Fwd: Public Discussion of CommScope CA Inclusion Request

2023-08-30 Thread Ben Wilson
Forwarding to the list because this message did not appear to post. -- Forwarded message - From: So, Nicol Date: Wed, Aug 30, 2023 at 6:10 PM Subject: RE: Public Discussion of CommScope CA Inclusion Request To: CCADB Public Cc: Ben Wilson On Monday, August 28, 2023 at 5:49 PM

Re: CCADB Update: Audit Team Qualifications

2023-10-16 Thread Ben Wilson
Audit Team Qualifications. Until then, please refer to each separate root store policy for its audit team qualification requirements. Thank you - Ben, on behalf of the CCADB Steering Committee On Sun, Oct 15, 2023 at 11:26 AM Ben Wilson wrote: > All, > > Tomorrow, Monday, October 16, 2023, we

Public Discussion of D-Trust CA Inclusion Request

2023-11-03 Thread Ben Wilson
All, This email commences a six-week public discussion of D-Trust’s request to include the following CA certificates as publicly trusted root certificates in one or more CCADB Root Store Member’s program. This discussion period is scheduled to close on December 15, 2023. The purpose of this

Re: Public Discussion of D-Trust CA Inclusion Request

2023-11-06 Thread Ben Wilson
s in revoking misissued certificate <https://bugzilla.mozilla.org/show_bug.cgi?id=1862082> OPEN [leaf-revocation-delay] Ben On Fri, Nov 3, 2023 at 9:39 AM Ben Wilson wrote: > All, > > This email commences a six-week public discussion of D-Trust’s request to > in

Mozilla Blog Post About Root Store Policy Version 2.9

2023-09-18 Thread Ben Wilson
All, Recently, I posted on the Mozilla Security Blog a brief overview of updates to the Mozilla Root Store Policy (v 2.9). See https://blog.mozilla.org/security/2023/09/13/version-2-9-of-the-mozilla-root-store-policy/ Ben -- You received this message because you are subscribed to the Google

Re: Public Discussion of CommScope CA Inclusion Request

2023-10-03 Thread Ben Wilson
This is just a reminder that this Public Discussion is scheduled to close next Tuesday, October 10, 2023. On Wednesday, September 6, 2023 at 4:39:43 PM UTC-4 So, Nicol wrote: > On Fri, 01 Sep 2023 08:19:04 -0700, Antonios Chariton wrote: > > > > > Will you be a TLS Client Certificate-heavy

Re: Public Discussion of CommScope CA Inclusion Request

2023-10-10 Thread Ben Wilson
All, On August 28, 2023, we began a six-week, public discussion[1] on the following root CA certificates issued by Commscope: 1. CommScope Public Trust RSA Root-01: Use cases served/EKUs: - Server Authentication (TLS) 1.3.6.1.5.5.7.3.1 - Client Authentication

CCADB Update: Audit Team Qualifications

2023-10-15 Thread Ben Wilson
All, Tomorrow, Monday, October 16, 2023, we will be updating the AUDITS tab of “Add/Update Root Request” Cases in the CCADB to provide upload functionality for Audit Team Qualifications documents (mainly for WebTrust audits, as ETSI audit teams already include this information directly in audit

Re: Public Discussion of TrustAsia CA Inclusion Request

2023-08-17 Thread Ben Wilson
ndependently managed Root Store community forums (i.e., MDSP). [1] https://groups.google.com/a/ccadb.org/g/public/c/KHaSShYA-eY/m/toe8FHpnAwAJ Thank you, Ben Wilson, on behalf of the CCADB Steering Committee On Wed, Aug 9, 2023 at 8:13 AM Ben Wilson wrote: > Greetings, > This

Public Discussion of CommScope CA Inclusion Request

2023-08-28 Thread Ben Wilson
All, This email commences a six-week public discussion of CommScope’s request to include the following four (4) certificates as publicly trusted root certificates in one or more CCADB Root Store Member’s program. This discussion period is scheduled to close on October 10, 2023. The purpose of

Re: Email requirements to speak on behalf of a CA on the list

2022-12-14 Thread Ben Wilson
All, Besides this, I think there might be a misunderstanding with some people that they have to use a Gmail account for the list because it is hosted using Google Groups. I hope we can get the word out that any email address should be able to subscribe to this list. Ben On Tuesday, December

Empty JSON Array of Partitioned CRLs

2023-03-10 Thread Ben Wilson
All, The CCADB currently has a field titled, "JSON Array of Partitioned CRLs". We have previously instructed CAs that when there is no CRL, they should put an empty JSON array in this field, "[]". A problem has arisen when this field is populated via API. When this notation for an empty array is

