Re: Public Discussion of CommScope CA Inclusion Request

2023-08-28 Thread Yuwei HAN (hanyuwei70)
Giving that there were so many TLS CAs, I don't see any necesssity to add 
another TLS CA unless something new is provided by CA.
Can CA explain what can be improved if accepted to Mozilla Root Program?
在2023年8月29日星期二 UTC+8 05:41:33 写道:

> All,
>
> This email commences a six-week public discussion of CommScope’s request 
> to include the following four (4) certificates as publicly trusted root 
> certificates in one or more CCADB Root Store Member’s program. This 
> discussion period is scheduled to close on October 10, 2023.
>
> The purpose of this public discussion process is to promote openness and 
> transparency. However, each Root Store makes its inclusion decisions 
> independently, on its own timelines, and based on its own inclusion 
> criteria. Successful completion of this public discussion process does not 
> guarantee any favorable action by any root store.  
>
> Anyone with concerns or questions is urged to raise them on this CCADB 
> Public list by replying directly in this discussion thread. Likewise, a 
> representative of the applicant must promptly respond directly in the 
> discussion thread to all questions that are posted.
>
> CCADB Case Number:  0923 
> ;
>  
> Bugzilla:  1673177  
>
> Organization Background Information (listed in CCADB):
>
>- 
>
>CA Owner Name: CommScope
>- 
>
>Website(s):  https://www.pki-center.com/, 
>https://cert.pkiworks.com/Public/Portal, https://www.commscope.com/ 
>- 
>
>Address: 6450 Sequence Drive, San Diego CA  92121
>- 
>
>Problem Reporting Mechanism(s):  
>https://cert.pkiworks.com/Public/SecurityIncidentReport/ or email to 
>#advanced-pki-p...@commscope.com 
>- 
>
>Organization Type: CAs are owned by wholly owned subsidiaries of 
>CommScope Holding Company, Inc., a NASDAQ-traded company
>- 
>
>Repository URL:  https://certificates.pkiworks.com/Public/Documents/
>
> Certificates Requesting Inclusion:
>
>1. 
>
>CommScope Public Trust RSA Root-01:
>
>
>- 
>
>Certificate download links: (CA Repository 
>
> ,
>  
>crt.sh 
>
> 
>)
>- 
>
>Use cases served/EKUs: 
>- 
>   
>   Server Authentication (TLS) 1.3.6.1.5.5.7.3.1
>   - 
>   
>   Client Authentication 1.3.6.1.5.5.7.3.2
>   - 
>
>Test websites:
>- 
>   
>   Valid: https://rsa-current.ca-1.test.pkiworks.com
>   - 
>   
>   Revoked: https://rsa-revoked.ca-1.test.pkiworks.com
>   - 
>   
>   Expired: https://rsa-expired.ca-1.test.pkiworks.com
>   
>
>
>1. 
>
>CommScope Public Trust RSA Root-02: 
>- 
>   
>   Certificate download links: (CA Repository 
>   
> ,
>  
>   crt.sh 
>   
> 
>   )
>   - 
>   
>   Use cases served/EKUs: 
>   - 
>  
>  Server Authentication (TLS) 1.3.6.1.5.5.7.3.1
>  - 
>  
>  Client Authentication 1.3.6.1.5.5.7.3.2
>  - 
>   
>   Test websites:
>   - 
>  
>  Valid:  https://rsa-current.ca-2.test.pkiworks.com
>  - 
>  
>  Revoked:  https://rsa-revoked.ca-2.test.pkiworks.com
>  - 
>  
>  Expired:  https://rsa-expired.ca-2.test.pkiworks.com
>  2. 
>
>CommScope Public Trust ECC Root-01
>- 
>   
>   Certificate download links: (CA Repository 
>   
> ,
>  
>   crt.sh 
>   
> 
>   )
>   - 
>   
>   Use cases served/EKUs: 
>   - 
>  
>  Server Authentication (TLS) 1.3.6.1.5.5.7.3.1
>  - 
>  
>  Client Authentication 1.3.6.1.5.5.7.3.2 
>  - 
>   
>   Test websites:
>   - 
>  
>  Valid: https://ecc-current.ca-1.test.pkiworks.com
>  - 
>  
>  Revoked: https://ecc-revoked.ca-1.test.pkiworks.com
>  - 
>  
>  Expired: https://ecc-expired.ca-1.test.pkiworks.com
>  
>
>
>1. 
>
>CommScope Public Trust ECC Root-02
>- 
>   
>   Certificate download links: (CA Repository 
>   
> ,
>  
>   crt.sh 
>   
> 

Public Discussion of CommScope CA Inclusion Request

2023-08-28 Thread Ben Wilson
All,

This email commences a six-week public discussion of CommScope’s request to
include the following four (4) certificates as publicly trusted root
certificates in one or more CCADB Root Store Member’s program. This
discussion period is scheduled to close on October 10, 2023.

