CA: Difference between revisions

From MozillaWiki
Jump to navigation Jump to search
(→‎Policy: Added links to blog post)
m (Added level 3 headings)
Line 65: Line 65:
* [https://ccadb.my.salesforce-sites.com/mozilla/CAAIdentifiersReport List of CAA Identifiers] (used to restrict issuance of certificates to specific CAs via a [https://tools.ietf.org/html/rfc6844 DNS Certification Authority Authorization Resource Record])
* [https://ccadb.my.salesforce-sites.com/mozilla/CAAIdentifiersReport List of CAA Identifiers] (used to restrict issuance of certificates to specific CAs via a [https://tools.ietf.org/html/rfc6844 DNS Certification Authority Authorization Resource Record])


'''Compliance'''
=== Compliance ===
* [[CA/Forbidden_or_Problematic_Practices|Forbidden or Problematic CA Practices]]
* [[CA/Forbidden_or_Problematic_Practices|Forbidden or Problematic CA Practices]]
* [[CA/Required_or_Recommended_Practices|Required or Recommended CA Practices]]
* [[CA/Required_or_Recommended_Practices|Required or Recommended CA Practices]]
Line 73: Line 73:
* [[CA/Vulnerability_Disclosure|Disclosing a Vulnerability or Security Incident]]
* [[CA/Vulnerability_Disclosure|Disclosing a Vulnerability or Security Incident]]


'''Root Inclusion'''
=== Root Inclusion ===
* [[CA/Prioritization|Prioritization Criteria for Processing Root Inclusion Requests]]  
* [[CA/Prioritization|Prioritization Criteria for Processing Root Inclusion Requests]]  
* [[CA/Application_Process|Application Process for Mozilla's Root Program]]
* [[CA/Application_Process|Application Process for Mozilla's Root Program]]
Line 85: Line 85:
* [[CA/Root_Inclusion_Considerations|Root Inclusion Considerations]] -- This page is intended to be used as a tool for identifying when a CA Operator's root inclusion request should be denied, or when a CA's root certificate should be removed from Mozilla's root store.
* [[CA/Root_Inclusion_Considerations|Root Inclusion Considerations]] -- This page is intended to be used as a tool for identifying when a CA Operator's root inclusion request should be denied, or when a CA's root certificate should be removed from Mozilla's root store.


'''Root Removal and Other Root Changes'''
=== Root Removal and Other Root Changes ===
* [[CA/Certificate_Change_Process|Change or Remove an Included Root Certificate]]
* [[CA/Certificate_Change_Process|Change or Remove an Included Root Certificate]]
* [[CA/Root_CA_Lifecycles|Root CA Lifecycles]]
* [[CA/Root_CA_Lifecycles|Root CA Lifecycles]]


'''Revocation'''
=== Revocation ===
* [[CA/Revocation_Reasons|Revocation Reasons for TLS Server Certificates]]
* [[CA/Revocation_Reasons|Revocation Reasons for TLS Server Certificates]]
** [https://blog.mozilla.org/security/2022/05/16/revocation-reason-codes-for-tls-server-certificates/ Revocation Reasons Blog Post]
** [https://blog.mozilla.org/security/2022/05/16/revocation-reason-codes-for-tls-server-certificates/ Revocation Reasons Blog Post]
Line 108: Line 108:
** [[CA:TestErrors|Explanation of errors encountered during certificate testing]]
** [[CA:TestErrors|Explanation of errors encountered during certificate testing]]


'''Certificate Linters'''
=== Certificate Linters ===
* [https://github.com/pkimetal/pkimetal PKI Meta-Linter] Access multiple linters via a single REST API call
* [https://github.com/pkimetal/pkimetal PKI Meta-Linter] Access multiple linters via a single REST API call
* [https://github.com/digicert/pkilint PKI Lint Tool for TLS & S/MIME] - GitHub
* [https://github.com/digicert/pkilint PKI Lint Tool for TLS & S/MIME] - GitHub

Revision as of 16:38, 19 May 2025

Mozilla's CA Certificate Program

Mozilla’s CA Certificate Program governs inclusion of root certificates in Network Security Services (NSS), a set of open source libraries designed to support cross-platform development of security-enabled client and server applications. The NSS root certificate store is not only used in Mozilla products such as the Firefox browser, but is also used by other companies in a variety of products. The program is overseen by the module owner and peers of the CA Certificates Module; the policy itself is overseen by the module owner and peers of the CA Certificate Policy Module. Here are a few blog posts that describe the Mozilla CA Certificate Program in further detail:


Policy

Lists of CAs and Certificates

Program Administration

Most information relating to the administration of our program is stored either in Bugzilla or in the Common CA Database.

crt.sh

Information for Auditors

Information for CAs

Compliance

Root Inclusion

Root Removal and Other Root Changes

Revocation

How Firefox Works

Tools to Check Certificates

Certificate Linters

Information for the Public

Configuring Firefox


Discussion Forums

The following public forums are relevant to CA evaluation and related issues.

CCADB
MDSP
  • Mozilla's dev-security-policy (MDSP) mailing list is used for discussions of Mozilla policies related to security in general and CAs in particular, and for wider discussions about the WebPKI. If you are a regular participant in MDSP, then please add your name to the Policy Participants page.
Other MDSP Mail Archives
  • New MDSP Messages (since August 2021)

(HTML): https://www.mail-archive.com/dev-security-policy@mozilla.org/

(RSS): https://www.mail-archive.com/dev-security-policy@mozilla.org/maillist.xml

  • Old MDSP Messages (until April 2021)

(HTML): https://www.mail-archive.com/dev-security-policy@lists.mozilla.org/

(RSS): https://www.mail-archive.com/dev-security-policy@lists.mozilla.org/maillist.xml

Other Forums
  • Mozilla's dev-tech-crypto mailing list is used for discussions of the NSS cryptographic library used in Firefox and other Mozilla-based products, as well as the PSM module that implements higher-level security protocols for Firefox.
  • For other discussions of Mozilla security issues: