<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="included.xsl"?>

<certificates type="included">
  <!-- Example -->
  <authority name="DigiCert" url="http://www.digicert.com/"             >
    <summary>DigiCert is a US-based commercial CA with headquarters in Lindon, UT. DigiCert
provides digital certification and identity assurance services internationally
to a variety of sectors including business, education, and government.</summary>
    <audit type="WebTrust">
      <auditor url="http://kpmg.com/">KPMG</auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=558&amp;file=pdf">Audit
      Report and Management's Assertions</document>
    </audit>
    <audit type="WebTrust EV">
      <auditor url="http://kpmg.com/">KPMG</auditor>
      <document url="https://www.digicert.com/ev-final-webtrust-report.pdf">Report in relation to the WebTrust for Certification Authorities Extended Validation Criteria</document>
    </audit>
    <certificate name="DigiCert Assured ID Root CA" status="included">
      <summary></summary>
      <data url="http://www.digicert.com/CACerts/DigiCertAssuredIDRootCA.crt"
            version="3" 
            sha1="05:63:B8:63:0D:62:D7:5A:BB:C8:AB:1E:4B:DF:B5:A8:99:B2:4D:43" 
            modulus="2048" 
            from="2006-11-10" 
            to="2031-11-10"/>
      <crl url="http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl">CRL</crl>
      <ocsp>http://ocsp.digicert.com</ocsp>
      <type>OV, EV</type>
      <document url="http://www.digicert.com/CPS_V3-0-3_3-15-2007.pdf">DigiCert 
      Certificate Policy and Certification Practice Statement (CP and CPS for OV), v3.0.3
      </document>
      <document url="http://www.digicert.com/EV_CPS_V-1-0-1_3-19-2007.pdf">DigiCert 
      Certification Practice Statement for Extended Validation Certificates (CPS for EV), v1.0.1
      </document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>  
      <inclusion date="NSS 3.11.8, Firefox 2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=364568</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=378162</technical>
      </inclusion>
      <comments> The Code Signing trust bit was enabled in bugzilla #595013. </comments>
    </certificate>
    <certificate name="DigiCert Global Root CA" status="included">
      <summary></summary>
      <data url="http://www.digicert.com/CACerts/DigiCertGlobalRootCA.crt"
            version="3" 
            sha1="A8:98:5D:3A:65:E5:E5:C4:B2:D7:D6:6D:40:C6:DD:2F:B1:9C:54:36" 
            modulus="2048" 
            from="2006-11-10" 
            to="2031-11-10"/>
      <crl url="http://crl3.digicert.com/DigiCertGlobalRootCA.crl">CRL</crl>
      <ocsp>http://ocsp.digicert.com</ocsp>
      <type>OV, EV</type>
      <document url="http://www.digicert.com/CPS_V3-0-3_3-15-2007.pdf">DigiCert 
      Certificate Policy and Certification Practice Statement (CP and CPS for OV), v3.0.3
      </document>
      <document url="http://www.digicert.com/EV_CPS_V-1-0-1_3-19-2007.pdf">DigiCert 
      Certification Practice Statement for Extended Validation Certificates (CPS for EV), v1.0.1
      </document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>  
      <inclusion date="NSS 3.11.8, Firefox 2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=364568</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=378162</technical>
      </inclusion>
      <comments> The Code Signing trust bit was enabled in bugzilla #595013. </comments>
    </certificate>
    <certificate name="DigiCert High Assurance EV Root CA" status="included">
      <summary></summary>
      <data url="http://www.digicert.com/CACerts/DigiCertHighAssuranceEVRootCA.crt"
            version="3" 
            sha1="5F:B7:EE:06:33:E2:59:DB:AD:OC:4C:9A:E6:D3:8F:1A:61:C7:DC:25" 
            modulus="2048" 
            from="2006-11-10" 
            to="2031-11-10"/>
      <crl url="http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl">CRL</crl>
      <ocsp>http://ocsp.digicert.com</ocsp>
      <type>OV, EV (policy OID 2.16.840.1.114412.2.1)</type>
      <document url="http://www.digicert.com/DigiCert_CPS.pdf">DigiCert Certificate Policy and Certification Practice Statement (CP and CPS for OV), v3.0.6</document>
      <document url="http://www.digicert.com/DigiCert_EV-CPS.pdf">DigiCert Certification Practice Statement for Extended Validation Certificates (CPS for EV), v1.0.1</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>  
      <inclusion date="NSS 3.11.8, Firefox 2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=364568</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=378162</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=416827</ev>
      </inclusion>
      <comments> The Code Signing trust bit was enabled in bugzilla #595013. </comments>
    </certificate>
  </authority>

  <authority name="Firmaprofesional" url="http://www.firmaprofesional.com">
    <summary>
     Firmaprofesional is a commercial CA in Spain that issues certificates to professional 
     corporations, companies and other institutions.  Their main activity is the generation, 
     transmission and distribution of digital certificates through professional corporations, 
     companies or other institutions, which act as Registration Authorities and Certification 
     Authorities in the hierarchy of certification Firmaprofesional. Firmaprofesional has a 
     network of more than 70 Registration Authorities located throughout Spain.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.ey.com/es">Ernst &amp; Young</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=946">Audit Report and Management’s Assertions</document>
    </audit>
    <certificate name="Autoridad de Certificacion Firmaprofesional CIF A62634068" status="included">
      <summary>
      This is a renewal for the Firmaprofesional root certificate that is currently in NSS. 
      Sub-CAs of the new root cross-sign end-entity certs with sub-CAs of the old root, 
      in order to maintain business continuity.
      This root CA signs subordinate CAs that sign end-entity certificates. 
      One sub-CA is used by Firmaprofesional, and other sub-CAs are issued for organizations
      including professional corporations, companies or other institutions, which act as 
      Registration Authorities and Certification Authorities in the hierarchy of certification Firmaprofesional.
      </summary>
      <data url="http://crl.firmaprofesional.com/caroot.crt"
            version="3"
            sha1="AE:C5:FB:3F:C8:E1:BF:C4:E5:4F:03:07:5A:9A:E8:00:B7:F7:B6:FA"
            modulus="4096"
            from="2009-05-20"
            to="2030-12-31"/>
      <crl url="http://crl.firmaprofesional.com/firmaprofesional1.crl">CRL</crl>
      <ocsp>http://servicios.firmaprofesional.com/ocsp</ocsp>
      <type>OV</type>
      <document url="http://www.firmaprofesional.com/cps/">Firmaprofesional Document Repository</document>
      <document url="http://www.firmaprofesional.com/cps/FP_CPS_5.pdf">CPS (Spanish)</document>
      <document url="http://www.firmaprofesional.com/cps/FP_CP_Gen_Servidor_Seguro_5.1.pdf">SSL CP (Spanish)</document>
      <document url="http://www.firmaprofesional.com/cps/FP_CP_FirmaCodigo_4.pdf">Code Signing CP (Spanish)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.9, Firefox 4.0">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=521439</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=601718</technical>
      </inclusion>
    </certificate>
  </authority>
  
  <authority name="QuoVadis" url="http://www.quovadis.bm/"              >
    <summary>QuoVadis is a commercial CA, based in Bermuda and operating globally. 
    QuoVadis is a Qualified Certification Services Provider in Switzerland.</summary>
    <audit type="WebTrust and WebTrust EV">
      <auditor url="http://www.ey.com/">Ernst &amp; Young </auditor>
      <document url="http://www.quovadisglobal.com/AboutUs/Accreditations.aspx">Audit Report 
      and Management's Assertions</document>
    </audit>
    <audit type="ETSI TS 101.456">
      <auditor url="http://www.kpmg.ch/">KPMG</auditor>
      <document url="http://www.seco.admin.ch/sas/00229/00251/00254/index.html?lang=en">Swiss Accreditation Service statement</document>
    </audit>
    <certificate name="QuoVadis Root CA 2" status="included">
      <summary>This root will be used for SSL/device certificates, including
      standard "organisation validated" certificates as well as EV certificates.</summary>
      <data url="http://www.quovadis.bm/public/qvrca2.crt"
            version="3" 
            sha1="CA:3A:FB:CF:12:40:36:4B:44:B2:16:20:88:80:48:39:19:93:7C:F7" 
            modulus="4096" 
            from="2006-11-24" 
            to="2031-11-24"
            ev-oid="1.3.6.1.4.1.8024.0.2.100.1.2"/>
      <crl url="http://crl.quovadisglobal.com/qvrca2.crl">CRL</crl>
      <ocsp>http://ocsp.quovadisglobal.com/</ocsp>
      <type>OV, EV</type>
      <document url="http://www.quovadis.bm/policies/QV_RCA2_CPCPS_v1.7.pdf">QuoVadis 
      Root CA2 CP/CPS v1.7</document>
      <document url="http://www.quovadis.bm/policies/QV_RCA2_CPCPS_v1.7.pdf">QuoVadis 
      Root CA2 CP/CPS v1.7</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>  
      <inclusion date="NSS 3.11.8, Firefox 2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=365281</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=378161</technical>
      </inclusion>
    </certificate>
    <certificate name="QuoVadis Root CA 3" status="included">
      <summary>This root will operate under a similar CP/CPS to our existing "qualified" Root CA 1,
      primarily used for end user certificates.</summary>
      <data url="http://www.quovadis.bm/public/qvrca3.crt"
            version="3" 
            sha1="1F:49:14:F7:D8:74:95:1D:DD:AE:02:C0:BE:FD:3A:2D:82:75:51:85" 
            modulus="4096" 
            from="2006-11-24" 
            to="2031-11-24"/>
      <crl url="http://crl.quovadisglobal.com/qvrca3.crl">CRL</crl>
      <ocsp>http://ocsp.quovadisglobal.com/</ocsp>
      <type>OV</type>
      <document url="http://www.quovadis.bm/policies/QV_CPCPS_V4_3.pdf">QuoVadis Root CA CP/CPS 4.3</document>
      <document url="http://www.quovadis.bm/policies/QV_CPCPS_V4_3.pdf">QuoVadis Root CA CP/CPS 4.3</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>  
      <inclusion date="NSS 3.11.8, Firefox 2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=365281</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=378161</technical>
      </inclusion>
    </certificate>    
  </authority>

  <authority name="GlobalSign" url="http://www.globalsign.com/"         >
    <summary>GlobalSign is a commercial CA based in Portsmouth NH and
      serving customers worldwide. 
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.ey.com/be/">Ernst &amp; Young</auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=928&amp;file=pdf">Audit Report and Management’s Assertions</document>
    </audit>
    <audit type="WebTrust EV">
      <auditor url="http://www.ey.com/be">Ernst &amp; Young</auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=929&amp;file=pdf">Audit Report and Management’s Assertions</document>
    </audit>
    
    <certificate name="GlobalSign Root CA – R3" status="included">
      <summary>
      This is the SHA256 version of the GlobalSign root (SHA1) that is already included 
      in NSS. This root is primarily suitable for Server and Client Authentication, 
      Secure e-mail, Code Signing and Timestamping. However the root itself is marked 
      for all issuance policies and therefore can also be used for OCSP, Encrypting File 
      System, IP Sec (Tunnel, User) and CA Encryption Certificate purposes.  
      The root has been created (A ceremony to WebTrust audited standards witnessed by 
      Ernst and Young). However, this root is not yet active, so no CRL or OCSP service 
      has yet been provided for it. GlobalSign will be supporting a new certificate 
      hierarchy in 2010 based on this SHA256 root. 
      </summary>
      <data url="http://secure.globalsign.net/cacert/Root-R3.crt"
            version="3" 
            sha1="D6:9B:56:11:48:F0:1C:77:C5:45:78:C1:09:26:DF:5B:85:69:76:AD" 
            modulus="2048" 
            from="2009-03-18"
            to="2029-03-18"/>
      <crl url="http://crl.globalsign.net/root-r3.crl">CRL</crl>
      <ocsp><!-- None --></ocsp>
      <type>DV, OV, EV (policy OID 1.3.6.1.4.1.4146.1.1)</type>
      <document url="http://www.globalsign.com/repository/">Repository of All Legal Documents</document>
      <document url="http://www.globalsign.com/repository/GlobalSign_CPS_v6.7.pdf">GlobalSign Certification Practice Statement</document>
      <document url="http://www.globalsign.com/repository/GlobalSign_CA_CP_v3.5.pdf">GlobalSign CA Certificate Policy</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>  
      <inclusion date="NSS 3.12.8, Firefox 3.6.12">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=507360</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=582375</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=582381</ev>
        <technical></technical>
      </inclusion>
    </certificate>

    <certificate name="GlobalSign Root CA - R2" status="included">
      <summary>Root CA with one subordinate CA.</summary>
      <data url="https://secure.globalsign.net/cacert/root-r2.crt"
            version="3" 
            sha1="75:E0:AB:B6:13:85:12:27:1C:04:F8:5F:DD:DE:38:E4:B7:24:2E:FE" 
            modulus="2048" 
            from="2006-12-15" 
            to="2021-12-15"/>
      <crl url="http://crl.globalsign.net/root-r2.crl">CRL</crl>
      <ocsp>http://evssl-ocsp.globalsign.com/responder</ocsp>
      <type>EV (policy OID 1.3.6.1.4.1.4146.1.1)</type>
      <document url="http://www.globalsign.com/repository/GlobalSign_CPS_v6.0.pdf">GlobalSign Certification Practice Statement, version 6.0</document>
      <document url="http://www.globalsign.com/repository/GlobalSign_CA_CP_v3.0.pdf">GlobalSign CA Certificate Policy, version 3.0</document>
      <document url="http://www.globalsign.com/repository/GlobalSign_CP_v_2_1.pdf">GlobalSign CP v2.1</document>
      <document url="http://www.globalsign.com/repository/GlobalSign_CPS_v_5_3.pdf">GlobalSign CPS v5.3</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>  
      <inclusion date="NSS 3.11.8, Firefox 2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=367245</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=378163</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=406796</ev>
      </inclusion>
    </certificate>
    
    <certificate name="GlobalSign Root CA" status="included">
      <summary>Root CA with two subordinate CAs.
      </summary>
      <data url="http://secure.globalsign.net/cacert/Root-R1.crt"
            version="3"
            sha1="B1:BC:96:8B:D4:F4:9D:62:2A:A8:9A:81:F2:15:01:52:A4:1D:82:9C"
            modulus="2048"
            from="1998-09-01"
            to="2028-01-28"/>
      <crl url="http://crl.globalsign.net/root.crl">CRL</crl>
      <ocsp>http://evssl-ocsp.globalsign.com/responder</ocsp>
      <type>DV, IV/OV, EV (policy OID 1.3.6.1.4.1.4146.1.1)</type>
      <document url="http://www.globalsign.com/repository/GlobalSign_CPS_v6.0.pdf">GlobalSign Certification Practice Statement, version 6.0</document>
      <document url="http://www.globalsign.com/repository/GlobalSign_CA_CP_v3.0.pdf">GlobalSign CA Certificate Policy, version 3.0</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.11.10, Firefox 3.0.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=406794</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=449883</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=446407</ev>
      </inclusion>
      <comments>Note that a version of this root CA certificate with
        the same public key but an earlier expiration date
        (2014-01-28) is already included in the Mozilla list. This
        request is to replace the older certificate with this
        certificate and then enable this CA certificate for EV.
      </comments>
    </certificate>
  </authority>
  
  <authority name="Keynectis / Certplus" url="http://www.keynectis.com/"  >
    <summary>
    Keynectis is a French commercial CA that issues certificates to the general 
    public. Keynectis was created by merging two previous French certification 
    operators, Certplus and PK7.
    </summary>
    <audit type="ETSI TS 101.456">
      <auditor url="http://www.lsti.fr/">LSTI - La Sécurité des Technologies de l'Information</auditor>
      <document url="http://www.lsti-certification.fr/index.php?option=com_content&amp;view=article&amp;id=58&amp;Itemid=53&amp;lang=fr">ETSI Certificate</document>
    </audit>
    <audit type="WebTrust EV">
      <auditor url="http://www.kpmg.fr/">KPMG</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=382979">Audit Report and Management's Assertion</document>
    </audit>
    <certificate name="Certplus Class 2 Primary CA" status="included">
      <summary></summary>
      <data url="http://www.certplus.com/PC/certplus_class2.pem"
            version="3" 
            sha1="74:20:74:41:72:9C:DD:92:EC:79:31:D8:23:10:8D:C2:81:92:E2:BB" 
            modulus="2048" 
            from="1999-07-07" 
            to="2019-07-06"/>
      <crl url="http://www.certplus.com/CRL/class2.crl">CRL</crl>
      <ocsp>http://kvalid.keynectis.com/evssl-ocsp/</ocsp>
      <type>OV, EV (Policy OID 1.3.6.1.4.1.22234.2.5.2.3.1)</type>
      <document url="http://www.keynectis.com/PC/CPS_KEYNECTIS_120407v1.1.pdf">Declaration des Pratiques de Certification (CPS in French)</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=387860">CPS for EV SSL CA (English)</document>
      <document url="https://www.keynectis.com/static/content/common/pc-dpc/DSQ_CP_RCA_0.6.pdf">Root CA CP (English)</document>
      <document url="https://www.keynectis.com/static/content/common/pc-dpc/DSQ_CP__KEYNECTIS_SSL_CA_CP_1.1s.pdf">SSL CP (English)</document>
      <document url="https://www.keynectis.com/static/content/common/pc-dpc/DSQ_PC_PC_AC_KEYNECTIS_SSL_1.2s.pdf">SSL CPS (English)</document>
      <document url="https://www.keynectis.com/en/support-information/pc.html">Keynectis Information (English)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
      </trust>  
      <inclusion date="NSS 3.11.8, Firefox 2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=335392</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=379032</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=555860</ev>
      </inclusion>
    </certificate>
  </authority>

