Comment #20 on issue 69557 by
rsl...@chromium.org: Add Baltimore
More follow-up questions:
- Again, the /repository is out of date with respect to the most recent
audits. It still links to seals 1457/1458, although the current seals are
1635 and 1637
- The CPS details a policy v5.5, except the previous version linked in
/repository is 5.4
- Your CPS states that the "GTE CyberTrust Global Root" only applies to
this CPS until Dec 31, 2013. If so, we may consider removing EV enablement
in a future release for this root - please clarify.
- You have a typo in Section 1.6.7.2 of CPS 5.6 ("this is still valid"
should be "that is still valid")
- In Section 1.10.2.2, the set of controls over Enterprise RAs are
described as contractual controls, rather than technical controls. Can you
please confirm that technical controls are in place to prevent the
(un-audited) Enterprise RA from performing RA-relevant duties outside the
scope of authority, as validated by the (audited) Cybertrust infrastructure?
Further confirmations:
Can you confirm this is a request to enable the "Baltimore CyberTrust
Root", fingerprint
D4:DE:20:D0:5E:66:FC:53:FE:1A:50:88:2C:78:DB:28:52:CA:E4:74 , for EV
Policy "1.3.6.1.4.1.6334.1.100.1", documented as the "SureServer EV" policy
in Section 7.1 of CP 2.5?
From comment #15
- My request was for a sample site that demonstrates such a chain, and
which will continue to, for ongoing testing.
- The CRL and OCSP profile, listed as "independent technical document" in
Section 7.2/7.3 of CPS 5.6, is still an outstanding as a request.