On 3/4/14, 11:38 AM, Kathleen Wilson wrote:
All,

I will appreciate your input on how to proceed with the KISA root
inclusion request.



All,

Thank you for your thoughtful and constructive input.

I believe that there is consensus on the following three points.

1) The KISA CA does not issue end-entity certificates for websites (SSL/TSL), Code Signing, or email (S/MIME), so there is no need for Mozilla to include the KISA root certificate.

2) LCAs are CAs who are licensed by KISA to operate in Korea, and they issue certificates for websites, code signing, and/or email. LCAs should apply for inclusion themselves and be audited annually according to Mozilla's CA Certificate Policy. (sections 11 through 14 of http://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/inclusion/)

3) Mozilla's policy requires audits that incorporate certain audit criteria, including the CA/Browser Forum's Baseline Requirements. KISA may incorporate this audit criteria into their annual audits of their LCAs, and demonstrate this audit criteria to Mozilla. Or the LCAs may get another audit from another organization according to this audit criteria.

Please let me know if I've missed anything.

Thanks,
Kathleen




_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to