  <authority name="StartCom" url="http://www.startssl.com/" status="included">
    <summary>
     StartCom is a commercial corporation with customers worldwide, and is 
     the producer and vendor of the StartCom Linux operating systems, operates 
     the StartCom Certification Authority and MediaHost. 
     </summary>
     <audit type="WebTrust CA">
      <auditor url="http://www.ey.com/">Ernst and Young</auditor>
      <document url="https://www.startssl.com/ey-webtrust.pdf"> Audit Report and Management's Assertions</document>
    </audit>
    <audit type="WebTrust EV">
      <auditor url="http://www.ey.com/">Ernst and Young</auditor>
      <document url="https://www.startssl.com/ey-webtrust-ev.pdf"> Audit Report and Management's Assertions</document>
    </audit>
    
    <certificate name="StartCom Certification Authority" status="included">
      <summary></summary>
      <data url="https://www.startssl.com/certs/ca.crt"
            version="3" 
            sha1="3E:2B:F7:F2:03:1B:96:F3:8C:E6:C4:D8:A8:5D:3E:2D:58:47:6A:0F" 
            modulus="4096" 
            from="2006-09-17" 
            to="2036-09-17"/>
      <crl url="http://cert.startcom.org/sfsca-crl.crl">CRL</crl>
      <ocsp>http://ocsp.startcom.org/sub/class2/server/ca</ocsp>
      <type>DV, OV, EV (policy OID 1.3.6.1.4.1.23223.2)</type>
      <document url="https://www.startssl.com/policy.pdf ">StartCom Certification Authority Policy and Practice Statements</document>
      <document url="https://www.startssl.com/extended.pdf">StartCom Certification Authority Extended Validation Certificates Policy Appendix</document>
      <document url="https://www.startssl.com/certs/">Index of Certs</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>  
      <inclusion date="NSS 3.11.8, Firefox 2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=362304</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=383722</technical>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=490495</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=490492</ev>
      </inclusion>
    </certificate>
    
     <certificate name="StartCom Certification Authority" status="included">
      <summary>
      This is the SHA256 version of the root certificate that was approved for inclusion in bug #362304.
      StartCom operates intermediate CA certificates arranged in 4 different verification levels (classes) and 
      certificate types (server, client, code). Class 1 is used for server and email; 
      Class 2, Class 3, and Class 4 are used for server, email, and code signing.
      </summary>
      <data url="https://www.startssl.com/certs/ca-sha2.pem"
            version="3" 
            sha1="A3:F1:33:3F:E2:42:BF:CF:C5:D1:4E:8F:39:42:98:40:68:10:D1:A0" 
            modulus="4096" 
            from="2006-09-17" 
            to="2036-09-17"/>
      <crl url="http://cert.startcom.org/sfsca-crl.crl">CRL</crl>
      <ocsp>http://ocsp.startcom.org/sub/class2/server/ca</ocsp>
      <type>DV, OV, EV (policy OID 1.3.6.1.4.1.23223.1.1.1)</type>
      <document url="https://www.startssl.com/?app=26">Document Repository</document>
      <document url="https://www.startssl.com/policy.pdf">StartCom Certification Authority Policy and Practice Statements</document>
      <document url="https://www.startssl.com/policy-addendum-2010.pdf">Addendem to CP/CPS</document>
      <document url="https://www.startssl.com/extended.pdf">StartCom Certification Authority Extended Validation Certificates Policy Appendix</document>
      <document url="https://www.startssl.com/certs/">Certificate Repository</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>  
      <inclusion date="NSS 3.13.6, Firefox 16">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=602750</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=751954</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=751960</ev>
      </inclusion>
    </certificate>
    
    <certificate name="StartCom Certification Authority G2" status="included">
      <summary>
      This is a new root certificate, that is not related to the StartCom root that is currently
      included in NSS, as per bug #362304.
      StartCom operates intermediate CA certificates arranged in 4 different verification levels (classes) and 
      certificate types (server, client, code). Class 1 is used for server and email; 
      Class 2, Class 3, and Class 4 are used for server, email, and code signing.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=572356"
            version="3" 
            sha1="31:F1:FD:68:22:63:20:EE:C6:3B:3F:9D:EA:4A:3E:53:7C:7C:39:17" 
            modulus="4096" 
            from="2010-01-01" 
            to="2039-12-31"/>
      <crl url="http://crl.startssl.com/ca-g2.crl">CRL</crl>
      <ocsp>http://ocsp.startssl.com/ca-g2</ocsp>
      <type>DV, OV, EV (policy OID 1.3.6.1.4.1.23223.1.1.1)</type>
      <document url="https://www.startssl.com/?app=26">Document Repository</document>
      <document url="https://www.startssl.com/policy.pdf">StartCom Certification Authority Policy and Practice Statements</document>
      <document url="https://www.startssl.com/policy-addendum-2010.pdf">Addendem to CP/CPS</document>
      <document url="https://www.startssl.com/extended.pdf">StartCom Certification Authority Extended Validation Certificates Policy Appendix</document>
      <document url="https://www.startssl.com/certs/">Certificate Repository</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>  
      <inclusion date="NSS 3.13.6, Firefox 16">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=640368</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=751954</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=751960</ev>
      </inclusion>
    </certificate>
  </authority>

<authority name="TURKTRUST" url="http://www.turktrust.com.tr/" status="included">
    <summary>
    TURKTRUST Information Security Services Inc. is a public corporation and 
    is an IT company based in Turkey. 
    TURKTRUST is an authorized qualified electronic certificate service provider 
    according to the Turkish Electronic Signature Law. TURKTRUST issues qualified 
    certificates, time-stamping services, SSL certificates, and object signing certificates.
    </summary>
    <audit type="ETSI TS 101.456">
      <auditor url="http://www.btk.gov.tr/bilgi_teknolojileri/elektronik_imza/eshs.php">Turkish Information and Communication Technologies Authority (ICTA)</auditor>
      <document url="http://www.btk.gov.tr/bilgi_teknolojileri/elektronik_imza/TURKTRUST_LETTER_2011.pdf">Audit statement</document>
    </audit>
    <audit type="ETSI TS 102 042 - SSL NCP and EV-CP">
      <auditor url="http://www.bsigroup.com/en/Assessment-and-certification-services/Client-directory/CertificateClient-Directory-Search/">BSI Group The Netherlands B.V.</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=585759">ETSI Certificate</document>
    </audit>    
    <certificate name="TURKTRUST Certificate Services Provider Root 1" status="included">
      <summary>Root 1 is a "legacy" root included for compatibility
      with previously-issued certificates. The English version of the
      CPS applies to both roots.</summary>
      <data url="http://www.turktrust.com.tr/sertifikalar/TURKTRUST_Elektronik_Sertifika_Hizmet_Saglayicisi.crt"
            version="3"
            sha1="79:98:A3:08:E1:4D:65:85:E6:C2:1E:15:3A:71:9F:BA:5A:D3:4A:D9"
            modulus="2048"
            from="2005-05-13"
            to="2015-03-22"/>
      <crl url="http://www.turktrust.com.tr/sil/TURKTRUST_Kok_SIL.crl">CRL</crl>
      <crl url="http://www.turktrust.com.tr/sil/TURKTRUST_KOK1NES.crl">CRL</crl>
      <crl url="http://www.turktrust.com.tr/sil/TURKTRUST_SSL_SIL_s1.crl">CRL</crl>
      <ocsp>http://ocsp.turktrust.com.tr/</ocsp>
      <type>DV, IV</type>
	  <document url="http://www.turktrust.com.tr/en/bilgideposu.html">Document Repository</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.11.9, Firefox 2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=380635</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=410821</technical>
      </inclusion>
    </certificate>

    <certificate name="TURKTRUST Certificate Services Provider Root 2" status="included">
      <summary>Root 2 is the new root that replaced Root 1; Root 2 is
      used for certificates currently being issued. The English
      version of the CPS applies to both roots.</summary>
      <data url="http://www.turktrust.com.tr/sertifikalar/kok_s2.crt"
            version="3"
            sha1="B4:35:D4:E1:11:9D:1C:66:90:A7:49:EB:B3:94:BD:63:7B:A7:82:B7"
            modulus="2048"
            from="2005-07-11"
            to="2015-09-16"/>
      <crl url="http://www.turktrust.com.tr/sil/TURKTRUST_Kok_SIL_s2.crl">CRL</crl>
      <crl url="http://www.turktrust.com.tr/sil/TURKTRUST_Nitelikli_SIL_s2.crl">CRL</crl>
      <crl url="http://www.turktrust.com.tr/sil/TURKTRUST_SSL_SIL_s2.crl">CRL</crl>
      <ocsp>http://ocsp.turktrust.com.tr/</ocsp>
      <type>DV, IV</type>
      <document url="http://www.turktrust.com.tr/en/bilgideposu.html">Document Repository</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.11.9, Firefox 2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=380635</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=410821</technical>
      </inclusion>
    </certificate>
  </authority>

  <authority name="Comodo" url="http://www.comodo.com/" status="included">
    <summary>Comodo CA Ltd is a commercial CA based in the UK and
      serving customers worldwide. Comodo has a total of 12 root CA
      certs included in Mozilla, and altogether 124 subordinate CAs
      signed by those root CAs.  Some of them exist to differentiate
      between different Comodo brands or products and some are used to
      re-brand products for its partners. In each case Comodo retains
      the private key for the subordinate CA within its
      infrastructure.
    </summary>
    <audit type="WebTrust">
      <auditor url="http://www.kpmg.co.uk/">KPMG</auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=636&amp;file=pdf">Audit Report and Management's Assertions</document>
    </audit>
    <audit type="WebTrust EV">
      <auditor url="http://www.kpmg.co.uk/">KPMG</auditor>
      <document url="http://www.comodo.com/repository/ev_audit_report_and_management_assertions.pdf">Report in relation to the WebTrust for Certification Authorities Extended Validation Criteria</document>
    </audit>
    <certificate name="COMODO Certification Authority" status="included">
      <summary>Root CA certificate with subordinate CAs issuing SSL
        certificates, email certificates, and code signing
        certificates.</summary>
      <data url="http://crt.comodoca.com/COMODOCertificationAuthority.crt"
            version="3"
            sha1="66:31:BF:9E:F7:4F:9E:B6:C9:D5:A6:0C:BA:6A:BE:D1:F7:BD:EF:7B"
            modulus="2048"
            from="2006-12-01"
            to="2029-12-31"/>
      <crl url="http://crl.comodoca.com/COMODOCertificationAuthority.crl">CRL</crl>
      <ocsp>http://ocsp.comodoca.com/</ocsp>
      <type>DV, IV/OV, EV (policy OID 1.3.6.1.4.1.6449.1.2.1.5.1)</type>
      <document url="http://www.comodo.com/repository/09_22_2006_Certification_Practice_Statement_v.3.0.pdf">Comodo Certification Practice Statement, Version 3.0</document>
      <document url="http://www.comodo.com/repository/EV_CPS_4_JUN_07.pdf">Comodo Extended Validation (EV) Certification Practice Statement, Version 1.03</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.11.10, Firefox 3.0.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=401587</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=426568</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=426572</ev>
      </inclusion>
      <comments></comments>
    </certificate>
    <certificate name="COMODO ECC Certification Authority" status="included">
      <summary>Root ECC certificate with internal subordinate CA issuing EV SSL
        certificates, email certificates, and code signing certificates.</summary>
      <data url="http://crt.comodoca.com/COMODOECCCertificationAuthority.crt"
            version="3"
            sha1="9F:74:4E:9F:2B:4D:BA:EC:0F:31:2C:50:B6:56:3B:8E:2D:93:C3:11"
            modulus="SECG elliptic curve secp384r1 (aka NIST P-384)"
            from="2008-03-06"
            to="2038-01-18"/>
      <crl url="http://crl.comodoca.com/COMODOECCCertificationAuthority.crl">CRL</crl>
      <ocsp>http://ocsp.comodoca.com/</ocsp>
      <type>EV (policy OID 1.3.6.1.4.1.6449.1.2.1.5.1)</type>
      <document url="http://www.comodo.com/repository/09_22_2006_Certification_Practice_Statement_v.3.0.pdf">Comodo Certification Practice Statement</document>
      <document url="http://www.comodo.com/repository/EV_CPS_Amendment-ECC_Certificates.pdf">ECC Amendment to Comodo EV CPS</document>
      <document url="http://www.comodo.com/repository/EV_CPS_4_JUN_07.pdf">Comodo EV Certification Practice Statement</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.1, Firefox 3.0.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=421946</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=450427</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=450429</ev>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>

  <authority name="Symantec / VeriSign" url="http://www.verisign.com/" status="included">
    <summary>
     Symantec acquired the VeriSign Authentication Services and root certificates, 
    and is a major commercial CA with worldwide operations and customer base.
    </summary>
    <audit type="WebTrust CA and WebTrust EV">
      <auditor url="http://www.kpmg.com/">KPMG</auditor>
      <document
      url="https://cert.webtrust.org/SealFile?seal=304&amp;file=pdf">Audit
      Reports and Management's Assertions</document>
    </audit>
    <certificate name="VeriSign Universal Root Certification Authority" status="included">
      <summary>
        This CA will be used to sign certificates for SSL-enabled servers, 
        and may in the future be used to sign certificates for 
        digitally-signed executable code objects. VeriSign is not yet 
        actively issuing certificates from this root, so they have not 
        yet published a CRL.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=368998"
            version="3"
            sha1="36:79:CA:35:66:87:72:30:4D:30:A5:FB:87:3B:0F:A7:7B:B7:0D:54"
            modulus="2048"
            from="2008-04-01"
            to="2037-12-01"/>
      <crl url="http://crl.verisign.com/universal-root.crl">CRL</crl>
      <ocsp><!-- none --></ocsp>
      <type>OV</type>
      <document url="http://www.verisign.com/repository/CPS/">VeriSign Certification Practice Statement</document>
      <document url="http://www.verisign.com/repository/vtnCp.html">VeriSign Trust Network Certificate Policies</document>
      <document url="http://www.verisign.com/repository/hierarchy/hierarchy.pdf">CA Hierarchy Diagram</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="email" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.5, Firefox 3.6">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=484901</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=515470</technical>
      </inclusion>
      <comments></comments>
    </certificate>

    <certificate name="VeriSign Class 3 Public Primary Certificate Authority - G4" status="included">
      <summary>
        This CA will be used to sign certificates for SSL-enabled servers, 
        and may in the future be used to sign certificates for 
        digitally-signed executable code objects. VeriSign is not yet 
        actively issuing certificates from this root, so they have not 
        yet published a CRL. All subordinated CAs for this root will 
        be internally operated.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=335538"
            version="3"
            sha1="22:D5:D8:Df:8F:02:31:D1:8D:F7:9D:B7:CF:8A:2D:64:C9:3F:6C:3A"
            modulus="SECG elliptic curve secp384r1 (aka NIST P-384)"
            from="2007-4-11"
            to="2038-01-18"/>
      <crl url="">CRL</crl>
      <ocsp><!-- none --></ocsp>
      <type>OV</type>
      <document url="http://www.verisign.com/repository/CPS/">VeriSign Certification Practice Statement</document>
      <document url="http://www.verisign.com/repository/vtnCp.html">VeriSign Trust Network Certificate Policies</document>
      <document url="http://www.verisign.com/repository/hierarchy/hierarchy.pdf">CA Hierarchy Diagram</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="email" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.6, Firefox 3.6.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=409235</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=515472</technical>
      </inclusion>
      <comments></comments>
    </certificate>

    <certificate name="VeriSign Class 3 Public Primary Certification Authority - G5" status="included">
      <summary>This root has the following internally-operated sub-CAs: VeriSign Extended Validation SSL CA, 
      VeriSign Extended Validation SSL SGC CA, VeriSign Secure Server CA – G3,
      VeriSign Class 3 Code Signing 2010 CA, VeriSign Class 3 International Server CA – G3,
      Thawte SGC CA - G2.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=304810"
            version="3"
            sha1="4E:B6:D5:78:49:9B:1C:CF:5F:58:1E:AD:56:BE:3D:9B:67:44:A5:E5"
            modulus="2048"
            from="2006-11-07"
            to="2036-07-16"/>
      <crl url="http://evintl-crl.verisign.com/EVIntl2006.crl">CRL</crl>
      <ocsp>http://evintl-ocsp.verisign.com/</ocsp>
      <type>EV (policy OID 2.16.840.1.113733.1.7.23.6)</type>
      <document url="http://www.verisign.com/repository/CPS/">VeriSign Certification Practice Statement</document>
      <document url="http://www.verisign.com/repository/vtnCp.html">VeriSign Trust Network Certificate Policies</document>
      <document url="http://www.verisign.com/repository/hierarchy/hierarchy.pdf">CA Hierarchy Diagram</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="email" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.11.10, Firefox 3.0.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=402947</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=422918</technical>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=422921</technical>
      </inclusion>
      <comments> Email and code signing trust bits enabled in NSS 3.13.6, Firefox 16 as per bug #602107.
      Note that for compatibility reasons VeriSign has
        implemented a cross-signing scheme involving this CA.  In this
        scheme, if applications not supporting EV functionality (e.g.,
        Firefox 2 and earlier) encounter VeriSign EV certificates then
        they will end up treating this CA as a subordinate CA under
        the existing VeriSign Class 3 Public Primary CA
        root.</comments>
    </certificate>

<certificate name="VeriSign Class 1 Public Primary Certification Authority" status="included">
      <summary>
      This root CA (also known as PCA1-G1-SHA1) has Signature Algorithm SHA-1.
      This root will supersede the PCA1-G1 root that is already included 
      in NSS, which has Signature Algorithm MD2.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=375224"
            version="1"
            sha1="CE:6A:64:A3:09:E4:2F:BB:D9:85:1C:45:3E:64:09:EA:E8:7D:60:F1"
            modulus="1024"
            from="1996-01-28"
            to="2028-08-02"/>
      <crl url="http://crl.verisign.com/IndC1DigitalID.crl">CRL</crl>
      <ocsp><!-- none --></ocsp>
      <type>DV</type>
      <document url="http://www.verisign.com/repository/CPS/">VeriSign Certification Practice Statement</document>
      <document url="http://www.verisign.com/repository/vtnCp.html">VeriSign Trust Network Certificate Policies</document>
      <document url="http://www.verisign.com/repository/hierarchy/hierarchy.pdf">CA Hierarchy Diagram</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.8, Firefox 3.6.12">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=490895</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=515462</technical>
      </inclusion>
      <comments></comments>
    </certificate>

    <certificate name="VeriSign Class 3 Public Primary Certification Authority" status="included">
      <summary>
      This root CA (also known as PCA3-G1-SHA1) has Signature Algorithm SHA-1.
      This root will supersede the PCA3-G1 root that is already included in 
      NSS, which has Signature Algorithm MD2.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=375222"
            version="1"
            sha1="A1:DB:63:93:91:6F:17:E4:18:55:09:40:04:15:C7:02:40:B0:AE:6B"
            modulus="1024"
            from="1996-01-28"
            to="2028-08-02"/>
      <crl url="http://crl.verisign.com/SVRSecure2005.crl">CRL</crl>
      <ocsp>http://ocsp.verisign.com</ocsp>
      <type>OV</type>
      <document url="http://www.verisign.com/repository/CPS/">VeriSign Certification Practice Statement</document>
      <document url="http://www.verisign.com/repository/vtnCp.html">VeriSign Trust Network Certificate Policies</document>
      <document url="http://www.verisign.com/repository/hierarchy/hierarchy.pdf">CA Hierarchy Diagram</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.8, Firefox 3.6.12">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=490895</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=515462</technical>
      </inclusion>
      <comments>The initial request was also to EV-enable this root. However, it was deteremined that EV-enablement was not necessary.</comments>
    </certificate>

  </authority>

  <authority name="Trustwave" url="http://www.trustwave.com/" status="included">
    <summary>Trustwave is a commercial CA serving customers worldwide;
      it includes the former SecureTrust and XRamp CAs. At this time
      there are no subordinate CAs for any of these roots; instead end
      entity certificates are issued directly from the roots as noted
      below, with different classes of certificates under different
      certificate policies.  Note that each root CA is not associated
      with a single CPS, rather end entity certs are associated with
      policies that link to the CPS that the certificate was issued
      under: an EV CPS, an OV CPS, etc.
    </summary>
    <audit type="WebTrust and WebTrust EV">
      <auditor url="">Boysen &amp; Miller PLLC</auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=359&amp;file=pdf">Audit Report
      and Management's Assertions</document>
    </audit>

    <certificate name="SecureTrust CA" status="included">
      <summary>Root CA certificate utilized for issuing SSL
        certificates (OV and EV) and code signing certificates.
      </summary>
      <data url="https://www.securetrust.com/legal/STCA.txt"
            version="3"
            sha1="87:82:C6:C3:04:35:3B:CF:D2:96:92:D2:59:3E:7D:44:D9:34:FF:11"
            modulus="2048"
            from="2006-11-07"
            to="2029-12-31"/>
      <crl url="http://crl.securetrust.com/STCA.crl">CRL</crl>
      <ocsp><!-- none --></ocsp>
      <type>IV/OV, EV (policy OID 2.16.840.1.114404.1.1.2.4.1)</type>
      <document url="https://www.securetrust.com/legal/evCPS.pdf">SecureTrust Corporation Certificate Practice Statement for Extended Validation Certificates, Version 1.0.1</document>
      <document url="https://www.securetrust.com/legal/securetrust%20cps%20for%20ov.pdf">SecureTrust Corporation Certificate Practice Statement for Organizationally Validated Standard Assurance Certificates, Version 1.5.1</document>
      <document url="https://www.securetrust.com/legal/SecureTrust_Code_Signing_CPS.pdf">SecureTrust Certification Practice Statement for Code Signing Certificates, Version 1.6.0</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.11.10, Firefox 3.0.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=409837</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=418907</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=418910</ev>
      </inclusion>
    </certificate>
    <certificate name="Secure Global CA" status="included">
      <summary>Root CA certificate utilized for issuing SSL
        certificates (OV and EV), S/MIME certificates, and (in future)
        code signing certificates.
      </summary>
      <data url="https://www.securetrust.com/legal/SGCA.txt"
            version="3"
            sha1="3A:44:73:5A:E5:81:90:1F:24:86:61:46:1E:3B:9C:C4:5F:F5:3A:1B"
            modulus="2048"
            from="2006-11-07"
            to="2029-12-31"/>
      <crl url="http://crl.securetrust.com/SGCA.crl">CRL</crl>
      <ocsp><!-- none --></ocsp>
      <type>IV/OV, EV (policy OID 2.16.840.1.114404.1.1.2.4.1)</type>
      <document url="https://www.securetrust.com/legal/evCPS.pdf">SecureTrust Corporation Certificate Practice Statement for Extended Validation Certificates, Version 1.0.1</document>
      <document url="https://www.securetrust.com/legal/securetrust%20cps%20for%20ov.pdf">SecureTrust Corporation Certificate Practice Statement for Organizationally Validated Standard Assurance Certificates, Version 1.5.1</document>
      <document url="https://www.securetrust.com/legal/SecureTrust_SMIME_CPS_1_6_0.pdf">SecureTrust Certification Practice Statement for S/MIME Certificates, Version 1.6.0</document>
      <document url="https://www.securetrust.com/legal/SecureTrust_Code_Signing_CPS.pdf">SecureTrust Certification Practice Statement for Code Signing Certificates, Version 1.6.0</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.11.10, Firefox 3.0.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=409838</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=418907</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=418910</ev>
      </inclusion>
    </certificate>
    <certificate name="XRamp Global CA" status="included">
      <summary>Root CA certificate utilized for issuing SSL
        certificates (OV and EV), S/MIME certificates, and code
        signing certificates.
      </summary>
      <data url="http://www.securetrust.com/legal/XGCA.txt"
            version="3"
            sha1="B8:01:86:D1:EB:9C:86:A5:41:04:CF:30:54:F3:4C:52:B7:E5:58:C6"
            modulus="2048"
            from="2004-11-01"
            to="2035-01-01"/>
      <crl url="http://crl.xrampsecurity.com/XGCA.crl">CRL</crl>
      <ocsp><!-- none --></ocsp>
      <type>IV/OV, EV (policy OID 2.16.840.1.114404.1.1.2.4.1)</type>
      <document url="https://www.securetrust.com/legal/evCPS.pdf">SecureTrust Corporation Certificate Practice Statement for Extended Validation Certificates, Version 1.0.1</document>
      <document url="https://www.securetrust.com/legal/securetrust%20cps%20for%20ov.pdf">SecureTrust Corporation Certificate Practice Statement for Organizationally Validated Standard Assurance Certificates, Version 1.5.1</document>
      <document url="https://www.securetrust.com/legal/SecureTrust_SMIME_CPS_1_6_0.pdf">SecureTrust Certification Practice Statement for S/MIME Certificates, Version 1.6.0</document>
      <document url="https://www.securetrust.com/legal/SecureTrust_Code_Signing_CPS.pdf">SecureTrust Certification Practice Statement for Code Signing Certificates, Version 1.6.0</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.10, Firefox 1">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=273189</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=274723</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=418902</ev>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>

<!--
  <authority name="DigiNotar" url="http://www.diginotar.nl/" status="included">
    <summary>DigiNotar is a Dutch trusted third party, mainly
      operating in the Netherlands.  They issue certificates based on
      notary verification of applicants. They service the business,
      government and consumer markets.</summary>
    <audit type="ETSI 101.456">
      <auditor url="http://www.pwc.nl/">Price Waterhouse Coopers</auditor>
      <document url="http://www.diginotar.nl/Portals/7/ETSI/Certificate.pdf">ETSI Certificate</document>
      <document url="http://www.ecp.nl/download/Reg._Cert._op_basis_van_TTP.NL,_3dec08.pdf?PHPSESSID=f23ec42c909cc2bf1107372430d46d08">Statement of ETSI Compliance</document>
    </audit>
    <audit type="WebTrust EV">
      <auditor url="http://www.pwc.nl/">Price Waterhouse Coopers</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=357961">Assertion of Management and Audit Report</document>
    </audit>
    <certificate name="DigiNotar Root CA" status="included">
      <summary>This is the top root, used only to issue CA
        certificates for five application-specific subordinate CAs:
        DigiNotar Public CA 2025 (non-qualified personal
        certificates), DigiNotar Qualified CA (qualified personal
        certificates), DigiNotar Services CA (SSL and object signing
        certificates), DigiNotar Extended Validation CA (EV
        certificates), and DigiNotar Private CA (CA certificates for
        organizational CAs).</summary>
        <data url="http://www.diginotar.nl/files/Rootcertificaten/DigiNotar%20root%20CA2007.crt"
        version="3"
        sha1="C0:60:ED:44:CB:D8:81:BD:0E:F8:6C:0B:A2:87:DD:CF:81:67:47:8C"
        modulus="4096" from="2007-05-16" to="2025-03-31"/>
      <crl url="http://service.diginotar.nl/crl/root/latestCRL.crl">CRL</crl>
      <ocsp>http://validation.diginotar.nl</ocsp>
      <type>OV, EV (policy OID 2.16.528.1.1001.1.1.1.12.6.1.1.1)</type>
      <document url="http://www.diginotar.com/Portals/0/General%20terms/DigiNotar_CPS_3.5_-_EN.pdf">CPS DigiNotar 30 October 2007, Version 3.5</document>
      <document url="https://www.diginotar.nl/Klantenservice/Rootcertificaten/tabid/308/Default.aspx">Overview of DigiNotar Root Certificates</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.11.10, Firefox 3.0.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=369357</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=431621</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=493265</ev>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  -->
<authority name="DigiNotar (DISABLED)" url="http://www.diginotar.nl/" status="removed">
    <summary>DISABLED: The trust bits have been turned off for the DigiNotar root certificate in
    versions of Firefox for desktop (3.6.21, 6.0.1, 7, 8, and 9) 
    and mobile (6.0.1, 7, 8, and 9), 
    Thunderbird (3.1.13, and 6.0.1) and SeaMonkey (2.3.2).
    </summary>
    <certificate name="DigiNotar Root CA" status="removed">
      <summary>DISABLED: The trust bits have been turned off for the DigiNotar root certificate in 
    versions of Firefox for desktop (3.6.21, 6.0.1, 7, 8, and 9) 
    and mobile (6.0.1, 7, 8, and 9), 
    Thunderbird (3.1.13, and 6.0.1) and SeaMonkey (2.3.2).</summary>
        <data url="http://www.diginotar.nl/files/Rootcertificaten/DigiNotar%20root%20CA2007.crt"
        version="3"
        sha1="C0:60:ED:44:CB:D8:81:BD:0E:F8:6C:0B:A2:87:DD:CF:81:67:47:8C"
        modulus="4096" from="2007-05-16" to="2025-03-31"/>
      <crl url="http://service.diginotar.nl/crl/root/latestCRL.crl">CRL</crl>
      <ocsp>http://validation.diginotar.nl</ocsp>
      <type>OV, EV (policy OID 2.16.528.1.1001.1.1.1.12.6.1.1.1)</type>
      <document url="http://blog.mozilla.com/security/2011/08/29/fraudulent-google-com-certificate/">
      Mozilla Security Blog regarding DigiNotar</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.11.10, Firefox 3.0.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=369357</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=431621</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=493265</ev>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="Symantec / GeoTrust" url="http://www.geotrust.com/" status="included">
    <summary>GeoTrust is a subsidiary of Symantec. Symantec acquired the VeriSign Authentication Services 
    and root certificates, and is a major commercial CA with worldwide operations and customer base.
    </summary>
    <audit type="WebTrust CA and WebTrust EV">
      <auditor url="http://www.kpmg.com/">KPMG</auditor>
      <document
      url="https://cert.webtrust.org/SealFile?seal=650&amp;file=pdf">Audit
      Report and Management's Assertions</document>
    </audit>
    <certificate name="GeoTrust Primary Certificate Authority - G2" status="included">
      <summary>
        This CA will be used to sign certificates for SSL-enabled servers, 
        and may in the future be used to sign certificates for 
        digitally-signed executable code objects. GeoTrust is not yet 
        actively issuing certificates from this root, so they have not 
        yet published a CRL. All subordinated CAs for this root will 
        be internally operated.
        </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=294057"
            version="3"
            sha1="8D:17:84:D5:37:F3:03:7D:EC:70:FE:57:8B:51:9A:99:E6:10:D7:B0"
            modulus="SECG elliptic curve secp384r1 (aka NIST P-384)"
            from="2007-11-04"
            to="2038-01-18"/>
      <crl url="">CRL</crl>
      <ocsp><!-- None --></ocsp>
      <type>DV, OV</type>
      <document url="http://www.geotrust.com/resources/cps/pdfs/GeoTrustCPS-Version1.1.1.pdf">GeoTrust Certification Practice Statement, Version 1.1.1</document>
      <document url="http://www.geotrust.com/resources/repository/legal.asp">Other documents</document>
      <document url="http://www.geotrust.com/resources/cps/pdfs/gt_ssl_SA_v.2.0.pdf">GeoTrust Subscriber Agreement</document>
      <document url="http://www.geotrust.com/resources/cps/pdfs/gt_ssl_rpa_v.1.0.pdf">GeoTrust Relying Party Agreement</document>
      <document url="http://www.geotrust.com/resources/cps/pdfs/reseller_agreement_5.0.pdf">GeoTrust Reseller Agreement</document>
      <document url="http://www.geotrust.com/resources/cps/pdfs/enterprisessl_agreement.pdf">GeoTrust EnterpriseSSL Agreement</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.6, Firefox 3.6.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=409236</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=517242</technical>
      </inclusion>
      <comments></comments>
    </certificate>

    <certificate name="GeoTrust Primary Certification Authority - G3" status="included">
      <summary>
        This CA will be used to sign certificates for SSL-enabled servers, 
        and may in the future be used to sign certificates for 
        digitally-signed executable code objects. 
        </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=368997"
            version="3"
            sha1="03:9E:ED:B8:0B:E7:A0:3C:69:53:89:3B:20:D2:D9:32:3A:4C:2A:FD"
            modulus="2048"
            from="2008-04-01"
            to="2037-12-01"/>
      <crl url="http://crl.verisign.com/GeoTrustPCA-G3.crl">CRL</crl>
      <ocsp><!-- None --></ocsp>
      <type>DV, OV</type>
      <document url="http://www.geotrust.com/resources/cps/pdfs/GeoTrustCPS-Version1.1.2.pdf">GeoTrust Certification Practice Statement, Version 1.1.2</document>
      <document url="http://www.geotrust.com/resources/repository/legal.asp">Other documents</document>
      <document url="http://www.geotrust.com/resources/cps/pdfs/gt_ssl_SA_v.2.0.pdf">GeoTrust Subscriber Agreement</document>
      <document url="http://www.geotrust.com/resources/cps/pdfs/gt_ssl_rpa_v.1.0.pdf">GeoTrust Relying Party Agreement</document>
      <document url="http://www.geotrust.com/resources/cps/pdfs/reseller_agreement_5.0.pdf">GeoTrust Reseller Agreement</document>
      <document url="http://www.geotrust.com/resources/cps/pdfs/enterprisessl_agreement.pdf">GeoTrust EnterpriseSSL Agreement</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.5, Firefox 3.6">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=484899</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=517234</technical>
      </inclusion>
      <comments></comments>
    </certificate>
    <certificate name="GeoTrust Primary Certification Authority" status="included">
      <summary>This CA issues a CA certificate to the subordinate CA
        GeoTrust Extended Validation SSL CA, which in turn issues
        Extended Validation certificates for SSL-enabled
        servers.</summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=306731"
            version="3"
            sha1="32:3C:11:8E:1B:F7:B8:B6:52:54:E2:E2:10:0D:D6:02:90:37:F0:96"
            modulus="2048"
            from="2006-11-26"
            to="2036-07-16"/>
      <crl url="http://EVSSL-crl.geotrust.com/crls/gtextvalca.crl">CRL</crl>
      <ocsp>http://EVSSL-ocsp.geotrust.com/</ocsp>
      <type>EV (policy OID 1.3.6.1.4.1.14370.1.6)</type>
      <document url="http://www.geotrust.com/resources/cps/pdfs/GeoTrustCPS-Version1.pdf">GeoTrust Certification Practice Statement, Version 1.0 (January 31, 2008)</document>
      <document url="http://www.geotrust.com/resources/repository/legal.asp">Other documents</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.11.10, Firefox 3.0.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=407168</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=424169</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=424171</ev>
      </inclusion>
      <comments>Note that for compatibility reasons GeoTrust has
        implemented a cross-signing scheme involving this CA.  In this
        scheme, if applications not supporting EV functionality (e.g.,
        Firefox 2 and earlier) encounter GeoTrust EV certificates then
        they will end up treating this CA as a subordinate CA under
        the existing Equifax Secure CA root.</comments>
    </certificate>
  </authority>