The purpose of this public discussion process is to promote openness and
transparency. However, each Root Store makes its inclusion decisions
independently, on its own timelines, and based on its own inclusion
criteria. Successful completion of this public discussion process does not
guarantee any favorable action by any root store.

Anyone with concerns or questions is urged to raise them on this CCADB
Public list by replying directly in this discussion thread. Likewise, a
representative of the applicant must promptly respond directly in the
discussion thread to all questions that are posted.

CCADB Case Number:  0923
;
Bugzilla:  1673177 

Organization Background Information (listed in CCADB):

   -

   CA Owner Name: CommScope
   -

   Website(s):  https://www.pki-center.com/,
   https://cert.pkiworks.com/Public/Portal, https://www.commscope.com/
   -

   Address: 6450 Sequence Drive, San Diego CA  92121
   -

   Problem Reporting Mechanism(s):
   https://cert.pkiworks.com/Public/SecurityIncidentReport/ or email to
   #advanced-pki-policy-author...@commscope.com
   -

   Organization Type: CAs are owned by wholly owned subsidiaries of
   CommScope Holding Company, Inc., a NASDAQ-traded company
   -

   Repository URL:  https://certificates.pkiworks.com/Public/Documents/

Certificates Requesting Inclusion:

   1.

   CommScope Public Trust RSA Root-01:


   -

   Certificate download links: (CA Repository
   
,
   crt.sh
   

   )
   -

   Use cases served/EKUs:
   -

  Server Authentication (TLS) 1.3.6.1.5.5.7.3.1
  -

  Client Authentication 1.3.6.1.5.5.7.3.2
  -

   Test websites:
   -

  Valid: https://rsa-current.ca-1.test.pkiworks.com
  -

  Revoked: https://rsa-revoked.ca-1.test.pkiworks.com
  -

  Expired: https://rsa-expired.ca-1.test.pkiworks.com



   1.

   CommScope Public Trust RSA Root-02:
   -

  Certificate download links: (CA Repository
  
,
  crt.sh
  

  )
  -

  Use cases served/EKUs:
  -

 Server Authentication (TLS) 1.3.6.1.5.5.7.3.1
 -

 Client Authentication 1.3.6.1.5.5.7.3.2
 -

  Test websites:
  -

 Valid:  https://rsa-current.ca-2.test.pkiworks.com
 -

 Revoked:  https://rsa-revoked.ca-2.test.pkiworks.com
 -

 Expired:  https://rsa-expired.ca-2.test.pkiworks.com
 2.

   CommScope Public Trust ECC Root-01
   -

  Certificate download links: (CA Repository
  
,
  crt.sh
  

  )
  -

  Use cases served/EKUs:
  -

 Server Authentication (TLS) 1.3.6.1.5.5.7.3.1
 -

 Client Authentication 1.3.6.1.5.5.7.3.2
 -

  Test websites:
  -

 Valid: https://ecc-current.ca-1.test.pkiworks.com
 -

 Revoked: https://ecc-revoked.ca-1.test.pkiworks.com
 -

 Expired: https://ecc-expired.ca-1.test.pkiworks.com



   1.

   CommScope Public Trust ECC Root-02
   -

  Certificate download links: (CA Repository
  
,
  crt.sh
  

  )
  -

  Use cases served/EKUs:
  -

 Server Authentication (TLS) 1.3.6.1.5.5.7.3.1
 -

 Client Authentication 1.3.6.1.5.5.7.3.2
 -

  Test websites:
  -

 Valid: https://ecc-current.ca-2.test.pkiworks.com
 -

 Revoked: https://ecc-revoked.ca-2.test.pkiworks.com
 -

 Expired: https://ecc-expired.ca-2.test.pkiworks.com

Relevant Policy and Practices Documentation:

The following applies to all four (4) applicant root CAs:

   -

   https://certificates.pkiworks.com/Public/DownloadDocument/18 (CP/CPS v.
   2.6 dated 2/10/2023)


Most Recent Self-Assessment:

The following applies to all four (4) applicant root CAs:

   -

   https://bugzilla.mozilla.org/attachment.cgi?id=9281545