It appears that the link listed for Website ( https://pki.atos.net/TrustedRoot) returns a 404. Is that link supposed to be https://pki.atos.net/trustcenter/en/pki-services/ssl-certificates instead?
Aaron On Mon, Feb 6, 2023 at 6:16 AM 'Chris Clements' via CCADB Public < [email protected]> wrote: > All, > > > This email commences a six-week public discussion of Atos Trustcenter’s > request to include the following certificates as publicly trusted root > certificates in one or more CCADB Root Store Member’s program. This > discussion period is scheduled to close on March 20, 2023. > > The purpose of this public discussion process is to promote openness and > transparency. However, each Root Store makes its inclusion decisions > independently, on its own timelines, and based on its own inclusion > criteria. Successful completion of this public discussion process does not > guarantee any favorable action by any root store. > > Anyone with concerns or questions is urged to raise them on this CCADB > Public list by replying directly in this discussion thread. Likewise, a > representative of the applicant must promptly respond directly in the > discussion thread to all questions that are posted. > > CCADB Case Number: 00000999 > <https://ccadb-public.secure.force.com/mozilla/PrintViewForCase?CaseNumber=00000999> > > > Organization Background Information: > > - > > CA Owner Name: Atos Trustcenter > - > > Website: https://pki.atos.net/TrustedRoot/ > - > > Address: Lohberg 10 Meppen, 49716 Germany > - > > Problem Reporting Mechanisms: [email protected], > https://pki.atos.net > - > > Organization Type: Private Corporation > - > > Repository URL: > https://pki.atos.net/trustcenter/en/download/trusted-root-ca > > Certificates Requesting Inclusion: > > 1. > > Atos TrustedRoot Root CA RSA G2 2020: > > > - > > Certificate download links (CA Repository > <https://pki-crl.atos.net/certificates/AtosTrustedRootRootCARSAG22020.pem>, > crt.sh > > <https://crt.sh/?sha256=78833A783BB2986C254B9370D3C20E5EBA8FA7840CBF63FE17297A0B0119685E> > ) > - > > Use cases served/EKUs: > - > > Secure Email (S/MIME) 1.3.6.1.5.5.7.3.4; and > - > > Client Authentication 1.3.6.1.5.5.7.3.2 > - > > Test websites: N/A > > > 1. > > Atos TrustedRoot Root CA RSA TLS 2021: > > > - > > Certificate download links (CA Repository > > <https://pki-crl.atos.net/certificates/AtosTrustedRootRootCARSATLS2021.pem>, > crt.sh > > <https://crt.sh/?sha256=81A9088EA59FB364C548A6F85559099B6F0405EFBF18E5324EC9F457BA00112F> > ) > - > > Use cases served/EKUs: > - > > Server Authentication (TLS) 1.3.6.1.5.5.7.3.1; and > - > > Client Authentication 1.3.6.1.5.5.7.3.2 > - > > Test websites: > - > > Valid: https://tls-rsa-root-2021-pki-valid.atos.net > - > > Revoked: https://tls-rsa-root-2021-pki-revoked.atos.net > - > > Expired: https://tls-rsa-root-2021-pki-expired.atos.net > > > 1. > > Atos TrustedRoot Root CA ECC G2 2020: > > > - > > Certificate download links (CA Repository > <https://pki-crl.atos.net/certificates/AtosTrustedRootRootCAECCG22020.pem>, > crt.sh > > <https://crt.sh/?sha256=E38655F4B0190C84D3B3893D840A687E190A256D98052F159E6D4A39F589A6EB> > ) > - > > Use cases served/EKUs: > - > > Secure Email (S/MIME) 1.3.6.1.5.5.7.3.4; and > - > > Client Authentication 1.3.6.1.5.5.7.3.2 > - > > Test websites: N/A > > > 1. > > Atos TrustedRoot Root CA ECC TLS 2021: > > > - > > Certificate download links (CA Repository > > <https://pki-crl.atos.net/certificates/AtosTrustedRootRootCAECCTLS2021.pem>, > crt.sh > > <https://crt.sh/?sha256=B2FAE53E14CCD7AB9212064701AE279C1D8988FACB775FA8A008914E663988A8> > ) > - > > Use cases served/EKUs: > - > > Server Authentication (TLS) 1.3.6.1.5.5.7.3.1; and > - > > Client Authentication 1.3.6.1.5.5.7.3.2 > - > > Test websites: > - > > Valid: https://tls-ecc-root-2021-pki-valid.atos.net > - > > Revoked: https://tls-ecc-root-2021-pki-revoked.atos.net > - > > Expired: https://tls-ecc-root-2021-pki-expired.atos.net > > Existing Publicly Trusted Root CAs from Atos Trustcenter: > > 1. > > Atos TrustedRoot 2011 > > > - > > Certificate download links (CA Repository > <https://pki-crl.atos.net/certificates/AtosTrustedRoot2011.pem>, crt.sh > > <https://crt.sh/?sha256=F356BEA244B7A91EB35D53CA9AD7864ACE018E2D35D5F8F96DDF68A6F41AA474> > ) > - > > Use cases served/EKUs: not defined > - > > Certificate corpus: here > > <https://search.censys.io/certificates?q=f356bea244b7a91eb35d53ca9ad7864ace018e2d35d5f8f96ddf68a6f41aa474> > (login required) > - > > Included in: Apple; Google Chrome; Microsoft; Mozilla > > Relevant Policy and Practices Documentation: > > The following apply to all four (4) applicant root CAs: > > - > > https://pki.atos.net/Download/Atos_TrustedRoot_CPS_RootCA_v2.7.2.pdf > - > > > https://pki.atos.net/Download/Atos_TrustedRoot_CPS_IssuingCAs_v2.7.2.pdf > > > > Most Recent Self-Assessment: > > - > > https://bugzilla.mozilla.org/attachment.cgi?id=9293279 (completed > 9/6/2022) > > > > Audit Statements: > > - > > Auditor: datenschutz cert GmbH <https://www.datenschutz-cert.de/> > - > > Audit Criteria: ETSI EN 319 411-1 > - > > Date of Audit Issuance: June 15, 2022 > - > > For Period Ending: April 27, 2022 > - > > Audit Statement(s): here > > <https://www.datenschutz-cert.de/fileadmin/uploads/tx_dscertcertlist/DSC1161_Atos_ATCA_Audit_Attestation.pdf> > > > > Incident Summary (Bugzilla incidents from previous 24 months): > > - > > None in the previous 24 months. > > > Quantifying Value: > > - > > Not applicable. > > > Thank you, > Chris, on behalf of the CCADB Steering Committee > > -- > You received this message because you are subscribed to the Google Groups > "CCADB Public" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to [email protected]. > To view this discussion on the web visit > https://groups.google.com/a/ccadb.org/d/msgid/public/CAAbw9mB0Zn4wwWX5sPsE2mQPooiAgFyHrfe3zE_Hbu_nCofEmA%40mail.gmail.com > <https://groups.google.com/a/ccadb.org/d/msgid/public/CAAbw9mB0Zn4wwWX5sPsE2mQPooiAgFyHrfe3zE_Hbu_nCofEmA%40mail.gmail.com?utm_medium=email&utm_source=footer> > . > -- You received this message because you are subscribed to the Google Groups "CCADB Public" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/a/ccadb.org/d/msgid/public/CAEmnErfmr9MiTy8tJaEdw9VxJ8nb9V9Yy6Eyq4H8meCYa8XhqQ%40mail.gmail.com.
