Frank Hecker:
> Frank Hecker wrote:
>> I am now opening the first public discussion period for a request from
>> Comodo to add the Comodo ECC Certification Authority root certificate
>> to Mozilla and enable it for EV use. This is bug 421946, and Kathleen
>> has produced an information document attached to the bug.
>>
>> https://bugzilla.mozilla.org/show_bug.cgi?id=421946
>>
>> There's a summary of the information also available at
>>
>> http://www.mozilla.org/projects/security/certs/pending/#Comodo
>
> The first comment period has closed, and I've made a preliminary
> decision to approve this request, per comment #17 in bug 421946. The
> second public coment period now begins, after which I'll make a final
> decision.
>

As per your comment in 
https://bugzilla.mozilla.org/show_bug.cgi?id=421946#c17 you state that 
no problematic
practices associated with this CA, but I found that in section 2.4.1 
domain validated wild cards are issued, which is listed in 
http://wiki.mozilla.org/CA:Problematic_Practices#Wildcard_DV_SSL_certificates

But I'm not sure which type the ECC certificates belong to (which letter 
under section 2.4.1) in which case e) might not apply. Oh and f) is also 
interesting ;-), I wonder how many "localhost" certificates were issued 
so far...

This CP/CPS also covers certificates with a validity of 10 years which 
is again listed in 
http://wiki.mozilla.org/CA:Problematic_Practices#Long-lived_DV_certificates
Also here, I had difficulty to confirm if this applies to the ECC certs 
or not. Maybe Rob can clarify this here?


-- 
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: [EMAIL PROTECTED]
Blog:   https://blog.startcom.org
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to