We are willing to prove that KISA audit criteria fulfills the Mozilla's 
requirements and CA browser forum requirement. And also to confirm the 
comparison by a third-party audit practitioner(such as Deloitte).

If what KISA audits fulfills the requirements, would that be all?

2014년 4월 2일 수요일 오전 1시 10분 59초 UTC+9, Kurt Roeckx 님의 말:
> On Tue, Apr 01, 2014 at 11:27:53AM +0800, Man Ho (Certizen) wrote:
> 
> > Hi All,
> 
> > 
> 
> > In this discussion of KISA CA, it seems to conclude that KISA root
> 
> > certificate should not be included in Mozilla trust list AND the
> 
> > subordinate CAs should apply for inclusion themselves. On the other
> 
> > hand, in the discussion regarding "Super CA", Mozilla seems to accept
> 
> > inclusion of "Super CA" by saying that their subordinate CAs must apply
> 
> > for inclusion of their own certificate until certain criteria are satisfied.
> 
> > 
> 
> > It is very confusing what position Mozilla will take. Does the
> 
> > subordinate CAs required to apply for inclusion themselves? It looks
> 
> > like that KISA CA is by definition also a "Super CA", isn't it?
> 
> 
> 
> It looks to me that after repeated request for more information,
> 
> KISA has failed to meet the requirements as discussed in the Super
> 
> CA thread, and so the LCAs should apply themself.
> 
> 
> 
> 
> 
> Kurt

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to