Thank you. I’m trying to understand the organisational structure of the 
applicant.Could someone please introduce us the relationship between Deutsche 
Telekom GmbH, Deutsche Telekom Security GmbH and T-Systems International 
GmbH?Specifically I’m interested to understand their roles within the CA 
operations.Thanks,M.D.Sent from my Galaxy
-------- Original message --------From: 'Ryan Dickson' via CCADB Public 
<[email protected]> Date: 11/1/23  15:08  (GMT+02:00) To: public 
<[email protected]> Subject: Public Discussion of Deutsche Telekom Security CA 
Inclusion Request All,This email commences a six-week public discussion of 
Deutsche Telekom Security’s request to include the following CA certificates as 
publicly trusted root certificates in one or more CCADB Root Store Member’s 
program. This discussion period is scheduled to close on December 13, 2023.The 
purpose of this public discussion process is to promote openness and 
transparency. However, each Root Store makes its inclusion decisions 
independently, on its own timelines, and based on its own inclusion criteria. 
Successful completion of this public discussion process does not guarantee any 
favorable action by any root store.  Anyone with concerns or questions is urged 
to raise them on this CCADB Public list by replying directly in this discussion 
thread. Likewise, a representative of the applicant must promptly respond 
directly in the discussion thread to all questions that are posted.CCADB Case 
Number: 00001269Organization Background Information (listed in CCADB):CA Owner 
Name:Deutsche Telekom Security GmbHWebsite: https://www.telesec.de/Address: 
Untere Industriestrasse 20, Netphen, 57250 GermanyProblem Reporting Mechanisms: 
https://www.telesec.de/en/kontakt-enOrganization Type: Private 
CorporationDeutsche Telekom Security is a subsidiary of Deutsche Telekom 
AGRepository URL: https://www.telesec.de/en/service/downloads/pki-repository/ 
Certificates Requesting Inclusion:Telekom Security SMIME ECC Root 
2021:Certificate download links: (CA Repository, crt.sh)Use cases served/EKUs: 
Secure Email (S/MIME) 1.3.6.1.5.5.7.3.4Test websites: N/A (S/MIME CA)Telekom 
Security TLS ECC Root 2020: Certificate download links: (CA Repository, 
crt.sh)Use cases served/EKUs: Server Authentication 1.3.6.1.5.5.7.3.1Client 
Authentication 1.3.6.1.5.5.7.3.2Test websites:Valid: 
https://active.tstlser20.test.telesec.de/ 
Revoked:https://revoked.tstlser20.test.telesec.de/Expired: 
https://expired.tstlser20.test.telesec.de/ Telekom Security SMIME RSA Root 
2023:Certificate download links: (CA Repository, crt.sh)Use cases served/EKUs: 
Secure Email (S/MIME) 1.3.6.1.5.5.7.3.4Client Authentication 
1.3.6.1.5.5.7.3.2Test websites: N/A (S/MIME CA)Telekom Security TLS RSA Root 
2023:Certificate download links: (CA Repository, crt.sh)Use cases served/EKUs: 
Server Authentication 1.3.6.1.5.5.7.3.1Client Authentication 
1.3.6.1.5.5.7.3.2Test websites:Valid: https://active.tstlsrr23.test.telesec.de/ 
Revoked: https://revoked.tstlsrr23.test.telesec.de/ Expired: 
https://expired.tstlsrr23.test.telesec.de/ Existing Publicly Trusted Root CAs 
from Deutsche Telekom Security:T-TeleSec GlobalRoot Class 2:Certificate 
download links: CA Repository, crt.shUse cases served/EKUs: Server 
Authentication (TLS) 1.3.6.1.5.5.7.3.1Secure Email (S/MIME) 
1.3.6.1.5.5.7.3.4Client Authentication 1.3.6.1.5.5.7.3.2Certificate Corpus: 
here (requires Censys account)Included in: Apple, Chrome, Microsoft, 
MozillaT-TeleSec GlobalRoot Class 3:Certificate download links: CA Repository, 
crt.shUse cases served/EKUs:Server Authentication (TLS) 
1.3.6.1.5.5.7.3.1;Client Authentication 1.3.6.1.5.5.7.3.2Certificate Corpus: 
here (requires Censys account)Included in: Apple, Chrome, Microsoft, 
MozillaRelevant Policy and Practices Documentation: Certificate Policy - v. 4.0 
(Sept. 1, 2023), 
https://www.telesec.de/assets/downloads/PKI-Repository/Telekom-Security-CP-EN-V4.0.pdf
   Certification Practices Statement - v. 6.0 (Sept. 1, 2023), 
https://www.telesec.de/assets/downloads/PKI-Repository/Telekom-Security-CPS-Public-EN-V6.0.pdf
 Most Recent 
Self-Assessment:https://www.telesec.de/assets/downloads/2023-08-28_Telekom_Security_CCADB_Self_Assessment_Framework_v1.2.xlsx
 Audit Statements:Auditor: TÜV Informationstechnik GmbHAudit Criteria: ETSI EN 
319 411-1 V1.3.1 (2021-05); ETSI EN 319 411-2, V2.4.1 (2021-11)Date of Audit 
Letter Issuance: June 21, 2023For Period of Time: April 8, 2022, through April 
7, 2023Audit Statement(s):  
https://www.tuvit.de/fileadmin/Content/TUV_IT/zertifikate/en/AA2023062101_Telekom_Security_2023_V1.0.pdfIncident
 Summary (Bugzilla incidents from previous 24 months):Improper use of a domain 
validation method (Bugzilla Bug #1825780)Thanks,Ryan, on behalf of the CCADB 
Steering Committee



-- 
You received this message because you are subscribed to the Google Groups 
"CCADB Public" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/ccadb.org/d/msgid/public/CADEW5O_%3DkLcjqCLTj-XsBzVt94JgD0zA-HYfx9G711QVEr6HYQ%40mail.gmail.com.

-- 
You received this message because you are subscribed to the Google Groups 
"CCADB Public" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/ccadb.org/d/msgid/public/65429b46.050a0220.5dfd6.649f%40mx.google.com.

Reply via email to