CA: Difference between revisions

From MozillaWiki
Jump to navigation Jump to search
(More rearrangement)
No edit summary
Line 7: Line 7:


* [http://www.mozilla.org/projects/security/certs/policy/ Root Store Policy] (current stable version: 2.4.1)
* [http://www.mozilla.org/projects/security/certs/policy/ Root Store Policy] (current stable version: 2.4.1)
* [[CA:Communications | CA Communications]] and their responses. Such communications may also set policy in advance of it being included in the Root Store Policy.
* [[CA/Communications | CA Communications]] and their responses. Such communications may also set policy in advance of it being included in the Root Store Policy.
* [https://github.com/mozilla/pkipolicy/issues Root Store Policy Issue Tracker]
* [[CA/Updating_Root_Store_Policy|Process for updating the Root Store Policy]]
* [https://github.com/mozilla/pkipolicy/blob/master/rootstore/policy.md Latest draft of Root Store Policy] (will become the next version)
** [https://github.com/mozilla/pkipolicy/issues Root Store Policy Issue Tracker]
* [[CA:CertPolicy|Older versions of the Root Store Policy]]
** [https://github.com/mozilla/pkipolicy/blob/master/rootstore/policy.md Latest draft of Root Store Policy] (will become the next version)
* [[CA/Root_Store_Policy_Archive|Root Store Policy Archive]]
* [[CA:BaselineRequirements|Baseline Requirements Compliance]]: Mozilla's expectations regarding compliance with the CA/Browser Forum's [https://cabforum.org/baseline-requirements-documents/ Baseline Requirements].
* [[CA:BaselineRequirements|Baseline Requirements Compliance]]: Mozilla's expectations regarding compliance with the CA/Browser Forum's [https://cabforum.org/baseline-requirements-documents/ Baseline Requirements].
* [[CA:RootTransferPolicy|Root Transfer Policy]]: Mozilla's expectations when the ownership of an included root certificate changes, the organization operating the PKI changes, and/or the private keys of the root certificate are transferred to a new location.  
* [[CA:RootTransferPolicy|Root Transfer Policy]]: Mozilla's expectations when the ownership of an included root certificate changes, the organization operating the PKI changes, and/or the private keys of the root certificate are transferred to a new location.  

Revision as of 16:00, 4 May 2017

Mozilla's CA Certificate Program

Mozilla’s CA Certificate Program governs inclusion of root certificates in Network Security Services (NSS), a set of open source libraries designed to support cross-platform development of security-enabled client and server applications. The NSS root certificate store is not only used in Mozilla products such as the Firefox browser, but is also used by other companies in a variety of products.

Policy

Lists of Certificates

Program Administration

Most information relating to the administration of our program is stored either in Bugzilla or in the Common CA Database.

Information for CAs

Discussion Forums

The following Mozilla public forums are relevant to CA evaluation and related issues. Each forum can be accessed either as a mailing list, over the web or as a newsgroup.

  • mozilla.dev.security.policy (MDSP). This forum is used for discussions of Mozilla policies related to security in general and CAs in particular, and for wider discussions about the WebPKI. Among other things, it is the preferred forum for the public comment phase of CA evaluation. If you are a regular participant in MDSP, then please add your name to the Policy Participants page.
  • mozilla.dev.tech.crypto. This forum is used for discussions of the NSS cryptographic library used in Firefox and other Mozilla-based products, as well as the PSM module that implements higher-level security protocols for Firefox.
  • mozilla.dev.security. This forum is used for discussions of Mozilla security issues in general.

Override Default Trust Settings in Firefox

Users of Firefox or other Mozilla products may override the default root certificate settings by either deleting root certificates or by changing the trust bit settings of a root certificate.

How to Apply for Root Inclusion or Changes

  • Process Overview
  • How to Apply -- A guide for CAs wishing to include their certificate in Mozilla's Root CA store, and also a guide for CAs wishing to add trust bits or enable EV for a certificate that is already included in Mozilla's Root CA store.
  • Root Change Process -- How to request a change to a root certificate that is currently included in NSS. This includes the process for disabling or removing a root certificate from NSS.