Please add KamuSM Root CA certificate

RESOLVED INCOMPLETE

Status

NSS
CA Certificate Root Program
P2
enhancement
RESOLVED INCOMPLETE
13 years ago
a year ago

People

(Reporter: Mustafa Kuscu, Assigned: gerv)

Tracking

Firefox Tracking Flags

(Not tracked)

Details

(URL)

(Reporter)

Description

13 years ago
User-Agent:       Mozilla/5.0 (compatible; Konqueror/3.4; Linux) KHTML/3.4.0 (like Gecko)
Build Identifier: 

KamuSM (Kamu Sertifikasyon Merkezi) is the government's certification service   
provider in Turkey.    
   
KamuSM root certificate is located at:   
http://www.kamusm.gov.tr/BilgiDeposu/KOKSHS.crt   
   
Looking at bug #274100, I am getting the impression that intermediary CAs are   
not accepted. In case that policy changes soon, KamuSM intermediary CA is at:   
http://www.kamusm.gov.tr/BilgiDeposu/KAMUESHS.crt   
   
CP can be found at (in Turkish language):   
http://www.kamusm.gov.tr/SI   
   
CPS can be found at (in Turkish):   
http://www.kamusm.gov.tr/SUE   
   
KamuSM is listed as an official Certification Service Provider at the website   
of the Telecommunications Authority of Turkey (Telekomunikasyon Kurumu):   
http://www.tk.gov.tr/eimza/ESHS.htm   
   
KamuSM has been audited by Telekomunikasyon Kurumu according to the  
regulations, as well as it holds a BS7799-2 certificate.   
 

Reproducible: Always
(Reporter)

Comment 1

13 years ago
Sorry, my memory 
KamuSM CP is at: 
http://www.kamusm.gov.tr/BilgiDeposu/KSM_SI/ 
 
CPS is at: 
http://www.kamusm.gov.tr/BilgiDeposu/KSM_SUE/ 
 
Summary: Please add KamuSM Root CA certificate → Please add KamuSM Root CA certificate
I confirm that this is an enhancement request.
Status: UNCONFIRMED → NEW
Ever confirmed: true
QA Contact: ca-certificates
Priority: -- → P2
Hi Mustafa,

There are a large number of outstanding CA requests, and it will take me some time to work through them. You can, should you wish, speed up the processing of your request by providing the following data in the following format, as a *plain text comment* in this bug. This will help me do whatever evaluation is necessary, and then will be part of a public record describing the Mozilla default root certificates.

Some of the information may already be present in, or calculable from, data in this bug or other Mozilla-maintained documents. However, having it all in one place in a standard plain format for each request will save me a great deal of time, and help me to make everyone happier quicker. :-)

CA Details
----------

CA Name:
Website:
One Paragraph Summary of CA, including the following:
 - General nature (e.g., commercial, government, academic/research, nonprofit)
 - Primary geographical area(s) served
 - Number and type of subordinate CAs
Audit Type (WebTrust, ETSI etc.):
Auditor:
Auditor Website:
Audit Document URL(s):
  
Certificate Details
-------------------
(To be completed once for each certificate)
  
Certificate Name:
Summary Paragraph, including the following:
 - End entity certificate issuance policy
Certificate HTTP URL (on CA website):
Version:
SHA1 Fingerprint:
MD5 Fingerprint:
Modulus Length (a.k.a. "key length"):
Valid From (YYYY-MM-DD):
Valid To (YYYY-MM-DD):
CRL HTTP URL:
OCSP URL:
Class (domain-validated, identity-validated or EV):
Certificate Policy URL:
CPS URL:
Requested Trust Indicators (email and/or SSL and/or code):

Thanks for your help in this matter. :-)

Gerv
Mustafa: It's been over a month. Are you able to provide the requested information?

Thanks,

Gerv
Reassign all open CA bugs to me. Apologies for the bugspam.

Gerv
Assignee: hecker → gerv
No response in two and a half months; resolving INCOMPLETE.

Gerv
Status: NEW → RESOLVED
Last Resolved: 11 years ago
Resolution: --- → INCOMPLETE

Updated

a year ago
Product: mozilla.org → NSS
You need to log in before you can comment on or make changes to this bug.