Re: Re: Organization info in certs not being properly recognized byFirefox

2014-10-30 Thread Dean Coclin
I'd like to focus on this statement: "Users are, quite reasonably, focused on the viewport. After all, that's where the content is and where the task is. Many people simply never see the Location Bar or its security indicators."But many people do in fact look at the security indicators. If that

Re: KIR S.A. Root Inclusion Request

2014-10-30 Thread Kathleen Wilson
On 10/22/14, 4:02 PM, Kathleen Wilson wrote: On 9/23/14 5:49 PM, Kathleen Wilson wrote: Krajowa Izba Rozliczeniowa (KIR) S.A. has applied to include the “SZAFIR ROOT CA” root certificate and enable all three trust bits. Thanks to all of you who have contributed to this discussion. To

Re: Re: Organization info in certs not being properly recognized byFirefox

2014-10-30 Thread Chris Palmer
On Wed, Oct 29, 2014 at 2:02 PM, Dean Coclin dean.j.coc...@verizon.net wrote: But many people do in fact look at the security indicators. If that statement were true, why do fraudsters bother to get SSL certs (mostly DV) for their phishing websites? It's because they know that people are

IdenTrust Root Renewal Request

2014-10-30 Thread Kathleen Wilson
IdenTrust has applied to include the “IdenTrust Commercial Root CA 1” and “IdenTrust Public Sector Root CA 1” root certificates, and turn on the Websites and Email trust bits for both. The “IdenTrust Commercial Root CA 1” root will eventually replace the “DST Root X3” certificate, and the

RE: Staat der Nederlanden Root Renewal Request

2014-10-30 Thread Skirving, D. (Douglas) - Logius
Hi Erwann, Thanks for your review. You raise some valid points. It is clear that the SAN should only contain a dNSName or iPAddress. We will alter the test certificates accordingly ASAP. The OCSP concerns are under investigation. We will share the results as they become available. Thanks.