  <authority name="Go Daddy" url="http://www.godaddy.com/" status="included">
    <summary>Go Daddy operates a commercial CA based in the US and
      serving customers worldwide.
    </summary>
    <audit type="WebTrust and WebTrust EV">
      <auditor url="http://www.kpmg.com/">KPMG</auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=355&amp;file=pdf">Independent Accountants' Report</document>
    </audit>
    <certificate name="Go Daddy Root Certificate Authority - G2" status="incuded">
      <summary>
      This new root will eventually replace the “Go Daddy Class 2 CA” root cert that is 
      currently included in NSS. The “Go Daddy Class 2 CA” root has a single internally-operated 
      subordinate CA issuing SSL certificates (DV, OV and EV), email certificates, and code signing certificates.
      </summary>
      <data url="https://certificates.godaddy.com/repository/gdroot-g2.crt"
            version="3"
            sha1="47:BE:AB:C9:22:EA:E8:0E:78:78:34:62:A7:9F:45:C2:54:FD:E6:8B"
            modulus="2048"
            from="2009-08-31"
            to="2037-12-31"/>
      <crl url="http://crl.godaddy.com/gdroot-g2.crl">CRL</crl>
      <ocsp>http://ocsp.godaddy.com/</ocsp>
      <type>DV, OV, EV (policy OID 2.16.840.1.114413.1.7.23.3)</type>
      <document url="https://certificates.godaddy.com/repository">Repository of certs and policies</document>
      <document url="https://certs.starfieldtech.com/repository/StarfieldCP-CPS.pdf">CP and CPS</document>
      <document url="https://certs.starfieldtech.com/repository/StarfieldRelyingPartyAgreement.pdf">Relying Party Agreement</document>
      <document url="https://certs.starfieldtech.com/repository/StarfieldSubscriberAgreement.pdf">Subscriber Agreement</document>
      <document url="https://certs.starfieldtech.com/repository/StarfieldEVSubscriberAgreement.pdf">Premium EV Subscriber Agreement</document>
      <document url="https://certs.starfieldtech.com/repository/StarfieldCodeSigningCertificateSubscriberAgreement_1.0.pdf">Code Signing Subscriber Agreement</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.10, Firefox 6.0">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=527056</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=632461</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=632475</ev>
      </inclusion>
      <comments>Not currently requesting email trust bit because current documentation does not include requirements to verify email address ownership/control.</comments>
    </certificate>
    <certificate name="Starfield Root Certificate Authority - G2" status="included">
      <summary>
       This new root will eventually replace the “Starfield Class 2 CA” root cert that 
       is currently included in NSS. The “Starfield Class 2 CA” root has a single subordinate 
       CA issuing SSL certificates (DV, OV and EV), email certificates, and code signing certificates.
      </summary>
      <data url="https://certificates.starfieldtech.com/repository/sfroot-g2.crt"
            version="3"
            sha1="B5:1C:06:7C:EE:2B:0C:3D:F8:55:AB:2D:92:F4:FE:39:D4:E7:0F:0E"
            modulus="2048"
            from="2009-08-31"
            to="2037-12-31"/>
      <crl url="http://crl.starfieldtech.com/sfroot-g2.crl">CRL</crl>
      <ocsp>http://ocsp.starfieldtech.com</ocsp>
      <type>DV, OV, EV (policy OID 2.16.840.1.114414.1.7.23.3)</type>
      <document url="https://certificates.godaddy.com/repository">Repository of certs and policies</document>
      <document url="https://certs.starfieldtech.com/repository/StarfieldCP-CPS.pdf">CP and CPS</document>
      <document url="https://certs.starfieldtech.com/repository/StarfieldRelyingPartyAgreement.pdf">Relying Party Agreement</document>
      <document url="https://certs.starfieldtech.com/repository/StarfieldSubscriberAgreement.pdf">Subscriber Agreement</document>
      <document url="https://certs.starfieldtech.com/repository/StarfieldEVSubscriberAgreement.pdf">Premium EV Subscriber Agreement</document>
      <document url="https://certs.starfieldtech.com/repository/StarfieldCodeSigningCertificateSubscriberAgreement_1.0.pdf">Code Signing Subscriber Agreement</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.10, Firefox 6.0">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=527056</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=632461</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=632475</ev>
      </inclusion>
      <comments>Not currently requesting email trust bit because current documentation does not include requirements to verify email address ownership/control.</comments>
    </certificate>
    <certificate name="Starfield Services Root Certificate Authority - G2" status="included">
      <summary>
       This new self-signed root CA does not yet have subordinate CAs. Before issuing from this root, 
       at least one appropriate, internally-operated subordinate issuing CA will be created.
      </summary>
      <data url="https://certificates.starfieldtech.com/repository/sfsroot-g2.crt"
            version="3"
            sha1="92:5A:8F:8D:2C:6D:04:E0:66:5F:59:6A:FF:22:D8:63:E8:25:6F:3F"
            modulus="2048"
            from="2009-08-31"
            to="2037-12-31"/>
      <crl url="http://crl.starfieldtech.com/sfsroot-g2.crl">CRL</crl>
      <ocsp>http://ocsp.starfieldtech.com</ocsp>
      <type>DV, OV</type>
      <document url="https://certificates.godaddy.com/repository">Repository of certs and policies</document>
      <document url="https://certs.starfieldtech.com/repository/StarfieldCP-CPS.pdf">CP and CPS</document>
      <document url="https://certs.starfieldtech.com/repository/StarfieldRelyingPartyAgreement.pdf">Relying Party Agreement</document>
      <document url="https://certs.starfieldtech.com/repository/StarfieldSubscriberAgreement.pdf">Subscriber Agreement</document>
      <document url="https://certs.starfieldtech.com/repository/StarfieldEVSubscriberAgreement.pdf">Premium EV Subscriber Agreement</document>
      <document url="https://certs.starfieldtech.com/repository/StarfieldCodeSigningCertificateSubscriberAgreement_1.0.pdf">Code Signing Subscriber Agreement</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.10, Firefox 6.0">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=527056</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=632461</technical>
      </inclusion>
      <comments>Not currently requesting email trust bit because current documentation does not include requirements to verify email address ownership/control.</comments>
    </certificate>

    <certificate name="Valicert Class 2 Policy Validation Authority" status="included">
      <summary>Root  CA  certificate  with  a  single  subordinate  CA
        issuing SSL certificates (DV, OV and EV), email certificates,
        and code signing certificates.</summary>
      <data url="https://certs.starfieldtech.com/repository/valicert_class2_root.crt"
            version="1"
            sha1="31:7A:2A:D0:7F:2B:33:5E:F5:A1:C3:4E:4B:57:E8:B7:D8:F1:FC:A6"
            modulus="1024"
            from="1999-06-25"
            to="2019-06-25"/>
      <crl url="https://certificates.starfieldtech.com/repository/root.crl">CRL</crl>
      <ocsp>http://ocsp.startfieldtech.com/</ocsp>
      <type>DV, IV/OV, EV (policy OIDs 2.16.840.1.114413.1.7.23.3 and 2.16.840.1.114414.1.7.23.3)</type>
      <document url="https://certs.starfieldtech.com/repository/StarfieldCP-CPS.pdf">Starfield Technologies, Inc. Certificate Policy and Certification Practice Statement (CP/CPS)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="Firefox 1">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=403437</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=418958</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=403437</ev>
      </inclusion>
      <comments>Both of the CA certificates below are cross-signed to
        the Valicert Class 2 Policy Validation Authority root for
        legacy support, so this root is configured to enable EV with
        both of the EV OIDs associated with the other certificates.
      </comments>
    </certificate>

    <certificate name="Go Daddy Class 2 CA" status="included">
      <summary>Root CA certificate  with  a  single  subordinate  CA
        issuing SSL certificates (DV, OV and EV), email certificates,
        and code signing certificates.</summary>
      <data url="https://certs.godaddy.com/repository/gd-class2-root.crt"
            version="3"
            sha1="27:96:BA:E6:3F:18:01:E2:77:26:1B:A0:D7:77:70:02:8F:20:EE:E4"
            modulus="2048"
            from="2004-06-29"
            to="2034-06-29"/>
      <crl url="https://certificates.godaddy.com/repository/gdroot.crl">CRL</crl>
      <ocsp>http://ocsp.godaddy.com/</ocsp>
      <type>DV, IV/OV, EV (policy OID 2.16.840.1.114413.1.7.23.3)</type>
      <document url="https://certs.godaddy.com/repository/StarfieldCP-CPS.pdf">Starfield Technologies, Inc. Certificate Policy and Certification Practice Statement (CP/CPS)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.10, Firefox 1">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=284677</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=287495</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=418958</ev>
      </inclusion>
      <comments></comments>
    </certificate>
    <certificate name="Starfield Class 2 CA" status="included">
      <summary>Root CA certificate with a single subordinate CA
        issuing SSL certificates (DV, OV and EV), email certificates,
        and code signing certificates.</summary>
      <data url="https://certs.starfieldtech.com/repository/sf-class2-root.crt"
            version="3"
            sha1="AD:7E:1C:28:B0:64:EF:8F:60:03:40:20:14:C3:D0:E3:37:0E:B5:8A"
            modulus="2048"
            from="2004-06-29"
            to="2034-06-29"/>
      <crl url="https://certificates.starfieldtech.com/repository/sfroot.crl">CRL</crl>
      <ocsp>http://ocsp.starfieldtech.com/</ocsp>
      <type>DV, IV/OV, EV (policy OID 2.16.840.1.114414.1.7.23.3)</type>
      <document url="https://certs.starfieldtech.com/repository/StarfieldCP-CPS.pdf">Starfield Technologies, Inc. Certificate Policy and Certification Practice Statement (CP/CPS)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.10, Firefox 1">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=284677</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=287495</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=418958</ev>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>

  <authority name="Network Solutions" url="http://www.networksolutions.com/" status="included">
    <summary>Network Solutions is a US-based commercial CA with
      worldwide customer base.</summary>
    <audit type="WebTrust for CAs">
      <auditor url="http://www.kpmg.com/">KPMG</auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=705&amp;file=pdf">Audit
      Report and Management's Assertions</document>
    </audit>
    <audit type="WebTrust EV">
      <auditor url="http://www.kpmg.com/">KPMG</auditor>
      <document url="http://www.networksolutions.com/SSL-certificates/kpmg-ev.pdf">Report in relation to the WebTrust for Certification Authorities Extended Validation 
Criteria</document>
    </audit>
    <certificate name="Network Solutions Certificate Authority" status="included">
      <summary>This CA has a subordinate CA, Network Solutions EV SSL
        CA, which issues Extended Validation certificates for
        SSL-enabled servers. At present there are no other subordinate
        CAs under this root; however in the future Network Solutions
        may establish additional subordinate CAs to issue non-EV
        certificates..</summary>
      <data url="ftp://ftp.networksolutions.com/certs/netsolevroot.crt"
            version="3"
            sha1="74:F8:A3:C3:EF:E7:B3:90:06:4B:83:90:3C:21:64:60:20:E5:DF:CE"
            modulus="2048"
            from="2006-12-01"
            to="2029-12-31"/>
      <crl url="http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl">CRL</crl>
      <ocsp></ocsp>
      <type>IV/OV, EV (policy OID 1.3.6.1.4.1.782.1.2.1.8.1)</type>
      <document url="http://www.networksolutions.com/legal/SSL-legal-repository-cps.jsp">Network Solutions Certification Practice Statement, Version 1.4.1</document>
      <document url="https://www.networksolutions.com/legal/SSL-legal-repository-ev-cps.jsp">Certification Practice Statement (CPS) for Extended Validation (EV) Certification, Version 1.1</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.11.10, Firefox 3.0.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=403915</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=431381</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=431384</ev>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>

  <authority name="Symantec / thawte" url="http://www.thawte.com/" status="included">
    <summary>Thawte is a subsidiary of Symantec. Symantec acquired the VeriSign Authentication 
    Services and root certificates, and is a major commercial CA with worldwide operations and customer base.
      </summary>
    <audit type="WebTrust/WebTrust EV">
      <auditor url="http://www.kpmg.com/">KPMG</auditor>
      <document
      url="https://cert.webtrust.org/SealFile?seal=527&amp;file=pdf">Audit
      Report and Management's Assertions</document>
    </audit>
    <certificate name="thawte Primary Root CA - G2" status="included">
      <summary>
        This CA will be used to sign certificates for SSL-enabled servers, 
        and may in the future be used to sign certificates for 
        digitally-signed executable code objects. thawte is not yet 
        actively issuing certificates from this root, so they have not 
        yet published a CRL. All subordinated CAs for this root will 
        be internally operated.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=335551"
            version="3"
            sha1="AA:DB:BC:22:23:8F:C4:01:A1:27:BB:38:DD:F4:1D:DB:08:9E:F0:12"
            modulus="SECG elliptic curve secp384r1 (aka NIST P-384)"
            from="2007-11-04"
            to="2038-01-18"/>
      <crl url="">CRL</crl>
      <ocsp><!-- None --></ocsp>
      <type>DV, OV</type>
      <document url="http://www.thawte.com/repository">Thawte Document Repository (English)</document>
      <document url="http://www.thawte.com/cps/index.html">Thawte CPS (English)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.6, Firefox 3.6.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=409237</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=521869</technical>
      </inclusion>
      <comments></comments>
    </certificate>

    <certificate name="thawte Primary Root CA - G3" status="included">
      <summary>
        This CA will be used to sign certificates for SSL-enabled servers, 
        and may in the future be used to sign certificates for 
        digitally-signed executable code objects. thawte is not yet 
        actively issuing certificates from this root, so they have not 
        yet published a CRL. All subordinated CAs for this root will 
        be internally operated.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=369000"
            version="3"
            sha1="F1:8B:53:8D:1B:E9:03:B6:A6:F0:56:43:5B:17:15:89:CA:F3:6B:F2"
            modulus="2048"
            from="2008-04-01"
            to="2037-12-01"/>
      <crl url="http://crl.verisign.com/ThawtePCA-G3.crl">CRL</crl>
      <ocsp><!-- None --></ocsp>
      <type>DV,OV</type>
      <document url="http://www.thawte.com/repository">Thawte Document Repository (English)</document>
      <document url="http://www.thawte.com/cps/index.html">Thawte CPS (English)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.5, Firefox 3.6">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=484903</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=521869</technical>
      </inclusion>
      <comments></comments>
    </certificate>
    <certificate name="thawte Primary Root CA" status="included">
      <summary>This CA issues a CA certificate to the subordinate CAs
        thawte Extended Validation SSL CA and thawte Extended
        Validation SSL SGC CA, which in turn issue Extended Validation
        certificates for SSL-enabled servers.</summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=306736"
            version="3"
            sha1="91:C6:D6:EE:3E:8A:C8:63:84:E5:48:C2:99:29:5C:75:6C:81:7B:81"
            modulus="2048"
            from="2006-11-17"
            to="2036-07-16"/>
      <crl url="http://crl.thawte.com/ThawteEVCA2006.crl">CRL</crl>
      <ocsp>http://ocsp.thawte.com/</ocsp>
      <type>EV (policy OID 2.16.840.1.113733.1.7.48.1)</type>
      <document url="http://www.thawte.com/guides/pdf/Thawte_CPS_3_5.pdf">thawte Certification Practice Statement, Version 3.5 (January 2008)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.11.10, Firefox 3.0.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=407163</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=424152</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=424154</ev>
      </inclusion>
      <comments> Code Signing trust bit enabled in NSS 3.13.6, Firefox 16 as per bug #601950.
      Note that for compatibility reasons thawte has
        implemented a cross-signing scheme involving this CA.  In this
        scheme, if applications not supporting EV functionality (e.g.,
        Firefox 2 and earlier) encounter thawte EV certificates then
        they will end up treating this CA as a subordinate CA under
        the existing Thawte Premium Server CA root.</comments>
    </certificate>
  </authority>

