Also curious what validation methods should be used for OU and E when Mozilla 
policy 2.2.1 is...

"All information that is supplied by the certificate subscriber MUST be 
verified by using an independent source of information"

...and you say that no potentially inaccurate information is allowed to put to 
certificates.

Is it so that the only compatible option for CA is to reject all E and almost 
all OU values?
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to