Re: Reassessment of sub-ordinated CA certificates

2008-02-13 Thread Eddy Nigg (StartCom Ltd.)
David E. Ross wrote: > In the existing policy, I see only brief mention of removing a > previously approved root certificate (the phrase "to discontinue > including a particular CA certificate in our products" in the first > sentence of Section 4). I think we need to expand upon that issue. > > Ex

Reporting problems with trust anchors

2008-02-13 Thread Paul Hoffman
At 3:56 AM -0800 2/13/08, Kyle Hamilton wrote: >Why, as a user, am I being asked by ANYONE in this forum if I can >point to any CA that is violating their CPS, or 'not keeping up with >their auditing'? Why does anyone even remotely think that this is >appropriate? Because you, alone, brought it u

Re: Reassessment of sub-ordinated CA certificates

2008-02-13 Thread David E. Ross
On 2/12/2008 7:37 PM, Eddy Nigg (StartCom Ltd.) wrote: > Below my suggestions concerning a policy update or guidelines for CAs > which issue or have already external sub-ordinated CAs. This could be > also an extension to the Mozilla policy. Here is my initial take: > > Plain CAs: > > - Obligat

Re: Reassessment of sub-ordinated CA certificates

2008-02-13 Thread Eddy Nigg (StartCom Ltd.)
[EMAIL PROTECTED] wrote: > Maintenance of the WebTrust seal requires an annual audit. Obtaining the WebTrust seal is optional. Not to speak about that Mozilla accepts auditors not accredited by the WebTrust organization. Hence there is no re-auditing requirement right now. > The audit > is o

Re: Reassessment of sub-ordinated CA certificates

2008-02-13 Thread srdavidson
Maintenance of the WebTrust seal requires an annual audit. The audit is of compliance with the CPS - so if there are issuing CAs - whether internal or external - covered by the CPS, then they part of those procedures. The same is not true of ETSI - which is a standard not really an audit regime.

Re: WISeKey root CA certificate inclusion request

2008-02-13 Thread Eddy Nigg (StartCom Ltd.)
Kyle Hamilton wrote: > Why, as a user, am I being asked by ANYONE in this forum if I can > point to any CA that is violating their CPS, or 'not keeping up with > their auditing'? Obtaining the web seal of the Web Trust audit is optional and not a requirement. Re-auditing never was a requirement a

Re: WISeKey root CA certificate inclusion request

2008-02-13 Thread Kyle Hamilton
On Feb 13, 2008 4:08 AM, Gervase Markham <[EMAIL PROTECTED]> wrote: > > Has Thawte passed an audit while performing this action which (I assume) > you are saying should cause them to fail? (I suspect the answer is Yes, > but I want to check.) If so, who was the auditor? As a user, how on earth do

Re: WISeKey root CA certificate inclusion request

2008-02-13 Thread Gervase Markham
Kyle Hamilton wrote: > Why, as a user, am I being asked by ANYONE in this forum if I can > point to any CA that is violating their CPS, or 'not keeping up with > their auditing'? Why does anyone even remotely think that this is > appropriate? The fact that I caught Thawte violating their CPS at t

Re: WISeKey root CA certificate inclusion request

2008-02-13 Thread Kyle Hamilton
...nevermind that the root in the store that I caught violating their CPS was in the latter category. My question is this: Why, as a user, am I being asked by ANYONE in this forum if I can point to any CA that is violating their CPS, or 'not keeping up with their auditing'? Why does anyone even

Re: WISeKey root CA certificate inclusion request

2008-02-13 Thread Gervase Markham
Frank Hecker wrote: > I didn't quite say that, but I can understand why Kyle interpreted my > comments that way. What I have said in the past is that because of the > impact of removing a root, particular a root that has lots of server > certs chained up to it, we're not going to remove a root u

Re: WISeKey root CA certificate inclusion request

2008-02-13 Thread Gervase Markham
David E. Ross wrote: > Periodic audits of CAs are required by WebTrust to maintain their seal > of approval and should thus be required by Mozilla for continued > inclusion in the NSS store. I don't know if it's in the policy explicitly, but it's always been my view that if a CA failed its WebT