Skip to content

Require the entire CA Hierarchy to be audited against each purpose the root is trusted for #220

@WilsonKathleen

Description

@WilsonKathleen

We would like to get to the point of having separate CA hierarchies for separate purposes, e.g. TLS (Web PKI), TLS EV, and S/MIME.

Therefore, we should add the following requirement to Mozilla's root store policy with a future effective date:

If a CA is trusted for purpose (e.g. TLS or TLS EV), then that certificate and all of its subordinate CAs should be audited against the criteria relevant for that purpose.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions