOPENED → RESOLVED
Last Resolved: 12 years ago12 years ago
Resolution: --- → DUPLICATE
Duplicate of bug: 369519

Updated

a year ago
Product: mozilla.org → NSS
You need to log in before you can comment on or make changes to this bug.