This is to announce and begin public discussion of GoDaddy’s intent to use its publicly trusted Starfield Root Certificate Authority - G2 (https://crt.sh/?caid=796) to create two new external subordinate CA certificates to be operated and maintained by Certainly, LLC. These will be cross-certificates sharing their respective key pairs with subordinate CA certificates signed by two Certainly Root CAs that are pending inclusion (https://bugzilla.mozilla.org/show_bug.cgi?id=1727941).
In accordance with Mozilla Root Store Policy, Section 8 - CA Operational Changes for new program participants and at the instruction of Process for Review and Approval of Externally Operated Subordinate CAs we have created Bugzilla Bug 1755851 and are initiating this formal discussion period.
Certainly is a wholly owned subsidiary of Fastly, Inc., a cloud service provider headquartered in the USA. Certainly plans to issue certificates to existing Fastly customers. The two Certainly subordinate CAs will issue publicly-trusted DV TLS server certificates. More details may be found in Certainly’s root inclusion case in CCADB. Certainly has performed a CA Compliance Self-Assessment and has committed to adhere to all Mozilla requirements, Baseline Requirements of the CA/Browser Forum, and the GoDaddy (Starfield Technologies) CP/CPS.
All the operational services related to Certainly’s Subscribers will be performed by Certainly, including processing of certificate applications, certificate issuance, certificate publishing, certificate status services, and certificate management. Certainly has implemented the open-source Boulder CA and interacts with Applicants and Subscribers via an ACME API endpoint. Certainly has applied for inclusion as a root CA to Mozilla and a number of other root store programs, requesting inclusion of two root certificates. Both will be used exclusively to issue DV TLS certificates, with the distinction that one root will anchor an RSA hierarchy and the other will anchor an ECDSA hierarchy. These roots, as well as the two corresponding subordinate CAs that are constrained to TLS usages, have been disclosed in CCADB.
Certainly has received the following unqualified audit reports (see Bug 1755851 for full reports) from the WebTrust Practitioner, Schellman, LLC:
Certainly will undergo WebTrust for CAs and WebTrust SSL Baseline with NCSSRs period-of-time audits no later than June 30, 2022, covering a period beginning July 1, 2021. Certainly has further committed to ongoing WebTrust audits for the 10-year lifetime of the cross-signed certificates.
As operator of a Mozilla-trusted root CA (and a trusted root in other browser root store programs), we recognize that through this cross-sign event, we are ultimately accountable for any actions taken by the Certainly intermediates which will inherit our trust and have worked closely with Certainly to perform due diligence activities including the review of the Certainly CP/CPS, Subscriber Agreement, and Relying Party Agreement against CA/B forum requirements, GoDaddy Policies, and Mozilla policies. We have also reviewed Certainly’s CA Compliance Self-Assessment and operational practices, interviewed Certainly personnel, and reviewed the external audit opinions to verify appropriate scope of coverage and conformance with requirements as expected. Currently and following the proposed cross-sign event, we will continue working closely with Certainly to oversee ongoing compliance efforts.
Of note, Certainly has filed two Mozilla incident reports to date (listed below) which we have followed and reviewed with Certainly. It is our expectation that the second bug be resolved prior to any cross-sign event.
This email begins a 3-week comment period, after which Mozilla is expected to consider approval of GoDaddy’s request.
Best,
Brittany Randall
This email begins a 3-week comment period, after which Mozilla is expected to consider approval of GoDaddy’s request.
Ryan,
I understand your concern in principle. However, what you are proposing is at the very least a major new requirement, and could be interpreted as being in direct conflict with the existing Process for Review and Approval of Externally Operated Subordinate CAs that are Not Technically Constrained [1], which (as you described) states:
When a root CA operator intends to sign a subCA certificate for use by an external, third-party operator that has not previously undergone this review process for the type of certificate that it will be authorized to issue, the root CA operator is responsible for collecting information and performing due diligence similar to that performed by Mozilla on root inclusion requests (i.e. Quantifying Value and other steps not outlined in this wiki page would not be required), and for initiating the public discussion on the Mozilla dev-security-policy mailing list
You will recall participating in the discussion of this policy in 2021 [2], at which time some similar ideas were suggested by others. I acknowledge that Mozilla has the right to perform whatever due diligence they deem appropriate to protect users; however, the decision to do so should not be arbitrary. What you are proposing amounts to a retroactive policy change.
