All,
This email commences a six-week public discussion of SwissSign’s request to include the following certificates as publicly trusted root certificates in one or more CCADB Root Store’s program. This discussion period is scheduled to close on June 16, 2025.
The purpose of this public discussion process is to promote openness and transparency. However, each Root Store makes its inclusion decisions independently, on its own timelines, and based on its own inclusion criteria. Successful completion of this public discussion process does not guarantee any favorable action by any root store.
Anyone with concerns or questions is urged to raise them on this CCADB Public list by replying directly in this discussion thread. Likewise, a representative of SwissSign must promptly respond directly in the discussion thread to all questions that are posted.
CCADB Case Number: 00001460
Organization Background Information (listed in CCADB):
CA Owner Name: SwissSign AG
Website: https://www.swisssign.com/
Address: Sägereistrasse 25, Glattbrugg ZH 8152, Switzerland
Problem Reporting Mechanisms: certific...@swisssign.com; keycom...@swisssign.com
Organization Type: Public Corporation
Repository URL: https://www.swisssign.com/en/support/repository.html
Certificates Requesting Inclusion:
SwissSign RSA SMIME Root CA 2022 - 1:
Certificate download links: CA Repository / crt.sh
SHA-256 Certificate Fingerprint: 9A12C392BFE57891A0C545309D4D9FD567E480CB613D6342278B195C79A7931F
Intended use cases served/EKUs:
Secure Email (S/MIME) 1.3.6.1.5.5.7.3.4
Client Authentication 1.3.6.1.5.5.7.3.2
Reference Certificates: https://repository.swisssign.com/reference_certs/
SwissSign RSA TLS Root CA 2022 - 1:
Certificate download links: CA Repository / crt.sh
SHA-256 Certificate Fingerprint: 193144F431E0FDDB740717D4DE926A571133884B4360D30E272913CBE660CE41
Intended use cases served/EKUs:
Server Authentication (TLS) 1.3.6.1.5.5.7.3.1
Test websites:
Valid: https://ev-rsa-tls-2022-1-valid-cert-demo.swisssign.com
Revoked: https://ev-rsa-tls-2022-1-revoked-cert-demo.swisssign.com
Expired: https://ev-rsa-tls-2022-1-expired-cert-demo.swisssign.com
DV Automation: https://dv-rsa-tls-2022-valid-cert-demo.swisssign.com
OV Automation: https://ov-rsa-tls-2022-valid-cert-demo.swisssign.com
EV Automation: https://ev-rsa-tls-2022-valid-cert-demo.swisssign.com
Existing Publicly Trusted Root CAs from SwissSign:
SwissSign Gold CA - G2:
Certificate download links: (CA Repository / crt.sh)
SHA-256 Certificate Fingerprint: 62DD0BE9B9F50A163EA0F8E75C053B1ECA57EA55C8688F647C6881F2C8357B95
Trust Bits/EKUs:
Server Authentication (TLS) 1.3.6.1.5.5.7.3.1
Secure Email (S/MIME) 1.3.6.1.5.5.7.3.4
Client Authentication 1.3.6.1.5.5.7.3.2
Certificate corpus: (legacy Censys Search login required) (new Censys Platform login required and free accounts may be limited)
Included in: Apple, Google, Microsoft, Mozilla
SwissSign Silver CA - G2:
Certificate download links: (CA Repository / crt.sh)
SHA-256 Certificate Fingerprint: BE6C4DA2BBB9BA59B6F3939768374246C3C005993FA98F020D1DEDBED48A81D5
Trust Bits/EKUs:
Server Authentication (TLS) 1.3.6.1.5.5.7.3.1
Secure Email (S/MIME) 1.3.6.1.5.5.7.3.4
Client Authentication 1.3.6.1.5.5.7.3.2
Certificate corpus: (legacy Censys Search login required) (new Censys Platform login required and free accounts may be limited)
Included in: Apple, Microsoft
Relevant Policy and Practices Documentation:
TLS CPS: https://repository.swisssign.com/SwissSign_CPS_TLS.pdf
S/MIME CPS: https://repository.swisssign.com/SwissSign_CPS_SMIME.pdf
Other Documents: https://www.swisssign.com/en/support/repository.html
Most Recent Self-Assessment:
Audit Statements:
Auditor: TÜV Austria
Audit Criteria: ETSI
Recent Audit Statement(s):
TLS Root Key Generation (June 28, 2022)
S/MIME Root Key Generation (June 28, 2022)
Standard Audit (Period: June 17, 2023, to June 14, 2024)
TLS BR Audit (Period: June 17, 2023, to June 14, 2024)
TLS EVG Audit (Period: June 17, 2023, to June 14, 2024)
S/MIME BR Audit (Period: June 17, 2023, to June 14, 2024)
Incident Summary (Bugzilla incidents from previous 24 months):
Thank you,
Ben, on behalf of the CCADB Steering Committee
Greetings all,
On May 5, 2025, we began a six-week, public discussion on the request from SwissSign for inclusion of two root certificate(s):
SwissSign RSA SMIME Root CA 2022 – 1 (S/MIME)
SwissSign RSA TLS Root CA 2022 – 1 (TLS)
The public discussion period has now ended.
We did not receive any objections or other questions or comments in opposition to SwissSign’s request. We thank the community for its review and consideration during this period. Root Store Programs will make final inclusion decisions independently, on their own timelines, and based on each Root Store Member’s inclusion criteria. Further discussion may take place in the independently managed Root Store community forums (e.g., m-d-s-p).
Sincerely yours,
Ben Wilson,
on behalf of the CCADB Steering Committee