  <authority name="Entrust" url="http://www.entrust.net/" status="included">
    <summary>Entrust is a commercial CA serving the global market for
      SSL web certificates. Entrust also issues certificates to
      subordinate CAs for enterprise and commercial use.</summary>
    <audit type="WebTrust">
      <auditor url="http://www.deloitte.ca/">Deloitte and Touche LLP</auditor>
      <document url="https://entrust.webtrust.org/SealFile?seal=328&amp;file=pdf">Audit Report and Management's Assertions</document>
    </audit>
    <audit type="WebTrust EV">
      <auditor url="http://www.deloitte.ca/">Deloitte and Touche LLP</auditor>
      <document url="http://www.entrust.net/ssl-resources/pdf/webtrust-ev.pdf">
Audit Report and Management's Assertions</document>
    </audit>

    <certificate name="Entrust Root Certification Authority" status="included">
      <summary>This root was primarily created as the trust root for Entrust EV SSL
        certificates. EV certificates are issued using the
        Entrust Certification Authority - L1A subordinate CA.</summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=267983"
            version="3"
            sha1="B3:1E:B1:B7:40:E3:6C:84:02:DA:DC:37:D4:4D:F5:D4:67:49:52:F9"
            modulus="2048"
            from="2006-11-27"
            to="2026-11-27"/>
      <crl url="http://crl.entrust.net/rootca1.crl">CRL</crl>
      <ocsp>http://ocsp.entrust.net</ocsp>
      <type>OV, EV (policy OID 2.16.840.1.114028.10.1.2)</type>
      <document url="http://www.entrust.net/CPS/pdf/webcps051404.pdf">Entrust SSL Web Server Certification Practice Statement, Version 2.06</document>
      <document url="http://www.entrust.net/CPS/pdf/evssl_cps_english080107.pdf">Entrust Certificate Services Certification Practice Statement for Extended Validation (EV) SSL Certificates, Version 1.01</document>
      <document url="http://www.entrust.net/ev/business_practice.htm">Entrust Extended Validation Business Practices</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.11.10, Firefox 3.0.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=382352</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=387892</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=416544</ev>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>

  <authority name="SwissSign" url="http://www.swisssign.com/" status="included">
    <summary>SwissSign AG is a commercial CSP that provides certification services for
    individual and corporate customers. SwissSign operates the certificate authority
    for the Swiss Post and is mostly focused on Switzerland but Registration Services
    may be used internationally.
    The "Platinum G2" Root CA currently has 3 subordinate CAs,
    the "Gold G2" Root CA has 2 and the "Silver G2" Root CA has 3.
</summary>
    <audit type="ETSI TS 101.456">
      <auditor url="http://www.kpmg.ch/">KPMG</auditor>
      <document url="http://www.seco.admin.ch/sas/00229/00251/index.html?lang=en">Swiss Accreditation Service Certified Bodies List</document>
      <document url="http://www.seco.admin.ch/sas/00229/00251/00281/index.html?lang=en">SAS details for SwissSign</document>
    </audit>
    <audit type="WebTrust EV">
      <auditor url="http://www.kpmg.ch/">KPMG</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=346440">Confirmation Notice of WebTrust EV Audit</document>
    </audit>
    <certificate name="SwissSign Platinum CA - G2" status="included">
      <summary>The SwissSign Platinum CA - G2 root has three
subordinate CAs. The SwissSign Qualified Platinum CA - G2 issues
"qualified" certificates according to Swiss digital signature law
(ZertES). The SwissSign Personal Platinum CA - G2 issues certificates
for natural persons and organizations. The Swiss Post Platinum CA - G2
issues the "Postzertifikat", a product of the Swiss Post. (Note that
each of the subordinate CAs has its own CP/CPS separate from the
CP/CPS of the root.) The Platinum CAs require that keys be generated
on Secure Signature Creation Devices (SSCDs); since such devices are
not used with servers, this hierarchy is enabled for email and object
signing uses only.</summary>
      <data url="https://swisssign.net/cgi-bin/authority/download?ca=50AFCC078715476F38C5B465D1DE95AAE9DF9CCC&amp;into=browser"
            version="3"
            sha1="56:E0:FA:C0:3B:8F:18:23:55:18:E5:D3:11:CA:E8:C2:43:31:AB:66"
            modulus="4096"
            from="2006-10-25"
            to="2036-10-25"/>
      <crl url="http://crl.swisssign.net/34C58C2353ADD6DEE70092B06BFA269451CA07E4">CRL</crl>
      <ocsp>http://ocsp.swisssign.net/34C58C2353ADD6DEE70092B06BFA269451CA07E4</ocsp>
      <type>IV</type>
      <document url="http://repository.swisssign.com/SwissSign-Platinum-Root-CP-CPS-R1.pdf">SwissSign Platinum Root CP/CPS</document>
      <document url="http://repository.swisssign.com/SwissSign-Platinum-Qualified-CP-CPS-R1.pdf">SwissSign Qualified Platinum CP/CPS</document>
      <document url="http://repository.swisssign.com/SwissSign-Platinum-Personal-CP-CPS-R1.pdf">SwissSign Personal Platinum CP/CPS</document>
      <document url="http://repository.swisssign.com/Swiss-Post-Platinum-CP-CPS-R1.pdf">Swiss Post Platinum CP/CPS</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.11.9, Firefox 2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=343756</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=407396</technical>
      </inclusion>
    </certificate>

    <certificate name="SwissSign Gold CA - G2" status="included">
      <summary>The "Gold G2" root CA currently has two subordinate
CAs: "Personal" issues certificates for natural persons and
organizations, while "Server" issues certificates for systems.  This
root CA may also operate other customer-specific Issuing CAs if and
only if they fully comply with all the stipulations of the "Gold G2"
CP/CPS.</summary>
      <data url="https://swisssign.net/cgi-bin/authority/download?ca=5B257B96A465517EB839F3C078665EE83AE7F0EE&amp;into=browser"
            version="3"
            sha1="D8:C5:38:8A:B7:30:1B:1B:6E:D4:7A:E6:45:25:3A:6F:9F:1A:27:61"
            modulus="4096"
            from="2006-10-25"
            to="2036-10-25"/>
      <crl url="http://crl.swisssign.net/0E414F33ED1FEE8DAF6A1916B706D286B253008A">CRL</crl>
      <ocsp>http://ocsp.swisssign.net/0E414F33ED1FEE8DAF6A1916B706D286B253008A</ocsp>
      <type>IV, OV, EV (policy OID 2.16.756.1.89.1.2.1.1)</type>
      <document url="http://repository.swisssign.com/SwissSign-Gold-CP-CPS-R4.pdf">SwissSign Gold CP/CPS R4</document>
      <document url="http://repository.swisssign.com/SwissSign-Gold-EUA-R4.pdf">End User Agreement R4</document>
      <document url="http://repository.swisssign.com/">SwissSign Document Repository</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.11.9, Firefox 2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=343756</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=407396</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=492077</ev>
      </inclusion>
    </certificate>
    <certificate name="SwissSign Silver CA - G2" status="included">
      <summary>The "Silver G2" root CA currently has three subordinate
CAs: "Personal" issues certificates for natural persons and
organizations, "Server" issues certificates for systems, and "Switch"
is operated for a customer that issues certificates for the academic
community</summary>
      <data url="https://swisssign.net/cgi-bin/authority/download?ca=17A0CDC1E441B63A5B3BCB459DBD1CC298FA8658&amp;into=browser"
            version="3"
            sha1="9B:AA:E5:9F:56:EE:21:CB:43:5A:BE:25:93:DF:A7:F0:40:D1:1D:CB"
            modulus="4096"
            from="2006-10-25"
            to="2036-10-25"/>
      <crl url="http://crl.swisssign.net/A5045DFC48B74304F31B3B90ACB036034D6AC84F">CRL</crl>
      <ocsp>http://ocsp.swisssign.net/A5045DFC48B74304F31B3B90ACB036034D6AC84F</ocsp>
      <type>IV</type>
      <document url="http://repository.swisssign.com/SwissSign-Silver-CP-CPS-R2.pdf">SwissSign Silver CP/CPS</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.11.9, Firefox 2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=343756</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=407396</technical>
      </inclusion>
    </certificate>
  </authority>

  <authority name="IdenTrust" url="http://www.identrust.com/"  status="included">
    <summary>IdenTrust is a for-profit corporation serving the private, commercial and government sectors.</summary>
    <audit type="WebTrust">
      <auditor url="http://www.ey.com/">Ernst and Young</auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=574&amp;file=pdf">Audit Report and Management's Assertions</document>
    </audit>
    <certificate name="DST Root CA X3" status="included">
      <summary></summary>
      <data url="http://apps.identrust.com/roots/DSTROOTCAX3.cer"
            version="3"
            sha1="DA:C9:02:4F:54:D8:F6:DF:94:93:5F:B1:73:26:38:CA:6A:D7:7C:13"
            modulus="2048"
            from="2000-09-30"
            to="2021-09-30"/>
      <crl url="http://crl.identrust.com/DSTROOTCAX3.crl">CRL</crl>
      <ocsp>http://ocsp.digsigtrust.com</ocsp>
      <type>DV</type>
      <document url="https://secure.identrust.com/certificates/policy/ts/TrustID_CP_v1.3.1_20060127.pdf">TrustID CP v1.3.1</document>
      <document url="https://secure.identrust.com/certificates/policy/ts/identrust_trustid_cps_v2.2_20070514.pdf">IdenTrust CPS v2.2</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.11.9, Firefox 2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=359069</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=394733</technical>
      </inclusion>
    </certificate>
    <certificate name="DST ACES CA X6" status="included">
      <summary></summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=277051"
            version="3"
            sha1="40:54:DA:6F:1C:3F:40:74:AC:ED:0F:EC:CD:DB:79:D1:53:FB:90:1D"
            modulus="2048"
            from="2003-11-20"
            to="2017-11-20"/>
      <crl url="http://crl.trustdst.com/DSTACESX6.crl">CRL</crl>
      <ocsp>https://ocspaces.trustdst.com</ocsp>
      <type>DV</type>
      <document url="https://secure.identrust.com/certificates/policy/aces/revised_aces_cp_v20040506_1.pdf">Certificate Policy v20040506_1</document>
      <document url="https://secure.identrust.com/certificates/policy/aces/dst-aces-cps-v20040617.pdf">Certificate Practice Statement v4.1</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.11.9, Firefox 2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=359069</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=394733</technical>
      </inclusion>
    </certificate>
  </authority>

  <authority name="Government of France" url="http://www.ssi.gouv.fr/" status="included">
    <summary>
    ANSSI is the French Network and Information Security Agency, a part of the French Government. It issues certificates to French
    Government websites which are used by the general public. Each department has a sub CA; there
    are at least 20 at the moment, and potentially up to 60.
    Note: The O of the root is PM/SGDN. SGDN stands for "Secrétariat général de la Défense nationale", which is now named 
    "Secrétariat général de la défense et de la sécurité nationale" (SGDSN). The OU of the root is 
    DCSSI which stands for "Direction Centrale de la sécurité des systèmes d'information". The name of the organizational unit
    has been changed to "Agence nationale de la sécurité des systèmes d'information" (ANSSI). 
    </summary>
    <audit type="Government -- WebTrust CA Equivalent">
      <auditor url="http://www.ssi.gouv.fr/site_rubrique31.html">French Secretariat GÈnÈral de la DÈfense Nationale</auditor>
      <document url="http://www.ssi.gouv.fr/IMG/pdf/igca-homologation.pdf">Official decision for IGC/A homologation</document>
    </audit>
    <certificate name="IGC/A" status="included">
      <summary>
       This is the root certificate of the French Government CA. The IGC/A root issues a 
       subordinate CA for each organization, which can be only a government or an 
       administrative organization. Each of these subordinate CAs may issue end-entity 
       certificates or additional subordinate CAs to be used for divisions within that 
       organization. Each organization is required to follow the CP and the Government 
       RGS/PRIS, and be audited.
      </summary>
      <data url="http://www.ssi.gouv.fr/IMG/crt/igca-rsa.crt"
            version="3"
            sha1="60:D6:89:74:B5:C2:65:9E:8A:0F:C1:88:7C:88:D2:46:69:1B:18:2C"
            modulus="2048"
            from="2002-12-13"
            to="2020-10-17"/>
      <crl url="http://www.ssi.gouv.fr/fr/sigelec/igca/revocation/igca.crl">CRL</crl>
      <ocsp></ocsp>
      <type>OV</type>
      <document url="http://www.ssi.gouv.fr/site_article15.html">Policies and other useful information specific to this root</document>
      <document url="http://www.ssi.gouv.fr/IMG/pdf/igca-pc-v2.pdf">Certificate Policy</document>
      <document url="http://www.ssi.gouv.fr/site_rubrique57.html">Repository General Security (RGS)  Website</document>
      <document url="http://www.references.modernisation.gouv.fr/documents-relatifs-a-lutilisation-de-certificats-ensemble-rgsa">Documents relating to the use of certificates: all RGS_A</document>
      <document url="http://www.references.modernisation.gouv.fr/sites/default/files/RGS_Variables_de_temps_V2_1.pdf">Variables de temps (for CRL frequency update)</document>
      <document url="http://www.references.modernisation.gouv.fr/sites/default/files/RGS_PC-Type_Authentification_V2_2.pdf">PC-Type authentification </document>
      <document url="http://www.references.modernisation.gouv.fr/sites/default/files/RGS_Profils_Certificat_LCR_OCSP_V2_2.pdf">Profiles de certificats, LCR et OCSP</document>
      <document url="http://www.references.modernisation.gouv.fr/sites/default/files/RGS_PC-Type_Signature_V2_2.pdf">PC-type signature</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.4, Firefox 3.5">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=368970</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=477147</technical>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>

  <authority name="Microsec e-Szignó" url="http://www.e-szigno.hu/" status="included">
    <summary>Microsec e-Szignó is a Hungarian certificate authority.</summary>
    <audit type="Government, ETSI TS 101.456  equivalent">
      <auditor url="http://webold.nhh.hu/esign/szolgParams/main.do">Hungarian Government National Communications Authority</auditor>
      <document url="http://srv.e-szigno.hu/menu/docs/NhhSupervision2009.pdf">Authority statement</document>
    </audit>

    <certificate name="Microsec e-Szigno Root CA" status="included">
      <summary></summary>
      <data url="http://www.e-szigno.hu/RootCA.crt"
            version="3"
            sha1="23:88:C9:D3:71:CC:9E:96:3D:FF:7D:3C:A7:CE:fC:D6:25:EC:19:0D"
            modulus="2048"
            from="2005-04-06"
            to="2017-04-06"/>
      <crl url="http://www.e-szigno.hu/RootCA.crl">CRL for this root</crl>
      <crl url="http://srv.e-szigno.hu/menu/index.php?lap=english_crl">List of CRLs</crl>
      <ocsp><!-- none that is public --></ocsp>
      <type>OV</type>
      <document url="http://srv.e-szigno.hu/menu/index.php?lap=english_ca_hierarchy">Certificate 
      Hierarchy in English</document>
      <document url="http://www.e-szigno.hu/docs/szsz--hsz--altalanos--v1.6--EN.doc">CPS in English</document>

      <document url="http://www.e-szigno.hu/docs/szsz--hsz--minositett--v4.1.pdf">Qualified
      Certificate CPS</document>
      <document url="http://www.e-szigno.hu/docs/hitelesitesiRend--v3.1.pdf">ETSI TS
      101.456, QCP public CP</document>
      <document url="http://www.e-szigno.hu/docs/mhr_v14_e.pdf">ETSI TS
      101.456, SSCD CP</document>
      <document url="http://www.e-szigno.hu/docs/szsz--hsz--fokozott--v1.1.pdf">Non-qualified
      Certificates CPS (electronic signatures)</document>
      <document url="http://www.e-szigno.hu/docs/ehr+_v14_e.pdf">ETSI TS 102.042, NCP+ CP</document>
      <document url="http://www.e-szigno.hu/docs/ehr_v14_e.pdf">ETSI TS 102.042, NCP CP</document>
      <document url="http://www.e-szigno.hu/docs/hrf--v1.2.pdf">ETSI TS 102.042, NCP
      and ETSI TS 102.042, LCP CP</document>
      <document url="http://www.e-szigno.hu/docs/szsz--hsz--altalanos--v1.0.pdf">Non-qualified
      Certificates CPS (other uses)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.4, Firefox 3.5">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=370505</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=483852</technical>
      </inclusion>
    </certificate>
    
     <certificate name="Microsec e-Szigno Root CA 2009" status="included">
      <summary>This is a new, SHA256, version of the Microsec SHA1 root that is already 
      included in NSS. The new root has a new DN and a new key. Microsec plans to operate 
      the two roots simultaneously for some years, and the old one shall be phased out 
      afterwards. Under the new root, Microsec issues certificates with an OCSP service 
      usable for the general public. </summary>
      <data url="http://www.e-szigno.hu/rootca2009_02.crt"
            version="3"
            sha1="89:DF:74:FE:5C:F4:0F:4A:80:F9:E3:37:7D:54:DA:91:E1:01:31:8E"
            modulus="2048"
            from="2009-06-16"
            to="2029-12-30"/>
      <crl url="http://crl.e-szigno.hu/rootca2009.crl">CRL for this root</crl>
      <crl url="http://srv.e-szigno.hu/menu/index.php?lap=english_crl">List of CRLs</crl>
      <ocsp>http://a3ocsp2009.e-szigno.hu</ocsp>
      <type>OV</type>
      <document url="http://srv.e-szigno.hu/menu/index.php?lap=english_ca_hierarchy#rootca2009">Certificate 
      Hierarchy in English</document>
      <document url="http://www.e-szigno.hu/docs/szsz--hsz--altalanos--v2.0.pdf">CPS in Hungarian, v2.0</document>
      <document url="http://www.e-szigno.hu/docs/szsz--hsz--altalanos--v1.6--EN.doc">CPS in English, v1.6</document>
      <document url="http://srv.e-szigno.hu/menu/index.php?lap=english_dokszab">Microsec CP and CPS documents</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.8, Firefox 3.6.12">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=510506</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=557904</technical>
      </inclusion>
    </certificate>

  </authority>

  <authority name="S-TRUST" url="https://www.s-trust.de/" status="complete">
    <summary>Deutscher Sparkassen Verlag GmbH (S-TRUST) is the world's largest
      smartcard provider and the central certification service
      provider for all German savings banks. This CA exists to enable
      up to 40 million German customers (end-users) to use their
      banking card as a certificate based signature, encryption and
      authentication device.</summary>
    <audit type="ETSI TS 101.456">
      <auditor url="http://www.tuvit.de/">TÜV-IT</auditor>
      <document url="http://www.tuvit.de/certuvit/pdf/6701UE.pdf">
      ETSI TS 101.456 Certificate</document>
    </audit>
    <audit type="ETSI TS 102.042">
      <auditor url="http://www.tuvit.de/">TÜV-IT</auditor>
      <document url="http://www.tuvit.de/certuvit/pdf/6702UE.pdf">
      ETSI TS 102.042 Certificate</document>
    </audit>
    <certificate name="S-TRUST Authentication and Encryption Root CA 2005:PN" status="included">
      <summary>This root will provide all customers of the German
        Savings Bank Financial Group with client certificates for
        their signature-enabled debit cards (smartcards).</summary>
      <data url="http://www.s-trust.de/service_support/zertifikatsmanagement/verzeichnisdienste/download_wurzelzertifikate/ordner_crt_dateien/authentication.crt"
            version="3"
            sha1="BE:B5:A9:95:74:6B:9E:DF:73:8B:56:E6:DF:43:7A:77:BE:10:6B:81"
            modulus="2048"
            from="2005-06-21"
            to="2030-06-21"/>
      <crl url="http://onsitecrl.s-trust.de/DeutscherSparkassenVerlagGmbHSTRUSTQualifiedRootCA2005001PN/LatestCRL.crl">CRL</crl>
      <ocsp>http://ocsp-q.s-trust.de</ocsp>
      <type>IV</type>
      <document url="http://www.s-trust.de/stn-cps/stn_cps.pdf">Certification Practice Statement for the S-TRUST Network</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.4, Firefox 3.5">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=370627</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=478573</technical>
      </inclusion>
    </certificate>
  </authority>

  <authority name="WISeKey" url="http://www.wisekey.com/" status="included">
    <summary>WISeKey operates the CertifyID Trust Service, which
      supports customer-specific CAs under a CA hierarchy rooted at
      the WISeKey Global Root GA CA and containing Policy CAs
      (subordinate to the root) and Issuing CAs (subordinate to the
      Policy CAs). Note that all end-entity certificates are issued by
      the Issuing CAs under policies set by WISeKey.
    </summary>
    <audit type="WebTrust">
      <auditor url="http://www.webtrust.es/">WTE y E. Álvarez Auditores, S.L.</auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=643&amp;file=pdf">Audit Report
      and Management's Assertions</document>
    </audit>
    <audit type="WebTrust">
      <auditor url="http://www.webtrust.es/">WTE y E. Álvarez Auditores, S.L.</auditor>
      <document url="http://www.wisekey.com/documents/pkiRepository/WebTrustReport2008.pdf">2008 Audit Report and Management's Assertions</document>
    </audit>
    <certificate name="OISTE WISeKey Global Root GA CA" status="included">
      <summary>As noted above, the Global Root GA CA is the one and
        only root for the entire CertifyID system. It issues CA
        certificates to Policy CAs, which in turn issue CA
        certificates to Issuing CAs. There are three types of Policy
        CAs (Standard, Advanced, and Qualified) and three types of
        Issuing CAs corresponding to these, each issuing a different
        class of certificates; verification requirements for
        applicants vary by class.
      </summary>
      <data url="http://public.wisekey.com/crt/owgrgaca.crt"
            version="3"
            sha1="59:22:A1:E1:5A:EA:16:35:21:F8:98:39:6A:46:46:B0:44:1B:0F:A9"
            modulus="2048"
            from="2005-12-11"
            to="2037-12-11"/>
      <crl url="http://public.wisekey.com/crl/owgrgaca.crl">CRL</crl>
      <ocsp><!-- none --></ocsp>
      <type>IV</type>
      <document url="http://www.wisekey.com/documents/pkiRepository/OISTEWISEKEYROOTCPS101Jan162007.pdf">OISTE WISeKey Root CPS 1.01</document>
      <document url="http://www.wisekey.com/documents/pkiRepository/CertifyIDValidationVerificationOverview.pdf">CertifyID Identity Validation Overview, Version 1.0</document>
      <document url="http://www.wisekey.com/documents/pkiRepository/WD0011TECHNICALSECURITYCONTROLS.pdf">Technical Security Controls WD0011 - Version 1.0.1</document>
      <document url="http://www.wisekey.com/documents/pkiRepository/cidclassed.pdf">Table comparing the three different classes of end-entity certificates issued by Issuing CAs.</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.4, Firefox 3.5">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=371362</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=467138</technical>
      </inclusion>
    </certificate>
    <comments>Note that the CPS for the root CA addresses only
      procedures related to issuance of certificates for its
      subordinate CAs. Issues related to issuance of end entity
      certificates are addressed in the other two documents
      references, in particular the CPS for the Advanced Services
      Issuing CA.</comments>
  </authority>

  <authority name="T-Systems" url="http://www.t-systems.com" status="included">
    <summary>
    T-Systems is a wholly-owned subsidiary of Deutsche Telekom AG.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.de.ey.com/">Ernst and Young</auditor>
      <document url="http://cert.webtrust.org/SealFile?seal=1385&amp;file=pdf">Audit Report and Management's Assertions</document>
    </audit>
    <audit type="WebTrust for sub-CAs">
      <auditor url="http://www.de.ey.com/">Ernst and Young</auditor>
      <document url="http://cert.webtrust.org/SealFile?seal=1371&amp;file=pdf">Audit Report and Management's Assertions</document>
    </audit>
    <audit type="WebTrust EV">
      <auditor url="http://www.de.ey.com/">Ernst and Young</auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=1372&amp;file=pdf">Audit Report and Management's Assertions</document>
    </audit>
    <certificate name="Deutsche Telekom Root CA 2" status="included">
      <summary></summary>
      <data url="http://wwwca.telesec.de/cgi-bin/caservice/Common/InstallRoot/DT-Root-CA-2.cer"
            version="3"
            sha1="85:A4:08:C0:9C:19:3E:5D:51:58:7D:CD:D6:13:30:FD:8C:DE:37:BF"
            modulus="2048"
            from="1999-07-09"
            to="2019-07-10"/>
      <crl url="http://pki.telesec.de/cgi-bin/service/af_DownloadARL.crl?-crl_format=X_509?-issuer=DT_ROOT_CA_2">CRL</crl>
      <ocsp><!-- none --></ocsp>
      <type>OV</type>
      <document url="http://www.telesec.de/pki/roots.html">Document Repository</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.4, Firefox 3.5">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=378882</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=487647</technical>
      </inclusion>
    </certificate>
	<certificate name="T-TeleSec GlobalRoot Class 3" status="included">
      <summary>
      T-Systems plans to offer certificates with a high security level (e.g. EV) chaining up to 
      this “T-TeleSec GlobalRoot Class 3” root. High security level services for email and 
      code signing will also be created, and the corresponding Sub-CAs will be operated under 
      this Class 3 root. This Class 3 root will only have internally-operated subordinate CAs. 
      T-Systems currently offers certificates with a standard security level (e.g. OV) chaining up 
      to the currently included “Deutsche Telekom Root CA 2” root. All of those standard security 
      services will eventually chain up to a “T-TeleSec GlobalRoot Class 2” root. 
      Inclusion of the “T-TeleSec GlobalRoot Class 2” root is not currently part of this request. 
      </summary>
      <data url="http://www.telesec.de/downloads/GlobalRoot_Class_3.cer"
            version="3"
            sha1="55:A6:72:3E:CB:F2:EC:CD:C3:23:74:70:19:9D:2A:BE:11:E3:81:D1"
            modulus="2048"
            from="2008-10-01"
            to="2033-10-01"/>
      <crl url="http://pki.telesec.de/rl/GlobalRoot_Class_3.crl">CRL</crl>
      <ocsp>http://ocsp.telesec.de/ocspr</ocsp>
      <type>EV (Policy OID 1.3.6.1.4.1.7879.13.24.1)</type>
      <document url="http://www.telesec.de/pki/roots.html">Document Repository</document>
      <document url="http://www.telesec.de/serverpass/cps.html">ServerPass CP/CPS (German)</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=555341">ServerPass CP/CPS  v1.1 (English)</document>
      <document url="http://www.telesec.de/pki/service/GlobalRoot_Class_3/cp_en.pdf">CP (English)</document>
      <document url="http://www.telesec.de/pki/service/GlobalRoot_Class_3/cp.pdf">CP (German)</document>
      <document url="http://www.telesec.de/pki/service/GlobalRoot_Class_3/cps_en.pdf">CPS (English)</document>
      <document url="http://www.telesec.de/pki/service/GlobalRoot_Class_3/cps.pdf">CPS (German)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.14, Firefox 18">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=669849</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=760297</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=760313</ev>
      </inclusion>
      <comments></comments>
    </certificate>

  </authority>

  <authority name="Symantec / TC TrustCenter" url="http://www.trustcenter.de/"     
             status="included">
    <summary>
    TC TrustCenter is a subsidiary of Symantec. 
    TC TrustCenter is based in Germany, 
    with customers in all major regions of the world. TC TrustCenter 
    offers a variety of products and services including SSL Server 
    certificates and Email certificates. 
    </summary>
    <audit type="ETSI 102.042">
      <auditor url="http://www.tuvit.de/">TÜV-IT Germany</auditor>
      <document url="http://www.tuvit.de/certuvit/pdf/6707UE_s.pdf">ETSI TS 102.042 LCP Certificate</document>
    </audit>
    <audit type="ETSI 102.042 V2.1.1 EV">
      <auditor url="http://www.tuvit.de/">TÜV-IT Germany</auditor>
      <document url="http://www.tuvit.de/certuvit/pdf/6711UE_s.pdf">ETSI TS 102 042 V2.1.1 EV Certificate</document>
    </audit>
    <certificate name="TC TrustCenter Universal CA III" status="included">
      <summary>
      This root will have an internally-operated subordinate CA for each registration strength; 
      “Class 1”, “Class 2”, “Class 3” and “Class 4 EV”. This root currently has one Class 4 EV 
      subordinate CA, “TC TrustCenter Class 4 Extended Validation CA I”, which will only issue EV certificates. 
      This new root will co-exist with the “TC TrustCenter Universal CA I” root that is currently included in NSS.
      This new root will effectively replace the "TC Universal CA II" root which was not included in NSS. 
      For this new root, TC TrustCenter generated a new key (supervised by their auditor) to be compliant 
      with the CA/B Forum guidelines.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=411063"
            version="3"
            sha1="96:56:cd:7b:57:96:98:95:d0:e1:41:46:68:06:fb:b8:c6:11:06:87"
            modulus="2048"
            from="2009-09-09"
            to="2029-12-31"/>
      <crl url="http://crl.tcuniversal-III.trustcenter.de/crl/v2/tc_universal_root_III.crl">CRL</crl>
      <ocsp>http://ocsp.tcuniversal-iii.trustcenter.de</ocsp>
      <type>OV, EV (policy OID 1.2.276.0.44.1.1.1.4)</type>
      <document url="http://www.trustcenter.de/media/CPS-TCTrustCenter-en.pdf">CPS (English)</document>
      <document url="http://www.trustcenter.de/cps">CPS (German)</document>
      <document url="http://www.trustcenter.de/media/CPD-TCTrustCenter-en.pdf">CPD (English)</document>
      <document url="http://www.trustcenter.de/cpd">CPD (German)</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=455642">EV CPD (English)</document>
      <document url="http://www.trustcenter.de/media/CPD_TCTrustCenter_EV-de.pdf">EV CPD (German)</document>
      <document url="http://www.trustcenter.de/infocenter/root_certificates.htm">All TC TrustCenter root certs</document>
       <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.9, Firefox 4.0">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=436467</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=593063</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=593067</ev>
        <technical></technical>
      </inclusion>
      <comments></comments>
    </certificate>
    <certificate name="TC TrustCenter Class 2 CA II" status="included">
      <summary>
       This root has two internally-operated subordinate CAs which issue 
       certificates for SSL, email, and code signing. This root also has an 
       externally-operated subordinate CA which is used to issue device 
       certificates and email certificates for internal use only. The device 
       name and the email address belong to a company internal domain, so the 
       ownership is guaranteed.
      </summary>
      <data url="http://www.trustcenter.de/media/class_2_ii.der"
            version="3"
            sha1="AE:50:83:ED:7C:F4:5C:BC:8F:61:C6:21:FE:68:5D:79:42:21:15:6E"
            modulus="2048"
            from="2006-01-12"
            to="2025-12-31"/>
      <crl url="http://www.trustcenter.de/crl/v2/tc_class_2_ca_II.crl">CRL</crl>
      <ocsp>http://ocsp.tcclass2-ii.trustcenter.de</ocsp>
      <type>OV</type>
      <ocsp>http://ocsp.tcclass1.trustcenter.de/</ocsp>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=362215">Hierarchy Diagram</document>
      <document url="http://www.trustcenter.de/media/CPS-TCTrustCenter-080904-en.pdf">TC TrustCenter GmbH Certification Practice Statement (CPS)</document>
      <document url="http://www.trustcenter.de/media/CPD-TCTrustCenter-061023-en.pdf">TC TrustCenter Certificate Policy Definitions (CPD)</document>
      <document url="http://www.trustcenter.de/en/infocenter/root_certificates.htm">TC TrustCenter CA Certificates</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.4, Firefox 3.5">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=392024</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=486759</technical>
      </inclusion>
    </certificate>
    <certificate name="TC TrustCenter Class 3 CA II" status="included">
      <summary>
       This root has one internally-operated subordinate CA which issues 
       certificates for SSL, email, and code signing.
      </summary>
      <data url="http://www.trustcenter.de/media/class_3_ii.der"
            version="3"
            sha1="80:25:EF:F4:6E:70:C8:D4:72:24:65:84:FE:40:3B:8A:8D:6A:DB:F5"
            modulus="2048"
            from="2006-01-12"
            to="2025-12-31"/>
      <crl url="http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl">CRL</crl>
      <ocsp>http://ocsp.tcclass3-ii.trustcenter.de</ocsp>
      <type>OV</type>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=362215">Hierarchy Diagram</document>
      <document url="http://www.trustcenter.de/media/CPS-TCTrustCenter-080904-en.pdf">TC TrustCenter GmbH Certification Practice Statement (CPS)</document>
      <document url="http://www.trustcenter.de/media/CPD-TCTrustCenter-061023-en.pdf">TC TrustCenter Certificate Policy Definitions (CPD)</document>
      <document url="http://www.trustcenter.de/en/infocenter/root_certificates.htm">TC TrustCenter CA Certificates</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.4, Firefox 3.5">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=392024</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=486759</technical>
      </inclusion>
    </certificate>
    <certificate name="TC TrustCenter Universal CA I" status="included">
      <summary>
      This root has been introduced to reduce the number of root certificates 
      in the trusted root stores. This root will have internally-operated 
      subordinate CAs for each registration strength. “Class 1”, “Class 2”,
      “Class 3” and “Class 4” represent the registration strength. This root 
      currently has one Class 3 subordinate CA. Over time this root will have
      more “TC Class x” subordinate CA certificates.
      </summary>
      <data url="http://www.trustcenter.de/media/Universal_CA-I.der"
            version="3"
            sha1="6B:2F:34:AD:89:58:BE:62:FD:B0:6B:5C:CE:BB:9D:D9:4F:4E:39:F3"
            modulus="2048"
            from="2006-03-22"
            to="2025-12-31"/>
      <crl url="http://www.trustcenter.de/crl/v2/tc_universal_root_I.crl">CRL</crl>
      <ocsp>http://ocsp.tcuniversal-i.trustcenter.de</ocsp>
      <type>OV</type>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=362215">Hierarchy Diagram</document>
      <document url="http://www.trustcenter.de/media/CPS-TCTrustCenter-080904-en.pdf">TC TrustCenter GmbH Certification Practice Statement (CPS)</document>
      <document url="http://www.trustcenter.de/media/CPD-TCTrustCenter-061023-en.pdf">TC TrustCenter Certificate Policy Definitions (CPD)</document>
      <document url="http://www.trustcenter.de/en/infocenter/root_certificates.htm">TC TrustCenter CA Certificates</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.4, Firefox 3.5">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=392024</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=486759</technical>
      </inclusion>
    </certificate>
  </authority>