I suspect that Mozilla would consider your proposal as part of the related policy 2.8 discussions [3] [4]. That would be an appropriate forum to work out the details and then update the policy for externally operated subCAs.
Wayne
[1] https://wiki.mozilla.org/CA/External_Sub_CAs_not_Technically_Constrained
[2] https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/AA5G1bzOwZQ/m/mZBO_IIcBQAJ
[3] https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/r9ZeggoH9KA/m/NZwE3TuYAwAJ
[4] https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/zBGXSngpwWw/m/aIm4sKXyAAAJ--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CAErg%3DHG0ZYEGzVj40XA7c%3DVjjztfj-_qGzOA8BpNFK3n0aQbmw%40mail.gmail.com.
You will recall participating in the discussion of this policy in 2021 [2], at which time some similar ideas were suggested by others. I acknowledge that Mozilla has the right to perform whatever due diligence they deem appropriate to protect users; however, the decision to do so should not be arbitrary. What you are proposing amounts to a retroactive policy change.
Following public discussion, the Mozilla CA Program Manager will determine whether the subCA operator will be accepted, and update the corresponding CCADB record to indicate the result.
After a minimum of 3 weeks have passed, a Mozilla representative will announce a one-week “last call” for objections. Mozilla may determine to extend public discussion, or approve or reject the subCA operator.
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CAErg%3DHHXiw7ienF%2BJ%3D0wnka5nusYryZ7ZqqNkco8o8Sev1MQ5g%40mail.gmail.com.
On Thu, Feb 17, 2022 at 1:10 AM 'Brittany Randall' via dev-secur...@mozilla.org <dev-secur...@mozilla.org> wrote:
This email begins a 3-week comment period, after which Mozilla is expected to consider approval of GoDaddy’s request.
My individual position would be that GoDaddy does not perform this signing unless, and until, https://bugzilla.mozilla.org/show_bug.cgi?id=1727941 is resolved with a positive disposition.
I think there's wide agreement and understanding that the security risks to the community, and to end users, remains, at minimum, the same whether introducing a root or an intermediate, as they both have the same capability. Cross-signing an intermediate versus adding a root largely only functionally differs in that rather than Mozilla and the community reviewing the CA-to-be-signed, the cross-signer performs that review. I don't think we have reason to be confident in the general case that CAs are effective at upholding the same principles or thoroughness as the current Mozilla process was designed to engage and promote. I don't mean this as a slight against GoDaddy, but rather the general principle.
The public review policy for intermediates was designed to address this gap, by ensuring intermediates and roots undergo the same level of public review and consideration. It applies for two cases:1) Where the CA-to-be-signed does not plan to operate as a root2) Where the CA-to-be-signed does plan to operate as a root (as is the case here)
Strangely, 1) is a bit academic, because there's very little compelling reason to pursue that path given the above considerations, so it's not surprising that we find ourselves in 2).
There are two different trust decisions and processes presented here.
The announced three-week period should be sufficient for people to more closely examine Certainly, to ask questions, and to bring comments forward regarding whether they believe Certainly is an appropriate entity to operate a subCA under GoDaddy's root.
I believe this is not correct. The security risks to the community are different because in the cross-signing/externally-operated subCA model, the Subordinate is under the close supervision of the signing (already publicly-trusted) CA, compared to the individual Root which stands on its own.
There are cases where a CA wants to operate independently, without any third-party supervision. This is the most common scenario that's why option 2 is what we usually see. However, there are cases where a company wants to operate a subCA under the guidance and supervision of another CA, which uses option 1. CCADB includes cases that prove that both options exist today.
