Fixed
Status Update
Comments
vi...@google.com <vi...@google.com> #2
We’ve shared this with our product and engineering teams and will continue to provide updates as more information becomes available.
wt...@fastly.com <wt...@fastly.com> #3
Can anyone provide an update on this request? These roots are now shipping in Chrome, Apple OSes, and Firefox.
vi...@google.com <vi...@google.com> #4
Our development team has fixed the issue you have reported.
Description
Certainly requests the inclusion of our RSA (R1) and ECDSA (E1) root certificates in the Android root store:
These roots will only issue TLS server and client authentication certificates.
Certainly LLC is a commercial CA with global reach that intends to secure a wide range of websites visited by Android users. We have built a modern CA that relies on automated processes to issue TLS certificates with a relatively short validity period. Our service combines the best practices pioneered by Let’s Encrypt with commercial assurances that are important to our customers.
Mozilla inclusion request:https://bugzilla.mozilla.org/show_bug.cgi?id=1727941
CCADB Case:https://ccadb-public.secure.force.com/mozilla/PrintViewForCase?CaseNumber=00000829
The CA certificates, CP/CPS, and other policy documents may be found athttps://certainly.com/repository/
The following WebTrust audits were performed by Schellman & Company:
Root Key Generation:https://www.certainly.com/repository/audit/2021_Root_Key_Generation_Report.pdf
Key Protection period:https://www.certainly.com/repository/audit/2021_WebTrust_for_CAs_(Key_Lifecycle_Management_Activities)_Report.pdf
WTCA point-in-time:https://www.certainly.com/repository/audit/2021_WebTrust_for_CAs_Report.pdf
WTBR point-in-time:https://www.certainly.com/repository/audit/2021_WebTrust_for_CAs_(SSL_Baseline)_Report.pdf