  <authority name="Certigna of Dhimyotis" url="http://www.certigna.fr"  status="included">
    <summary>
      Dhimyotis services include Certigna ID and Certigna SSL. Certigna is a 
      French CA for the European market and expects to expand to serve other 
      countries (India, USA, South America ... ) soon.
    </summary>
    <audit type="ETSI TS 102.042">
      <auditor url="http://www.lsti.fr">LSTI - La Sécurité des Technologies de l'Information
      </auditor>
      <document url= "http://www.lsti-certification.fr/images/stories/dhimyotis.pdf">Statement of Compliance with ETSI TS 102.042</document>
    </audit>
    <audit type="ETSI TS 102.042">
      <auditor url="http://www.lsti.fr">LSTI - La Sécurité des Technologies de l'Information
      </auditor>
      <document url= "http://www.certigna.fr/downloads/attestation_lsti.pdf">2008 Statement of Compliance with ETSI TS 102.042</document>
    </audit>
    <certificate name="Certigna" status="included">
      <summary>
       The Certigna root has three internally operated subordinated CA’s:  
       Certigna SSL is for SSL-enabled servers, Certigna ID is for 
       authentication and digitally-signed email, and Certigna Chiffrement 
       is for encrypting email.
      </summary>
      <data url="http://www.certigna.fr/ca/ACcertigna.crt"
            version="3"
            sha1="B1:2E:13:63:45:86:A4:6F:1A:B2:60:68:37:58:2D:C4:AC:FD:94:97"
            modulus="2048"
            from="2007-06-29"
            to="2027-06-29">
      </data>
      <crl url="http://www.certigna.fr/crl/certignassl.crl">CRL for the SSL Subordinate CA</crl>
      <crl url="http://www.certigna.fr/crl/certignaid.crl">CRL for the ID Subordinate CA</crl>
      <type>IV/OV</type>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=364343">Public Portion of CPS</document> 
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=364146">Translated Portion of CPS</document> 
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=365278">Translated Portion of Code Signing CPS</document> 
      <document url="http://www.certigna.fr/documents/pc_certigna_ssl.php">Certificate Policy for SSL Subordinate CA</document> 
      <document url="http://www.certigna.fr/documents/pc_certigna_id.php">Certificate Policy for ID Subordinate CA</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.4, Firefox 3.5">
        <authorisation>http://bugzilla.mozilla.org/show_bug.cgi?id=393166</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=483889</technical>
      </inclusion>
    </certificate>
  </authority>

  <authority name="SECOM Trust" url="http://www.secomtrust.net/" status="included">
    <summary>SECOM Trust Services Co., Ltd are a commercial CA based in Japan.</summary>
    <audit type="WebTrust CA and EV">
      <auditor url="http://www.deloitte.com/jp">Deloitte Touche Tohmatsu LLC</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=1214">Audit Report and Management’s Assertions</document>
    </audit>
    
    <certificate name="Security Communication RootCA2" status="included">
      <summary>
      This is the SHA256 version of the Security Communication RootCA1 (SHA1) root certificate 
      that is currently in NSS. It will have separate intermediate CAs for signing certificates 
      for SSL, EV SSL, email, and code signing. Not requesting EV treatment at this time.
      </summary>
      <data url="https://repository.secomtrust.net/SC-Root2/SCRoot2ca.cer"
            version="3"
            sha1="5F:3B:8C:F2:F8:10:B3:7D:78:B4:CE:EC:19:19:C3:73:34:B9:C7:74"
            modulus="2048"
            from="2009-05-28"
            to="2029-05-28"/>
      <crl url="https://repository.secomtrust.net/SC-Root2/SCRoot2CRL.crl">CRL</crl>
      <ocsp><!-- None --></ocsp>
      <type>OV</type>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=447053">Diagram showing relation of documents</document>
      <document url="https://repository.secomtrust.net/SC-Root2/index.html">Documents relating to this root</document>
      <document url="https://repository.secomtrust.net/SC-Root/SCRootCPS.pdf">CPS (Japanese)</document>
      <document url="https://repository.secomtrust.net/SC-Root/SCRootCP1.pdf">CP (Japanese)</document>
      <document url="https://repo1.secomtrust.net/spcpp/pfw/pfwsr2ca/PfWSR2CA-CP.pdf">SECOM CA Service Passport for Web SR 2.0 Certificate Policy (Japanese)</document>
      <document url="https://repo1.secomtrust.net/spcpp/pfw/pfwevca/PfWEVCA-CP.pdf">SECOM Passport for Web EV Certificate Policy (Japanese)</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=449589">SECOM Passport for Web EV Certificate Policy (copy-and-paste enabled)</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=451885">EV Verification Document</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.13.2, Firefox 11">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=527419</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=680979</technical>
      </inclusion>
    </certificate>
    
    <certificate name="Security Communication EV RootCA1" status="included">
      <summary>This request is to add a newly constructed EV root to the NSS database. Note that there is currently a non-EV CA called Security Communication RootCA1 in the NSS database.</summary>
      <data url="https://repository.secomtrust.net/EV-Root1/EVRoot1ca.cer"
            version="3"
            sha1="FE:B8:C4:32:DC:F9:76:9A:CE:AE:3D:D8:90:8F:FD:28:86:65:64:7D"
            modulus="2048"
            from="2007-06-06"
            to="2037-06-06"/>
      <crl url="https://repository.secomtrust.net/EV-Root1/EVRoot1CRL.crl">CRL</crl>
      <ocsp><!-- none --></ocsp>
      <type>EV (policy OID 1.2.392.200091.100.721.1)</type>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=447053">Diagram showing relation of documents</document>
      <document url="https://repository.secomtrust.net/SC-Root2/index.html">Documents relating to this root</document>
      <document url="https://repository.secomtrust.net/SC-Root/SCRootCPS.pdf">CPS (Japanese)</document>
      <document url="https://repository.secomtrust.net/SC-Root/SCRootCP1.pdf">CP (Japanese)</document>
      <document url="https://repo1.secomtrust.net/spcpp/pfw/pfwsr2ca/PfWSR2CA-CP.pdf">SECOM CA Service Passport for Web SR 2.0 Certificate Policy (Japanese)</document>
      <document url="https://repo1.secomtrust.net/spcpp/pfw/pfwevca/PfWEVCA-CP.pdf">SECOM Passport for Web EV Certificate Policy (Japanese)</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=449589">SECOM Passport for Web EV Certificate Policy (copy-and-paste enabled)</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=451885">EV Verification Document</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.4, Firefox 3.5">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=394419</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=477134</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=477145</ev>
      </inclusion>
    </certificate>
  </authority>

  <authority name="Certicamara S.A." url="http://www.certicamara.com"  status="included">
    <summary>
      Sociedad Cameral de Certificación Digital - Certicámara S.A. is a 
      commercial CA primarily serving Colombia and Andean Region
    </summary>
    <audit type="WebTrust">
      <auditor url="http://www.deloitte.com">Deloitte and Touche
      </auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=750&amp;file=pdf">Audit Report and Management's Assertions</document>
    </audit>
    <certificate name="AC Raíz Certicámara S.A." status="included">
      <summary>
       This is a new root CA certificate authorized by Industry and 
       Commerce Department of Colombia, to replace the Certificado Empresarial Clase-A 
       certificate. It has one internally operated subordinate CA.
      </summary>
      <data url="http://www.certicamara.com/ac_offline_raiz_certicamara.crt"
            version="3"
            sha1="CB:A1:C5:F8:B0:E3:5E:B8:B9:45:12:D3:F9:34:A2:E9:06:10:D3:36"
            modulus="4096"
            from="2006-11-27"
            to="2030-04-02">
      </data>
      <crl url="http://www.certicamara.com/repositoriorevocaciones/ac_raiz_certicamara.crl">CRL</crl>
      <type>OV</type>
      <document url="http://www.certicamara.com/certificate_hierarchy_diagram.jpg">Certificate Hierarchy
      </document> 
      <document url="http://www.certicamara.com/templates/cc/images/dpc/DPCMarzo_09.pdf">Certification Practices Statement (CPS) – in Spanish
      </document>
      <document url="http://www.certicamara.com/index.php?option=com_content&amp;task=category&amp;sectionid=22">Declaration of Practices
      </document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.4, Firefox 3.5">
        <authorisation>http://bugzilla.mozilla.org/show_bug.cgi?id=401262</authorisation>
        <technical>http://bugzilla.mozilla.org/show_bug.cgi?id=486424</technical>
      </inclusion>
    </certificate>
  </authority>

  <authority name="ComSign" url="http://www.comsign.co.il/eng/default.asp" status="included">
    <summary>
     ComSign is a private company owned by Comda, Ltd., a company specializing 
     in information protection products and solutions. In 2003, ComSign was 
     appointed by the Justice Ministry as a certificate authority in Israel in 
     accordance with the Electronic Signature Law 5761-2001, and is currently 
     the only entity issuing legal authorized electronic signatures according to 
     the Israel law. ComSign has issued electronic signatures to thousands of 
     business people in Israel.
    </summary>
    <audit type="Israel Electronic Signature Law">
      <auditor url="http://www.justice.gov.il/MOJEng/Certification+Authorities+Registrar">The State of Israel – Ministry of Justice</auditor>
      <document url="http://www.justice.gov.il/MOJEng/Certification+Authorities+Registrar/Registered+CAs/">Registered CA</document>
    </audit>
    <audit type="ETSI TS 101 456">
      <auditor url="https://bugzilla.mozilla.org/attachment.cgi?id=348789">Sharony-Shefler</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=371697">Audit Statement 2009</document>
    </audit>
    <certificate name="ComSign CA" status="approved">
      <summary>
      This root has six internally-operated subordinate CAs that are used for 
      issuing digital IDs to individuals and corporations in accordance with 
      the Israeli Electronic Signature Law. 
      </summary>
      <data url="http://fedir.comsign.co.il/cacert/ComsignCA.crt"
            version="3"
            sha1="E1 A4 5B 14 1A 21 DA 1A 79 F4 1A 42 A9 61 D6 69 CD 06 34 C1"
            modulus="2048"
            from="2004-03-24"
            to="2029-03-19"/>
      <crl url="http://fedir.comsign.co.il/crl/ComSignCA.crl">CRL</crl>
      <type>IV, OV</type>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=346012">Cert Hierarchy Diagram</document>
      <document url="http://www.comsign.co.il/main.asp?id=125">Links to CPSs in Hebrew and English</document>
      <document url="http://www.comsign.co.il/Images/Doc/English_CPS_final.doc">CPS in English</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.4, Firefox 3.5">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=420705</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=490487</technical>
      </inclusion>
    </certificate>
    <certificate name="ComSign Secured CA" status="included">
      <summary>
      This root has two internally-operated subordinate CAs that are used 
      for issuing certificates for SSL and for code-signing.
      </summary>
      <data url="http://fedir.comsign.co.il/cacert/ComsignSecuredCA.crt"
            version="3"
            sha1="F9 CD 0E 2C DA 76 24 C1 8F BD F0 F0 AB B6 45 B8 F7 FE D5 7A"
            modulus="2048"
            from="2004-03-24"
            to="2029-03-16"/>
      <crl url="http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl">CRL</crl>
      <type>OV</type>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=346012">Cert Hierarchy Diagram</document>
      <document url="http://www.comsign.co.il/main.asp?id=125">Links to CPSs in Hebrew and English</document>
      <document url="http://www.comsign.co.il/Images/Doc/English_CPS_final.doc">CPS in English</document>
      <document url="http://www.comsign.co.il/Images/Doc/CPS__SSL_EN.pdf">Security Certificate Approval Regulations For SSL Websites in English</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.4, Firefox 3.5">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=420705</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=490487</technical>
      </inclusion>
    </certificate>
  </authority>

  <authority name="Wells Fargo" url="http://www.wellsfargo.com/"  status="included">
    <summary>
      Wells Fargo is a public CA based in San Francisco, California, and serving customers worldwide. This EV CA was created for the purpose of creating an online/intermediate EV SSL issuing authority which will be managed internally, and follow the WellsSecure CPS.
    </summary>
    <audit type="WebTrust EV pre-audit">
      <auditor url="http://www.kpmg.com/">KPMG</auditor>
      <document url= "https://bugzilla.mozilla.org/attachment.cgi?id=326739">Audit Report
      and Management's Assertions</document>
    </audit>
    <audit type="WebTrust CA">
      <auditor url="http://www.kpmg.com/">KPMG</auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=528&amp;file=pdf">Audit Report
      and Management's Assertions</document>
    </audit>
    <certificate name="WellsSecure Public Root Certificate Authority" status="included">
      <summary>
        Root CA with one internal subordinate CA issuing EV SSL certificates.
      </summary>
      <data url="http://crl.pki.wellsfargo.com/wsprca.crt"
            version="3"
            sha1="e7:b4:f6:9d:61:ec:90:69:db:7e:90:a7:40:1a:3c:f4:7d:4f:e8:ee"
            modulus="2048"
            from="2007-12-13"
            to="2022-12-13">
      </data>
      <crl url="http://crl.pki.wellsfargo.com/wsprca.crl">CRL</crl>
      <ocsp>http://validator.wellsfargo.com/</ocsp>
      <type>EV (policy OID 2.16.840.1.114171.500.9)</type>
      <document url="http://www.wellsfargo.com/cps"> WellsSecure PKI Certificate Policy
      </document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.11.10, Firefox 3.0.2">
        <authorisation>http://bugzilla.mozilla.org/show_bug.cgi?id=428390</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=449393</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=449394</ev>
      </inclusion>
    </certificate>
  </authority>

  <authority name="Verizon / Cybertrust" url="http://www.verizonbusiness.com/us/products/security/identity/"                   status="included">
    <summary>
      Verizon Business Security Solutions Powered by Cybertrust
      operates a commercial certificate authority service for
      businesses and governments internationally.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.ey.com/be">Ernst and Young</auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=799&amp;file=pdf">
      Audit Report and Management's Assertions</document>
    </audit>
    <audit type="WebTrust EV">
      <auditor url="http://www.ey.com/be">Ernst and Young</auditor>
      <document url="https://cybertrust.omniroot.com/repository/WT_EV_2008_SealFile.pdf">
      Audit Report and Management's Assertions</document>
    </audit>
    <certificate name="Cybertrust Global Root" status="included">
      <summary>
        This root was created to provide a service to customers
        desiring a root based outside the United States. Relying on
        the GTE CyberTrust Global Root for ubiquity through
        cross-certification, this root is used for issuance of EV SSL
        certificates. There is currently only one internally-operated
        subordinate CA called Cybertrust SureServer EV CA.  The CPS
        allows for this root to have other subordinate CAs in the
        future. The sub-CAs are required to follow the CPS and to have
        regular audits.
      </summary>
      <data url="http://cacert.omniroot.com/ct_root_ss.crt"
            version="3"
            sha1="5f:43:e5:b1:bf:f8:78:8c:ac:1c:c7:ca:4a:9a:c6:22:2b:cc:34:c6"
            modulus="2048"
            from="2006-12-15"
            to="2021-12-15">
      </data>
      <crl url="http://www2.public-trust.com/crl/ct/ctroot.crl">CRL</crl>
      <ocsp><!-- None --></ocsp>
      <type>EV (policy OID 1.3.6.1.4.1.6334.1.100.1)</type>
      <document url="http://cybertrust.omniroot.com/repository/Cybertrust_CP_v_2_3_cl.pdf"> Cybertrust CA Certificate Policy
      </document>
      <document url="http://cybertrust.omniroot.com/repository/Cybertrust_CPS_v_5_4.pdf"> Certification Practice Statement
      </document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.4, Firefox 3.5">
        <authorisation>http://bugzilla.mozilla.org/show_bug.cgi?id=430700</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=493258</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=493259</ev>
      </inclusion>
    </certificate>
  </authority>

  <authority name="Kamu SM" url="http://www.kamusm.gov.tr/" status="included">
    <summary>Kamu Sertifikasyon Merkezi is the one government CA in Turkey
    that has authorization to issue certificates to
    government entities. They are also authorised to issue to commercial companies.</summary>
    <audit type="ETSI TS 101.456">
      <auditor url="http://www.tk.gov.tr/">Turkish Information and Communications Technologies Authority (ICTA)</auditor>
      <document url="https://bug381974.bugzilla.mozilla.org/attachment.cgi?id=382453">ICTA statement of ETSI compliance</document>
    </audit>
    <certificate name="TÜBİTAK UEKAE Kök Sertifika Hizmet Sağlayıcısı - Sürüm 3" status="included">
      <summary></summary>
      <data url="http://www.kamusm.gov.tr/BilgiDeposu/KOKSHS.v3.crt"
            version="3"
            sha1="1B:4B:39:61:26:27:6B:64:91:A2:68:6D:D7:02:43:21:2D:1F:1D:96"
            modulus="2048"
            from="2007-08-24"
            to="2017-08-21"/>
      <crl url="http://www.kamusm.gov.tr/BilgiDeposu/KOKSIL.v3.crl">CRL</crl>
      <ocsp>http://ocsp.kamusm.gov.tr</ocsp>
      <type>DV, IV</type>
      <document url="http://www.kamusm.gov.tr/BilgiDeposu/KSM_NES_SI/KSM_NES_SI.pdf">CP</document>
      <document url="http://www.kamusm.gov.tr/BilgiDeposu/KSM_NES_SUE/KSM_NES_SUE.pdf">CPS</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.5, Firefox 3.6">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=381974</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=499705</technical>
      </inclusion>
    </certificate>
  </authority>