This is not to say that the trust impact of an externally-operated Sub CA vs a Root CA are not similar, but it is reasonable to assume that when an already-trusted CA member of this community (in good standing)
- accepts the liability and reputational risks,
- places sufficient controls to monitor the operations/compliance program of an externally-operated SubCA,
it is sufficient for the community to accept. Taking it one step further, I would say that this scenario (operating under the guidance/supervision of an already-trusted Root CA) is actually MORE trustworthy than an independent Root being accepted for which the community has no visibility about internal operations/compliance program apart from an audit report and self-evaluation.
I assume that GoDaddy and any CA that plans to cross-sign a CA that is new to this community, performs a similar analysis/due diligence as Ben and the community does in Root inclusion requests. Three weeks should be sufficient for additional review/scrutiny by any other member but if more time is needed, people can just ask.
I believe it would be unfair to delay this application more than the current Mozilla Policy dictates on the grounds that there is a pending Root inclusion request by Certainly. They could just as well not have applied for a Root inclusion.
I do not think this request, or other requests for a new Externally
Operated Subordinate CA, should be rejected or accepted based on
whether the CA operator is applying for inclusion of a root CA they
operate.
This is to announce and begin public discussion of GoDaddy’s intent to use its publicly trusted Starfield Root Certificate Authority - G2 (https://crt.sh/?caid=796) to create two new external subordinate CA certificates to be operated and maintained by Certainly, LLC. These will be cross-certificates sharing their respective key pairs with subordinate CA certificates signed by two Certainly Root CAs that are pending inclusion (https://bugzilla.mozilla.org/show_bug.cgi?id=1727941).
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/94f405b3-b189-4e3e-a1f9-67db6233d28an%40mozilla.org.
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/d73a51c1-5f68-4626-b4a7-ea3643747a19n%40mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaYTK4SA2h6f3ej8hGifT-7-EyWVaJd-z0nbwE3s%2BFoUCg%40mail.gmail.com.
I took a look at parts of Certainly's CP/CPS. I'm happy to see
Certainly use a combined CP/CPS. However, section 3.2.2 says:
"Certainly validates domain control primarily in an automated fashion
using the ACME protocol. In exceptional cases control may be validated
using methods similar to those employed by ACME, but performed
manually."
The BRs permit the ACME methods. The BRs do not permit CA-invented
methods that are "similar to" ACME methods. This is the same as the
forbidden "any other method of confirmation", and relies on trusting
the CA's judgment that the methods "similar to" the allowed methods
are as secure as the allowed methods themselves. It should be
very clear that the BRs no longer permit CAs to make this judgment call.
The CP/CPS goes on to describe specific methods that are used by Certainly. The language Andrew is pointing out is referring to the ACME dns-01, http-01, and tls-alpn-01 implementations. It meant that Certainly might foreseeably perform a manual 3.2.2.4.7 validation rather than using Boulder’s dns-01 implementation. We’ve never done that, and given the complexity of getting it right I’m confident that we never will. I don’t agree that this is a “security-critical omission”, but I do see how this language is concerning, so it has been removed from the latest version of the CP/CPS that Ben reviewed.
All,Today I read through the Certainly CP/CPS and reviewed the Compliance Self-Assessment and GoDaddy's review documents. I did not see anything in the CP/CPS that did not conform to the Mozilla Root Store Policy or the CA/B Forum's Baseline Requirements.I also looked at the GoDaddy-Fastly cross-certificate profiles and did not see anything that concerned me.The public comment period will close next Wednesday, 9-Mar-2022. Please provide any additional comments you may have by then.
<snip> From Andrew's remarks going unaddressed (until the reping), from a lack of feedback from GoDaddy about their own processes for review, it doesn't seem like things were prepared for total transparency in mind.
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CAErg%3DHEJ1g1GA6QnwJ2G5a3cXRL7Jcvu%2Bs4JZbAeZYipQkdXxQ%40mail.gmail.com.
Pursuant to the procedure outlined in the wiki for externally operated CAs[1], three weeks ago GoDaddy initiated public discussion[2] announcing its intent to issue two externally operated intermediate CAs to Certainly, LLC.[3]
Background
In evaluating roots for inclusion, we are bound by the Principles of the Mozilla Manifesto[4] and the Mozilla Root Store Policy (MRSP) [5]. We use an open, public, and transparent procedure, and we evaluate the risks to users’ security and privacy.