Re: Digest for public@ccadb.org - 1 update in 1 topic

2023-03-13 Thread Ben Wilson
lic/topics> >> >>- Empty JSON Array of Partitioned CRLs >><#m_-1168315536955637031_m_6205175037828154458_group_thread_0> - 1 >>Update >> >> Empty JSON Array of Partitioned CRLs >> <http://groups.google.com/a/ccadb.org/group/public/t/e3b3a

Re: Announcing CRL Watch to Monitor CRL Problems

2023-02-20 Thread Ben Wilson
Thanks for doing this, Andrew. It is very helpful. Sincerely yours, Ben On Mon, Feb 20, 2023 at 6:48 AM Andrew Ayer wrote: > Now that several root programs require disclosure of CRLs in the CCADB, > I've begun regularly crawling disclosed CRLs to look for problems. > > The list of identified

Re: Public Discussion of SERPRO's CA Inclusion Request

2023-02-28 Thread Ben Wilson
discussion in April. Thanks, Ben On Thu, Dec 15, 2022 at 10:53 AM Kurt Seifried wrote: > I assume this resets the 6 week clock for dicussions? Or do they get to > call timeouts and run the clock out? > > On Thu, Dec 15, 2022 at 10:36 AM Ben Wilson wrote: > >> All, >> &g

Re: Public Discussion of SSL.com CA Inclusion Request

2023-04-07 Thread Ben Wilson
All, I have just completed a CP/CPS review of SSL.com's CP/CPS v. 1.16 and attached it to Bugzilla Bug #1799533 (https://bugzilla.mozilla.org/ show_bug.cgi?id=1799533). See https://bugzilla.mozilla.org/attachment.cgi?id=9327554 (Excel Spreadsheet). I would like SSL.com to read through my

Re: Public Discussion of SSL.com CA Inclusion Request

2023-05-02 Thread Ben Wilson
based on > Ben's remarks. > > Regards, > Leo > -- > *From:* 'Chris Clements' via CCADB Public > *Sent:* Tuesday, April 25, 2023 8:07 AM > *To:* Thomas Zermeno > *Cc:* CCADB Public ; Ben Wilson > *Subject:* Re: Public Discussion of SS

Re: Public Discussion of LAWtrust CA Inclusion Request

2023-06-13 Thread Ben Wilson
All, This is just a reminder that the public discussion period on this root inclusion request (S/MIME) ends this Friday, June 16th. Ben On Fri, May 5, 2023 at 2:40 PM Ben Wilson wrote: > All, > > This email commences a six-week public discussion of LAWtrust’s request to > include t

Updated Version of CCADB Policy to v. 1.2.3

2023-07-19 Thread Ben Wilson
All, The CCADB policy has been updated to Version 1.2.3 . This minor version increment represents a change to Section 5.1.2 (“Webtrust”) because WebTrust now has a seal file for Qualified Audits that is integrated with the CCADB. It is recommended that if a CA

Public Discussion of TrustAsia CA Inclusion Request

2023-07-05 Thread Ben Wilson
ID=21793782-d73e-4eac-b320-7307bc3e898f> Risk-vs-Value Justification: - https://bugzilla.mozilla.org/attachment.cgi?id=9323860 Thank you, Ben Wilson, on behalf of the CCADB Steering Committee -- You received this message because you are subscribed to the Google Groups "CCADB Public&q

Re: Questions about mozilla applied constraints

2023-08-10 Thread Ben Wilson
r if needed. Please let us know if we can provide further clarification. Thanks, Ben Wilson Mozilla Root Program On Tue, Aug 8, 2023 at 2:42 PM Daniel McCarney wrote: > Hi folks, > > The "IncludedCACertificateReportPEMCSV" > <https://ccadb-public.secure.force.com/mozilla

Re: Public Discussion of TrustAsia CA Inclusion Request

2023-08-09 Thread Ben Wilson
Greetings, This is just a reminder that public discussion closes on this a week from today. Thanks, Ben On Wed, Jul 5, 2023 at 1:44 PM Ben Wilson wrote: > All, > > This email commences a six-week public discussion of TrustAsia’s request > to include the following certificates

Re: Public Discussion of LAWtrust CA Inclusion Request

2023-06-19 Thread Ben Wilson
munity forums (i.e., MDSP). Thanks, Ben [1] https://groups.google.com/a/ccadb.org/g/public/c/gk8vbpg5WHo/m/T <https://groups.google.com/a/ccadb.org/g/public/c/gk8vbpg5WHo/m/ToThdPaCBQAJ> On Tue, Jun 13, 2023 at 3:14 PM Ben Wilson wrote: > All, > This is just a reminder that the public

