On 02/09/16 20:07, Kathleen Wilson wrote:
> This request by DocuSign (OpenTrust/Keynectis/Certplus) is to include
> the following root certificates, turn on the Websites and Email trust
> bits for all of them, and enable EV treatment for all of them. These new
> certs will eventually replace the
On 12/02/16 14:34, Kathleen Wilson wrote:
> Thanks to a group of students at Rose-Hulman Institute of Technology for
> creating a Certificate Manager Add-on for their senior project!
This is great - well done :-)
Gerv
___
dev-security-policy mailing
On 16/02/16 04:05, rafa...@gmail.com wrote:
>>> Maybe a Mozilla's representative at CAB Forum may supply
>>> additional information about it.
>>
>> Or maybe you may, since you're the one arguing for the exception.
>
> You'll agree that if this subject has already been notified and
> discussed
In addition to the comments below, note that I conceded that simple
grandfathering based on requirement dates would probably do the job.
On 16/02/2016 17:16, Steve wrote:
As long as TLS handshake performance concerns keep RFC 6961 from de facto (
As long as TLS handshake performance concerns keep RFC 6961 from de facto (
https://bugzilla.mozilla.org/show_bug.cgi?id=611836) we'll need to operate
root tier responders with HSM-driven origins, cached responses, and
multiple CDNs.
Further, you're talking about a certificate that is issued by
On 15/02/2016 15:27, Medin, Steven wrote:
If I grant the 1% probability (which I can't), that leads to maybe 10-15
attempts to get bingo. In my past practice, our guard would be raised for the
third set of requests from an external party. The manual processes, even with
a bribe/plant inside
6 matches
Mail list logo