Under section 8 of the MRSP (v.2.7.1), “All CAs whose certificates are included in Mozilla's root program MUST notify Mozilla if: … an organization other than the CA obtains control of an unconstrained intermediate certificate (as defined in section 5.3.2 of this policy) that directly or transitively chains to the CA's included certificate(s).” The procedure for performing the review of externally operated subordinate CAs was published in the wiki[1] relatively recently. Previously, there had only been a requirement to notify Mozilla.
The above-referenced procedure makes it clear that the “Quantifying Value” step and other steps not outlined in the procedure are not required. Such additional steps are reserved for when we process a root inclusion request.
Summary of Discussion
Ryan Sleevi argued that Mozilla's approval of the two intermediate CAs should be withheld until Certainly had been approved as a root CA operator pursuant to its pending root inclusion application.[6] His primary argument has been that the security risks to the community are equal under either case and that the approval of Certainly allows it to "jump the queue" and avoid some of the due diligence that would otherwise be required (e.g. CP/CPS review and a risk-vs-value justification).
Wayne Thayer on behalf of Certainly responded that Ryan was asking for a process that would be new and different from the existing process.
Ryan responded that accepting the sub CAs would be "functionally no different than accepting the root CA without those processes being completed."
I responded that two different trust decisions were involved – one was trusting the root(s) and the other being to allow GoDaddy to issue the sub CAs to Certainly.
Dimitris Zacharopoulos argued that the situation at hand involves an existing CA operator (i.e. GoDaddy), which had performed due diligence and was taking on liability and reputational risks and was placing controls to monitor the compliance. He also argued that procedurally, it would be unfair to delay the application more than the current Mozilla Policy dictates.
Ryan responded that the risks are the same for Mozilla users, and that the level of vetting and review should be the same under either scenario. He argued that security of users should outweigh the "fairness" considerations. He also said, "Transparent, consistent processes, aligned with the policy objectives, but that does not mean a dispensation towards assuming inclusion, or that 'If you did the work, and got an audit, you should be trusted'. This process is one of risk management, and that cannot and should not be abdicated."[7] In that list posting, Ryan also raised the following four points:
1. Root CAs have significantly less experience reviewing the inclusion of CAs, including CP/CPS reviews.
2. Root CAs are primarily focused on their perceived risks, which are indirect proxies for user risk, as opposed to being directly focused on user risks
3. Root CAs do not generate the same degree of transparency, artifacts and records as the public review process.
1. For example, we have no such record of a detailed CP/CPS review (although, to the prior two points, it's questionable to what extent it would be aligned with community needs)
2. We have no discussion and/or transparency as to Root CAs' processes for conducting such reviews
3. We have no transparency into any commitments and/or representations made
4. In practice, the risk is greater, not less, because any issues now present two CAs to remediate, rather than one.
Matt Palmer argued that initial due diligence by a Root CA operator would not be as thorough as one done by the module owner.
In support of the argument that Mozilla cannot rely on the due diligence of the root CA operator, Andrew Ayer pointed to a statement in the Certainly CP/CPS concerning domain control validation ("In exceptional cases control may be validated using methods similar to those employed by ACME, but performed manually.") That sentence was subsequently deleted from the Certainly CP/CPS.
Brittany Randall, on behalf of GoDaddy, provided documentation of the due diligence performed by GoDaddy. (See Comment 9 in Bug 1755851.)
An updated CP/CPS was posted Certainly, and I reviewed that CP/CPS, the Compliance Self-Assessment, and GoDaddy's review documents and found that they conformed to MRSP and BR requirements.
Ryan asked whether the level of review conducted was appropriate for the risk posed to the community, both Mozilla users and those that rely on Mozilla's process. He argued that GoDaddy's ability to issue external CAs was the equivalent of a "trust list" or "Super CA". He asked whether a value quantification needed to be performed. He also noted problems with the Certainly CP/CPS (which Certainly and GoDaddy have since committed to address). In conclusion, Ryan stated, "Unless we're willing to say that we're predisposing the conversation and biased in Certainly's favor, then it seems the only way to mitigate that risk is to treat the intermediate signing with the same degree of care and caution as the root, and to accept that any decision about the intermediate is functionally, technically, and procedurally identical to a decision about the root. If we're not willing to say 'OK, we can skip all root discussion' based on this thread, then I don't believe it should proceed here. And I don't believe we should skip the root discussion."[8]
Close of Public Discussion and Intent to Approve Request
Mozilla appreciates the many who
have reviewed the documentation and made comments on this matter. Mozilla is open
to suggestions that will improve the process going forward. However, we currently
see two distinct processes – the root inclusion process and this new process for
approving externally operated unconstrained subordinate CAs. While the risks presented
by a root and an intermediate may be very similar, they are not identical. For
example, a root certificate can issue other CA certificates, which introduces
the risk that a CA certificate will be mis-issued. While the intermediate CA
certificates proposed here cannot be used to issue CA certificates, and can only
be used to issue DV server certificates. They can also be easily distrusted by
adding them to OneCRL, unlike a root, which must be removed from the trust
store. Therefore, we are not inclined to require that Certainly complete the root inclusion process before moving forward as a sub CA.
This is notice that I am closing public discussion and that it is Mozilla’s intent to approve GoDaddy's request for the reasons explained below. (Certainly will still need to complete the root inclusion process and provide a risk-vs-value justification for inclusion of its roots.)
Certainly has been audited under the WebTrust for CAs principles and criteria[9]. GoDaddy has conducted thorough policy, compliance, and risk management due diligence related to the cross-signing of the Certainly sub CAs.[10] Because GoDaddy is putting its own root at risk, such reviews have gone beyond the minimum requirements of Mozilla and the CA/Browser Forum's Baseline Requirements. GoDaddy's well-documented onboarding of Certainly has included multiple reviews of its audit reports, risk assessments, CP/CPS, training materials, and other documentation. GoDaddy has conducted a CP/CPS alignment review to compare the Certainly CP/CPS with its own CPS and has tracked changes to be made in both parties' CP/CPSes to not only ensure consistency, but to also address the comments that have been received during this public discussion process. GoDaddy's risk management department will conduct ongoing oversight of Certainly's compliance with requirements and hold quarterly touch-point meetings with Certainly. GoDaddy will also be responsible for ensuring that the CCADB is kept up to date with current audits and CP/CPSes for the subCAs, and its Governance and Policy Committee (GPC) will also review updates to the Certainly CP/CPS to ensure ongoing compliance.
As noted in the above-referenced procedure[1], this begins a 7-day “last call” period for any final objections.
Thanks,
Ben
[1] https://wiki.mozilla.org/CA/External_Sub_CAs_not_Technically_Constrained
[2] https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/bEnn98Dajzc/m/32NwZHWSAAAJ
[3] https://bugzilla.mozilla.org/show_bug.cgi?id=1755851
[4] https://www.mozilla.org/en-US/about/manifesto/details/
[5] https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/
[6] https://bugzilla.mozilla.org/show_bug.cgi?id=1727941
[7] https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/bEnn98Dajzc/m/61wX1hOiAQAJ
[8] https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/bEnn98Dajzc/m/58uqrxV7AgAJ
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CAPh8bk_nUp_F9TB35AtwNZ8%2Bi%3Df66g1y3jvGNS%2BQfUy_j9b7_Q%40mail.gmail.com.
I have not done a detailed CP/CPS review as I would normally do, in part, because there are not the supporting materials that normally exist by the point that I would do such a thing. I am concerned that the "Self-Assessments" may have moved from a "thing to benefit the CA" and into a "thing the Root Program relies on," and I do worry about that. I do want to make it clear: Despite the thoroughness of my comments here, I did not do my normal deep review here, and I would not rely on this as a "Hey, this is proof that if this is all he found, we're fine" - it's simply a quick scan of concerns:
- 1.3.2 notes that RA functions are not delegated, but the section is titled "Registration Authorities and other delegated third parties". In Section 1.3.5, it notes that "Certainly vendors and service providers that have access to confidential information or privileged systems ...", suggesting that there may be at least some functionality that is delegated to third parties. 1.3.2 of the BRs allows for delegating the RA functions (Section 3.2) to DTPs, but the definition within 1.6.1 of the BRs makes it clearer that a DTP applies to any delegation of function. That is, the BRs allow for either 3.2 functionality (e.g. as supported by 4.2.1 of the BRs) or any other function other than 3.2.2.4/3.2.2.5 (supported by 5.3.7 and 5.4.1 - related to ISMS and not just RA functions)
- 1.4.1 limits the certificates to use with the TLS protocol, and 1.4.2 prohibits any other use. What does this mean for QUIC, which Fastly supports [3]? I realize the extent that QUIC repurposes the TLS handshake, but it is a different protocol [4].
- A brief scan of 1.6.1 shows that there are subtle differences in the definitions between Certainly's CP/CPS and the BRs. That's _not_ problematic in and of itself, but requires careful scrutiny to review that the meaning and obligations are preserved throughout the entire document and are consistent under these modified definitions.
- 1.6.3's references are unversioned. There are various semantic and syntactic differences in X.509, for example, up to and including the recent changes to the underlying model [5], that these differences may matter, even if there is a "common sense" understanding one might take.
- 3.1.4 gives conflicting advice in terms of understanding the construction of names. With respect to DNs, this is the opportunity to be unambiguous about the name forms employed (presumably, C and CN) and their interpretation - and limits.
- 3.1.6 states "Certainly reserves the right to refuse to include a domain name within a Certificate". This right seems to go beyond those otherwise enumerated by the BRs (e.g. scenarios contemplated within 4.9.1), and so it's unclear when, why, and how this right might be exercised. I anticipate that Certainly wouldn't want to give up this right, even if it's not strictly necessary, but it perhaps bears elaborating why this reservation is seen as necessary and how it might be exercised.
- 3.1.6 seems to suggest that, independent of the UDRP, Certainly may make its own determinations about the right or authorization to use a domain name. That seems suboptimal.
- 3.2.5 appears that Certainly have read the BRs 3.2.5 as [If A then (B, C, and D)], rather than [(If A then {B, C}), and D]. That is, whether the "In addition" in the terminal paragraph joins to the first condition (if the Applicant ... is an organization), or whether it states an procedure that is applicable for all Applicants, and not just those that are organizations. While understandably the BRs can benefit from clarity here, it bears calling out, because as a consequence, they provide no such method to limit accounts that can request certificates, made explicit in 4.2.1
- 7.1 does not list all of the RFC 5280-required fields and extensions within the relevant profiles. This raises the question of whether they are "permitted, but unspecified", "prohibited, but not omitted, violating the CP/CPS", or "prohibited, but omitted, violating 5280". Taking the more generous first interpretation, on the basis of the first sentence in this section, it seems clearer to explicitly document the fields that will be included within the profile, and ensure no fields are included without a corresponding CP/CPS update.
- 7.1 uses a rather long OCSP signing certificate (5 years), without documentation (AFAICT) of the corresponding key protection. Given the description of the tradeoffs of OCSP no-check, it seems like a shorter lifetime reduces risks/concerns.
All,
Public discussion and the 7-day last-call period recently ended[1], and Certainly's request to include its R1 and E1 root CAs in the root store has been approved[2]. The purpose of this email is to clarify that GoDaddy's request to cross-sign Certainly's issuing CAs[3] is similarly approved. GoDaddy and Certainly have successfully completed the Process for non-Technically Constrained Subordinate CAs[4].
Thanks,
Ben
[1] https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/EhXhiHfWGC8/m/3PcJHizqAAAJ
[2] https://bugzilla.mozilla.org/show_bug.cgi?id=1727941
[3] https://bugzilla.mozilla.org/show_bug.cgi?id=1755851