On 05/03/2009 10:06 AM, Ian G:

(2), there exists a standard need in audits to discuss disaster recovery. Curiously, this does not appear to be documented anywhere, draw your own speculations....

It's usually addressed in internal CA documentations and audited accordingly. Disaster recovery is certainly part of the usual audits, root compromise is such a disaster IMO.


(4) no review of existing grandfathered roots has been done.


That's not entirely correct, legacy CAs which requested EV enabled had to go through the process as if they were new roots. See also the current thread of Verizon/Cybertrust.

--
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: start...@startcom.org
Blog:   https://blog.startcom.org

--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to