All,
This email commences a six-week public discussion of TrustAsia’s request to include the following certificates as publicly trusted root certificates in one or more CCADB Root Store’s program. This discussion period is scheduled to close on June 2, 2025.
The purpose of this public discussion process is to promote openness and transparency. However, each Root Store makes its inclusion decisions independently, on its own timelines, and based on its own inclusion criteria. Successful completion of this public discussion process does not guarantee any favorable action by any root store.
Anyone with concerns or questions is urged to raise them on this CCADB Public list by replying directly in this discussion thread. Likewise, a representative of the applicant must promptly respond directly in the discussion thread to all questions that are posted.
CCADB Case Number: 00002095
Organization Background Information (listed in CCADB):
CA Owner Name: TrustAsia Technologies, Inc.
Website: https://www.trustasia.com/
Address: 3201 Building B. New Caohejing International Business Center, 391 Guiping Rd, Shanghai, Shanghai, China, 200233
Problem Reporting Mechanisms: rev...@trustasia.com
Organization Type: Private Corporation
Repository URL: https://repository.trustasia.com/
Certificates Requesting Inclusion:
TrustAsia SMIME ECC Root CA:
Certificate download links: CA Repository / crt.sh
Intended use cases served/EKUs:
Secure Email (S/MIME) 1.3.6.1.5.5.7.3.4
Client Authentication 1.3.6.1.5.5.7.3.2
Test websites: N/A
TrustAsia SMIME RSA Root CA:
Certificate download links: CA Repository / crt.sh
Intended use cases served/EKUs:
Secure Email (S/MIME) 1.3.6.1.5.5.7.3.4
Client Authentication 1.3.6.1.5.5.7.3.2
Test websites: N/A
TrustAsia TLS ECC Root CA:
Certificate download links: CA Repository / crt.sh
Intended use cases served/EKUs:
Server Authentication (TLS) 1.3.6.1.5.5.7.3.1
Client Authentication 1.3.6.1.5.5.7.3.2
Test websites:
TrustAsia TLS RSA Root CA:
Certificate download links: CA Repository / crt.sh
Intended use cases served/EKUs:
Server Authentication (TLS) 1.3.6.1.5.5.7.3.1
Client Authentication 1.3.6.1.5.5.7.3.2
Test websites:
Existing Publicly Trusted Root CAs from TrustAsia:
TrustAsia Global Root CA G3:
Certificate download links: (CA Repository /crt.sh)
Intended use cases served/EKUs:
Server Authentication (TLS) 1.3.6.1.5.5.7.3.1
Secure Email (S/MIME) 1.3.6.1.5.5.7.3.4
Client Authentication 1.3.6.1.5.5.7.3.2
Code Signing 1.3.6.1.5.5.7.3.3
Document Signing AATL 1.2.840.113583.1.1.5
Document Signing MS 1.3.6.1.4.1.311.10.3.12
Time Stamping 1.3.6.1.5.5.7.3.8
Certificate corpus: (legacy Censys Search login required) (new Censys Platform login required and free accounts may be limited)
Included in: Mozilla
TrustAsia Global Root CA G4:
Certificate download links: (CA Repository /crt.sh)
Intended use cases served/EKUs:
Server Authentication (TLS) 1.3.6.1.5.5.7.3.1
Secure Email (S/MIME) 1.3.6.1.5.5.7.3.4
Client Authentication 1.3.6.1.5.5.7.3.2
Code Signing 1.3.6.1.5.5.7.3.3
Document Signing AATL 1.2.840.113583.1.1.5
Document Signing MS 1.3.6.1.4.1.311.10.3.12
Time Stamping 1.3.6.1.5.5.7.3.8
Certificate corpus: (legacy Censys Search login required) (new Censys Platform login required and free accounts may be limited)
Included in: Mozilla
Relevant Policy and Practices Documentation:
Most Recent Self-Assessment:
Audit Statements:
Auditor: Anthony Kam & Associates Ltd.
Audit Criteria: WebTrust
Recent Audit Statement(s):
Key Generation (May 15, 2024)
Standard Audit (Period: August 1, 2023 to July 31, 2024)
NetSec Audit (Period: August 1, 2023 to July 31, 2024)
TLS BR Audit (Period: August 1, 2023 to July 31, 2024)
TLS EVG Audit (Period: August 1, 2023 to July 31, 2024)
S/MIME BR Audit (Period: August 1, 2023 to July 31, 2024)
Incident Summary (Bugzilla incidents from previous 24 months):
None
Thank you
-Chris, on behalf of the CCADB Steering Committee
On April 21, 2025, we began a six-week, public discussion on the request from TrustAsia for inclusion of its root certificate(s):
The public discussion period has now ended.
We did not receive any objections or other questions or comments in opposition to TrustAsia’s request. We thank the community for its review and consideration during this period. Root Store Programs will make final inclusion decisions independently, on their own timelines, and based on each Root Store Member’s inclusion criteria. Further discussion may take place in the independently managed Root Store community forums (i.e., MDSP).
Thank you
-Chris, on behalf of the CCADB Steering Committee