CA/Root Inclusion Considerations: Difference between revisions

Jump to navigation Jump to search
drafting
(drafting)
(drafting)
Line 16: Line 16:
** cyber espionage.
** cyber espionage.
* The CA operator is in [https://trust.salesforce.com/blocked a global region that cannot use the CCADB], or is not capable of entering into a contractual agreement with a [https://www.treasury.gov/resource-center/sanctions/Programs/Pages/Programs.aspx US-based] company.
* The CA operator is in [https://trust.salesforce.com/blocked a global region that cannot use the CCADB], or is not capable of entering into a contractual agreement with a [https://www.treasury.gov/resource-center/sanctions/Programs/Pages/Programs.aspx US-based] company.
* The CA operator has
** Mis-issued a large or unknown number of end-entity or intermediate certificates that they are not able to enumerate.
** Deliberately violated Mozilla's Root Store Policy or other applicable policy
** Lied, concealed, or failed to disclose the full extent of a problem
When the CA operator currently has root certificates included in Mozilla's root store, Mozilla will take the steps described here: https://wiki.mozilla.org/CA/Maintenance_and_Enforcement#Potential_Problems.2C_Prevention.2C_Response


== Concerning Behavior ==
== Concerning Behavior ==
Confirmed users, Administrators
5,526

edits

Navigation menu