Dear Mozilla Community,
Four new Root CA reports are now available for review from the CCADB. These reports provide information on Root Certificates trusted for TLS and S/MIME authentication within Mozilla’s Root Store. (These links will go on https://wiki.mozilla.org/CA/Included_Certificates and https://www.ccadb.org/resources.)
Full report (CSV):
https://ccadb.my.salesforce-sites.com/ccadb/Report?Name=MozillaTLSServerAuthenticationCSV
A list of 144 Root CAs with the websites trust bit enabled, including:
CA Owner
Certificate Name
SHA-256 Fingerprint
SPKI SHA256
Valid From / Valid To (GMT)
Full CRL Issued By This CA
JSON Array of Partitioned CRLs
X.509 Certificate (PEM format)
PEM-only version:
https://ccadb.my.salesforce-sites.com/ccadb/Report?Name=MozillaTLSServerAuthenticationPEMOnly
Full report (CSV):
https://ccadb.my.salesforce-sites.com/ccadb/Report?Name=MozillaSMIMECSV
A list of 134 Root CAs with the email trust bit enabled, including:
CA Owner
Certificate Name
SHA-256 Fingerprint
SPKI SHA256
Valid From / Valid To (GMT)
Full CRL Issued By This CA
JSON Array of Partitioned CRLs
X.509 Certificate (PEM format)
PEM-only version:
https://ccadb.my.salesforce-sites.com/ccadb/Report?Name=MozillaSMIMEPEMOnly
--You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
...
Also: could these be hosted under a mozilla.org domain
name? Going to Salesforce as a the source of truth
for Mozilla truststore information seems odd.