This is our reply for GT system 

For GT: 

1, No SAN 
Status: 
No problem/Fixed
This problem is found and fixed in pre-audit stage, but the test certificate is 
an old one, now is been revoked.
As is mentioned in last reply, a Point in Time Pre-Issuance Readiness audit in 
this April. Since this is a point in time audit, the auditor only evaluated the 
design effectiveness. In the next audit, the operating effectiveness for a 
period will be evaluated. 

2, MIME type 
status: 
Fixed. 

3, OCSP signer certificate 
Status: 
Fixed. 
Using standards same as EV.

4, root key generation ceremony. 
Status: 
No problem. 
Same as EV.

5, CRL number field in crl downloaded from CRLDP 
Status: 
Fixed and updating

6, issue relate to oca2-SHA1 and oca2-SHA256 
Status: 
System down for update.

Leaders of CFCA take this matter very seriously and start an investigation:
1, Duplicate certificate is not allowed in CFCA's CA system, and the CA system 
running now cannot perform this operation.
2, It happened 2 years ago in a system update from SHA1 to SHA256.(SHA256 OCA2 
have only issued several test certificates, take down and upgrade this system 
will not affect end users)
3, After inner evaluation we decide to start a upgrade/rebuild for GT system, 
meanwhile revoke related certificates and stop issuing new certificates in GT 
system.
4, According to 3, GT system is not ready for this Inclusion request. I suggest 
that we process GT/EV system separately, and take GT system out of this wave of 
Inclusion request.
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to