On Wednesday, October 17, 2018 at 2:02:34 PM UTC-4, Jakob Bohm wrote:
> On 17/10/2018 01:18, Matt Palmer wrote:
> > On Tue, Oct 16, 2018 at 02:18:39PM -0700, identrust--- via 
> > dev-security-policy wrote:
> >> 5.Explanation about how and why the mistakes were made, and not caught and
> >> fixed earlier.
> >>
> >> IdenTrust: The certificate was generated for a server within IdenTrust.
> >> The certificate contained internal domain names which were not reachable
> >> externally.  Two domain names in the SAN (Autodiscover.identrus.int and
> >> Mercury.identrus.int) were included at that time.  When the certificate
> >> was generated, these domains were internally hosted domains.
> > 
> > This doesn't explain why the mistakes were made, nor does it explain why
> > they were not caught and fixed earlier.
> > 
> >> 6.  List of steps your CA is taking to resolve the situation and ensure
> >> such issuance will not be repeated in the future, accompanied with a
> >> timeline of when your CA expects to accomplish these things.
> >>
> >> IdenTrust: Post 02/22/2018, IdenTrust implemented a change in the
> >> certificate approval processes that will prevent the domain names with the
> >> .int TLD from being approved.
> > 
> > What about other non-existent TLDs?
> > 
> > - Matt
> > 
> 
> And what about real domains in the very existant .int domain (in case
> one of those requests an Identrust certificate).
> 
> ..int contains almost exclusively high value domains such as un.int,
> nato.int etc.
> 
> IndenTrust:  request with a ‘.int’ and all other TLDs, including “high value” 
> domains, are processed through our website certificate issuance procedures 
> including domain validation\verification and procedures for handling High 
> Risk Certificate Requests. 
> Enjoy
> 
> Jakob
> -- 
> Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
> Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
> This public discussion message is non-binding and may contain errors.
> WiseMo - Remote Service Management for PCs, Phones and Embedded

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to