On Wednesday, November 23, 2016 at 11:53:00 AM UTC-6, cda wrote:
> On Tuesday, November 22, 2016 at 9:16:43 PM UTC+1, jo...@letsencrypt.org
> wrote:
> > Issuance to gov.ir and gov.sy is not allowed as these entities are
> > sanctioned by the U.S. government and we are a U.S.-based organization.
On Tuesday, November 22, 2016 at 9:16:43 PM UTC+1, jo...@letsencrypt.org wrote:
> Issuance to gov.ir and gov.sy is not allowed as these entities are sanctioned
> by the U.S. government and we are a U.S.-based organization. Issuance to .mil
> is not allowed due to contractual obligations that are
This is one of the issues with a WebTrust audit in that WebTrust Auditors may
not look at a CP/CPS depending on the management assertion. The trust in PKI is
based on documented procedures so to not operate against a CP/CPS degrades the
trust in PKI. The US Federal PKI have run into a similar
The answer is yes. That’s why we need to apply for root inclusion. We also
upload the latest version of CP/CPS here for your convenience.
1. GDCA CP Ver 1.5
https://bug1128392.bmoattachments.org/attachment.cgi?id=8813656
2. GDCA CPS Ver 4.4
Hi Arkadiusz,
On 23/11/16 07:25, Arkadiusz Ławniczak wrote:
> WoSign, as our Partner, is entitled to sell Asseco Data Systems
> (Certum) products through its own distribution network. While
> recently issued intermediate CAs certificates are dedicated to WoSign
> as our reseller, so that WoSign
On 22/11/16 20:16, j...@letsencrypt.org wrote:
> organization. Issuance to .mil is not allowed due to contractual
> obligations that are reflected in our Certification Practice
> Statement.
I have just been investigating this issue, as documented in the bug
Kathleen links to. Mozilla policy
On 22/11/16 15:47, wangsn1...@gmail.com wrote:
> into effect on Dec 1st, 2016. Here are the names of the files and
> their URL: 1. GDCA CP Ver 1.5
> https://www.gdca.com.cn/export/sites/default/customer_service/.content/attachments/1.GDCA-CP-V1.5.pdf
A bilingual edition seems like an excellent
On Wednesday, 23 November 2016 07:25:28 UTC, Arkadiusz Ławniczak wrote:
> This means that the verification of each end-entity certificate is
> implemented within the Certum's systems and procedures. In addition, the
> entire infrastructure is under the supervision of Certum.
Thank you, this is
8 matches
Mail list logo