Public Discussion of LAWtrust CA Inclusion Request

2023-05-05 Thread Ben Wilson
All, This email commences a six-week public discussion of LAWtrust’s request to include the following CA certificate as a publicly trusted root certificate in one or more CCADB Root Store Member’s program. This discussion period is scheduled to close on June 16, 2023. The purpose of this public

Re: Public Discussion of D-Trust CA Inclusion Request

2023-12-19 Thread Ben Wilson
ently managed Root Store community forums (e.g. MDSP). Thanks, Ben Wilson On behalf of the CCADB Steering Committee [1] https://groups.google.com/a/ccadb.org/g/public/c/EPVczE_6oCc/m/s90nO9-EBAAJ On Fri, Dec 8, 2023 at 10:52 AM Ben Wilson wrote: > Greetings, > > This is a reminder

Re: Seeking the public discussion of Algerian Root CA

2024-01-10 Thread Ben Wilson
ozilla.org/CA. Sincerely yours, Ben Wilson On Wed, Jan 10, 2024 at 8:29 AM Peter Mate Erdosi wrote: > Hello all, > > thank you for being here. > > I seek the details of the public discussion of Algerian Root CA inclusion. > > I found only this: https://bugzilla.mozi

CCADB Self-Assessment - Version 1.3 Released

2024-01-17 Thread Ben Wilson
e Self-Assessment (now reflects MRSP Version 2.9 requirements) - Chrome Root Program Policy v. 1.5 Self-Assessment (from Version 1.4) - CCADB policy v 1.3 Self-Assessment (from Version 1.2.1) - TLS BRs v 2.0.2 (from Version 2.0.0) Thank you, Ben Wilson, on behalf of the CC

Re: CCADB Self-Assessment - Version 1.3 Released

2024-01-18 Thread Ben Wilson
Assessment v 1.3? Could not find it from cabforum.org? > > BR, Antti > > keskiviikko 17. tammikuuta 2024 klo 20.39.38 UTC+2 Ben Wilson kirjoitti: > >> Greetings all, >> >> >> The CCADB Steering Committee has updated the CCADB Self-Assessment to Versio

Re: CCADB Update: Upcoming Addition of Network Security and S/MIME Audits in the CCADB

2023-12-19 Thread Ben Wilson
Greetings, The previously mentioned updates to the CCADB have been made. Please let us know if you have any questions. Thanks, Ben On Wed, Dec 13, 2023 at 3:29 PM 'Hannah Sokol' via CCADB Public < public@ccadb.org> wrote: > All, > > > > On Thursday, December 14, 2023, we will be updating the

Re: Public Discussion of D-Trust CA Inclusion Request

2023-12-08 Thread Ben Wilson
Greetings, This is a reminder that the public discussion period on the inclusion application of D-Trust will close next Friday, December 15, 2023. Thank you, Ben Wilson, on behalf of the CCADB Steering Committee On Mon, Nov 6, 2023 at 10:02 AM Ben Wilson wrote: > All, > > Regard

Public Discussion of Firmaprofesional CA Inclusion Request

2024-01-31 Thread Ben Wilson
All, This email commences a six-week public discussion of Firmaprofesional’s request to include the “FIRMAPROFESIONAL CA ROOT-A WEB” as a publicly trusted root certificate in one or more CCADB Root Store Member’s program. This discussion period is scheduled to close on March 13, 2024. The

Re: Public Discussion of Firmaprofesional CA Inclusion Request

2024-03-11 Thread Ben Wilson
All, This is just a reminder that the public discussion period ends this Wednesday, March 13. Thanks, Ben On Wednesday, January 31, 2024 at 3:12:59 PM UTC-7 Ben Wilson wrote: > All, > > This email commences a six-week public discussion of Firmaprofesional’s > reques

Re: Public Discussion of Firmaprofesional CA Inclusion Request

2024-03-25 Thread Ben Wilson
:54 AM UTC-6 Ben Wilson wrote: > All, > This is just a reminder that the public discussion period ends this > Wednesday, March 13. > Thanks, > Ben > > On Wednesday, January 31, 2024 at 3:12:59 PM UTC-7 Ben Wilson wrote: > >> All, >> >> T

Re: Proposed whiteboard tag for non-incident "bugs"

2024-05-23 Thread 'Ben Wilson' via CCADB Public
Hi Clint and Rob, This is relatively easy to implement, and we can start immediately by just adding [ca-infosharing] in the whiteboard. I've added it to the Mozilla CA Program wiki - https://wiki.mozilla.org/CA/Bug_Triage#Whiteboard_Tags ("For non-incident "lessons learned" and other descriptions