  <authority name="E-TUGRA" url="http://www.etugra.com.tr/" status="included">
    <summary>
    E-TUGRA is the EBG Informatics Technologies and Services Corporation. 
    E-TUGRA is a privately held CA operating in Ankara, Turkey, with customers 
    from all geographic areas within Turkey. E-TUGRA has been certified as one 
    of the four authorized CAs that issues qualified certificates as well as 
    SSL and other types of certificates to public in Turkey.  
    </summary>
    <audit type="ETSI TS 101.456">
      <auditor url="http://www.tk.gov.tr/">Turkish Information and Communications Technologies Authority (ICTA)</auditor>
      <document url="http://www.e-tugra.com.tr/Portals/3/E-Tugra_audit_09.pdf">ICTA statement of ETSI compliance</document>
    </audit>
    <certificate name="EBG Elektronik Sertifika Hizmet Sağlayıcısı" status="included">
      <summary>
      From this root CA E-TUGRA has issued two internally-operated subordinate 
      CAs. The Qualified Certificate (QC) subordinate CA issues certificates 
      for Digital Signing and Non-Repudiation (document and email signing). 
      The Non Qualified Certificate (NQC) subordinate CA (EBG Web Sunucu 
      Sertifika Hizmet Sağlayıcısı) issues certificates for SSL, email 
      encryption, and code signing.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=380381"
            version="3"
            sha1="8c:96:ba:eb:dd:2b:07:07:48:ee:30:32:66:a0:f3:98:6e:7c:ae:58"
            modulus="4096"
            from="2006-08-17"
            to="2016-08-14"/>
      <crl url="http://crl.e-tugra.com/e-tugra_ksm.crl">CRL</crl>
      <ocsp>http://ocsp.e-tugra.com/status/</ocsp>
      <type>OV</type>
      <document url="http://www.e-tugra.com.tr/Portals/3/Templates/NQC_CpCps_v1.1.pdf">Non Qualified (NQC) CP/CPS in English</document>
      <document url="http://www.e-tugra.com.tr/Portals/3/Templates/QC_CpCps.pdf">Qualified (QC) CP/CPS in English</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.5, Firefox 3.6">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=443653</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=509440</technical>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>

  <authority name="Chunghwa Telecom" url="http://www.cht.com.tw/CHTFinalE/Web/" status="included">
    <summary>
      Chunghwa Telecom (CHT) chiefly provides telecommunication and information-related 
      services. A public corporation, CHT is the largest integrated telecommunication 
      operator in Taiwan.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.dfk.com/">Sun Rise CPA Firm of DFK International</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=695">
      Audit Report and Management's Assertions</document>
    </audit>
    <certificate name="ePKI Root Certification Authority" status="included">
      <summary>
      This is the eCA root, which has two subordinate CAs: CHTCA and Public CA. 
      The CHTCA is the internal CA of Chunghwa Telecom (CHT) which signs certificates 
      for CHT employees. The Public CA signs certificates for CHT clients.  
      </summary>
      <data url="http://210.71.154.6/download/ROOTeCA.cer"
            version="3"
            sha1="67:65:0d:f1:7e:8e:7e:5b:82:40:a4:f4:56:4b:cf:e2:3d:69:c6:f0"
            modulus="4096"
            from="2004-12-19"
            to="2034-12-19"/> 
      <crl url="http://210.71.154.6/repository/CRL/CA.crl">CRL</crl>
      <type>DV, OV</type>
      <document url="http://210.71.154.6/repository_en.htm">CHT Certificate Repository</document>
      <document url="http://210.71.154.6/download/ePKI_CP_V1_2004.pdf">ePKI CP</document>
      <document url="http://210.71.154.6/download/eCA_CPS_english.pdf">eCA CPS</document>
      <document url="http://210.71.154.6/download/PublicCA%20CPS%20English%20version1.3.pdf">Public CA CPS</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="email" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.5, Firefox 3.6">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=448794</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=496193</technical>
      </inclusion>
      <comments>
       In the eCA CPS the term cross-certificate means a certificate used to establish 
       a trust relationship between two CAs. Within the ePKI the cross-certificate is 
       intended to mean subordinate CA. All subordinate CAs are operated by the Data 
       Communication Business Group, which is a division of Chunghwa Telecom.
</comments>
    </certificate>
  </authority>

  <authority name="certSIGN" 
              url="http://www.certsign.ro/certsign_en/" status="included">
    <summary>
    certSIGN is operated by SC CERTSIGN srl, a private corporation. certSIGN 
    is a company member of UTI Group and an accredited supplier of certification 
    services. certSIGN solutions are developed integrally in Romania.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.ey.com/">Ernst and Young</auditor>
      <document url="https://bug470756.bugzilla.mozilla.org/attachment.cgi?id=361730">
      Audit Report and Management's Assertions</document>
    </audit>
    <certificate name="certSIGN ROOT CA" status="included">
      <summary>
        This root issues internally-operated subordinate CAs for different 
        classes of certificates based on use and verification requirements.
      </summary>
        <data url="https://bugzilla.mozilla.org/attachment.cgi?id=359654"
        version="3"
        sha1="fa:b7:ee:36:97:26:62:fb:2d:b0:2a:f6:bf:03:fd:e8:7c:4b:2f:9b"
        modulus="2048" 
        from="2006-07-04"
        to="2031-07-04"/>
      <crl url="https://www.certsign.ro/certificate_digitale/lista_certificate_revocate_en.htm">CRL</crl>
      <ocsp>http://ocsp.certisgn.ro</ocsp>
      <type>OV</type>
      <document url="http://www.certsign.ro/certsign_en/files/certSIGN_CP_EN_v1.0.pdf">Certification Policy in English</document>
      <document url="http://www.certsign.ro/certsign_en/files/certSIGN_CPS_EN.pdf">Certification Practice Statement in English</document>
      <document url="https://www.certsign.ro/certificate_digitale/lantul_de_incredere_en.htm">Download Links of Subordinate CAs</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="email" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.5, Firefox 3.6">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=470756</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=526532</technical>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>

  <authority name="Japanese GPKI" 
              url="http://www.gpki.go.jp" status="included">
    <summary>
     In Japan there are two root CAs, one is GPKI (Government Public Key Infrastructure)
     and the other one is LGPKI (Local government public Key Infrastructure). 
     GPKI is controlled by the Ministry of Internal Affairs/Communications and 
     National Information Security Center, and it is separate from Local government 
     sectors.  The Japanese government decided to centralize to GPKI from each of the 
     ministry's certification systems and it has finished migration on Oct, 2008.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.deloitte.com/jp">Deloitte Touche Tohmatsu</auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=886&amp;file=pdf">Audit Report and Management's Assertions (Japanese)</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=374841">Audit Report and Management's Assertions (English)</document>
   </audit>
    <certificate name="ApplicationCA - Japanese Government" status="included">
      <summary>
       This root is operated by the national government of Japan. It issues server 
       certificates and code signing certificates to national government agencies. 
       This root issues end-entity certificates directly, and does not have any subordinate CAs.
      </summary>
        <data url="http://www.gpki.go.jp/apcaself/APCAroot.der"
        version="3"
        sha1="7F:8A:B0:CF:D0:51:87:6A:66:F3:36:0F:47:C8:8D:8C:D3:35:FC:74"
        modulus="2048" 
        from="2007-12-12" 
        to="2017-12-12"/>
      <crl url="http://dir.gpki.go.jp/ApplicationCA.crl">CRL</crl>
      <type>IV/OV</type>
      <document url="http://www.gpki.go.jp/apca/">ApplicationCA Info</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=379657">CP/CPS in English</document>
      <document url="http://www.gpki.go.jp/apca/cpcps/index.html">CP/CPS in Japanese</document>

      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.5, Firefox 3.6">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=474706</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=523434</technical>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>

  <authority name="CNNIC" 
              url="http://www.cnnic.cn/en/index/index.htm" status="included">
    <summary>
     China Internet Network Information Center (CNNIC), the state network information 
     center of China, is a non-profit organization. CNNIC takes orders from the 
     Ministry of Information Industry (MII) to conduct daily business, while it is 
     administratively operated by the Chinese Academy of Sciences (CAS). The CNNIC 
     Steering Committee, a working group composed of well-known experts and commercial 
     representatives in domestic Internet community, supervises and evaluates the structure, 
     operation and administration of CNNIC. The objective customers of the CNNIC root are 
     domain owners from general public, including enterprise, government, organization, 
     league, individual, etc.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.ey.com/global/content.nsf/China_E/home">Ernst and Young</auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=935&amp;file=pdf">Audit Report and Management's Assertions</document>
    </audit>
    <certificate name="CNNIC ROOT" status="included">
      <summary>
      This root has one internally-operated subordinate CA named CNNIC SSL, which offers 
      only SSL certificates that may be issued to general public, including 
      enterprise, government, organization, league, individual, etc.
      </summary>
        <data url="https://bugzilla.mozilla.org/attachment.cgi?id=405525"
        version="3"
        sha1="8b:af:4c:9b:1d:f0:2a:92:f7:da:12:8e:b9:1b:ac:f4:98:60:4b:6f"
        modulus="2048" 
        from="2007-04-16"
        to="2027-04-16"/>
      <crl url="http://www.cnnic.cn/download/crl/CRL1.crl">CRL</crl>
      <type>OV</type>
      <document url="http://www.cnnic.cn/html/Dir/2007/04/29/4568.htm">Policies of the CNNIC Trusted Network Service Center</document>
      <document url="http://www.cnnic.cn/uploadfiles/pdf/2009/7/3/163452.pdf">English CPS of the CNNIC Trusted Network Service Center</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.6, Firefox 3.6.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=476766</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=525008</technical>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>

  <authority name="Buypass" 
              url="http://www.buypass.no" status="included">
    <summary>
     Buypass AS is a public corporation and a leading supplier of secure solutions 
    for electronic identification, electronic signatures and payment in the Nordic 
    countries. Buypass solutions are delivered via the Internet, mobile phones, 
    POS terminals and company internal networks. Buypass has issued electronic 
    IDs to over 2 million of Norway's inhabitants. Buypass is registered with 
    the Post and Telecommunications Authority as the issuer of the qualified ID 
    according to the law on electronic signature. The company is the market 
    leading ID supplier within e-Government services in Norway, provides 
    identification services to all government departments, over 70% of the 
    country’s primary health care services and the entire customer base of 
    the Norsk Tipping (the Norwegian national Lottery). 
    </summary>
    <audit type="WebTrust CA and WebTrust EV">
      <auditor url="http://www.kpmg.com/">KPMG</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=1269">Audit Report and Management's Assertions</document>
    </audit>    
    
    <certificate name="Buypass Class 2 CA 1" status="included">
      <summary>
       This root signs end-entity certificates directly, and does not have 
       subordinate CAs.
       Buypass Class 2 certificates are issued to persons or enterprises and have the 
       same basic usage areas as Class 3 certificates. The Class 2 CP has, however, 
       less strict requirements with respect to identification of the requesting party 
       than Class 3 certificates.
      </summary>
        <data url="https://bugzilla.mozilla.org/attachment.cgi?id=361508"
        version="3"
        sha1="a0:a1:ab:90:c9:fc:84:7b:3b:12:61:e8:97:7d:5f:d3:22:61:d3:cc"
        modulus="2048" 
        from="2006-10-13"
        to="2016-10-13"/>
      <crl url="http://crl.prod.buypass.no/crl/BPClass2CA1.crl">CRL</crl>
      <ocsp>https://ocsp.prod.buypass.no/BPClass2</ocsp>
      <type>OV</type>
      <document url="http://www.buypass.no/Bedrift/Produkter+og+tjenester/SSL/SSL%20dokumentasjon">CP and CPS</document>
      <document url="http://www.buypass.no/_binary?download=true&amp;id=1270">Buypass Class 2 SSL Certificate Policy in English</document>
      <document url="http://www.buypass.no/_binary?download=true&amp;id=1272">Buypass Class 2 SSL Certificate Practice Statement in English</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
          </trust>
      <inclusion date="NSS 3.12.5, Firefox 3.6">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=477028</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=499712</technical>
      </inclusion>
      <comments></comments>
    </certificate>
    <certificate name="Buypass Class 3 CA 1" status="included">
      <summary>
       This root signs end-entity certificates directly, and does not have 
       subordinate CAs.
       The Buypass Class 3 certificates are either issued to persons or enterprises. 
       The certificates may be used for authentication purposes, encryption/decryption
       and/or electronic signatures (non-repudiation). The certificates are part of an 
       infrastructure provided by Buypass AS enabling electronic commerce in Norway.
       The certificates are used by many different service providers ranging from purely 
       commercial companies to governmental and other public institutions including the 
       health sector. 
       Extended Validation SSL certificates will be issued exclusively by Class 3 CA. 
      </summary>
        <data url="https://bugzilla.mozilla.org/attachment.cgi?id=361508"
        version="3"
        sha1="61:57:3a:11:df:0e:d8:7e:d5:92:65:22:ea:d0:56:d7:44:b3:23:71"
        modulus="2048" 
        from="2005-05-09"
        to="2015-05-09"/>
      <crl url="http://crl.prod.buypass.no/crl/BPClass3CA1.crl">CRL</crl>
      <ocsp>https://ocsp.prod.buypass.no/BPClass23</ocsp>
      <type>OV, EV (Policy OID 2.16.578.1.26.1.3.3)</type>
      <document url="http://www.buypass.no/Bedrift/Produkter+og+tjenester/SSL/SSL%20dokumentasjon">CP and CPS</document>
      <document url="http://www.buypass.no/_binary?download=true&amp;id=1271">Buypass Class 3 SSL Certificate Policy in English</document>
      <document url="http://www.buypass.no/_binary?download=true&amp;id=1273">Buypass Class 3 SSL Certificate Practice Statement in English</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
          </trust>
      <inclusion date="NSS 3.12.5, Firefox 3.6">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=477028</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=499712</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=499716</ev>
      </inclusion>
      <comments></comments>
    </certificate>
    
    <certificate name="Buypass Class 2 Root CA" status="included">
      <summary>
      This root has two internally-operated subCAs which sign end-entity certificates.
      Buypass Class 2 certificates are issued to natural persons or enterprises and 
      have the same basic usage areas as Class 3 certificates. The Class 2 CP has, 
      however, less strict requirements with respect to identification of the requesting 
      party than Class 3 certificates. 
      The "Buypass Class 2 CA 1" root certificate is currently included in NSS, as per bug #477028.
      </summary>
      <data url="http://www.buypass.no/cert/BPClass2RootCA-sha2.cer"
            version="3"
            sha1="49:0A:75:74:DE:87:0A:47:FE:58:EE:F6:C7:6B:EB:C6:0B:12:40:99"
            modulus="4096"
            from="2010-10-26"
            to="2040-10-26"/>
      <crl url="http://crl.buypass.no/crl/BPClass2CA2.crl">CRL</crl>
      <ocsp>http://ocsp.buypass.no/ocsp/BPClass2CA2</ocsp>
      <type>OV</type>
      <document url="http://www.buypass.com/home/support/ca-documentation-legal">Document Repository</document>
      <document url="http://www.buypass.com/home/support/ca-documentation-legal/_attachment/16249">Class 2 CP (English)</document>
      <document url="http://www.buypass.com/home/support/ca-documentation-legal/_attachment/16372">Class 2 CPS (English)</document>     
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.13.6, Firefox 16">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=685128</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=752103</technical>
      </inclusion>
      <comments></comments>
    </certificate>
    
    <certificate name="Buypass Class 3 Root CA" status="included">
      <summary>
      This root has two internally-operated subCAs which sign end-entity certificates.
      The Buypass Class 3 qualified certificates are issued to natural persons and the 
      enterprise certificates are issued to organizations. The certificates may be used 
      for authentication purposes, encryption/decryption and/or electronic signatures 
      (non-repudiation). The certificates are part of an infrastructure provided by 
      Buypass AS enabling electronic commerce in Norway. The certificates are used by 
      many different service providers ranging from purely commercial companies to 
      governmental and other public institutions including the health sector. Extended 
      Validation and Business SSL certificates are issued exclusively by the Buypass Class 3 CA. 
      The "Buypass Class 3 CA 1" root certificate is currently included in NSS, as per bug #477028.
      </summary>
      <data url="http://www.buypass.no/cert/BPClass3RootCA-sha2.cer"
            version="3"
            sha1="DA:FA:F7:FA:66:84:EC:06:8F:14:50:BD:C7:C2:81:A5:BC:A9:64:57"
            modulus="4096"
            from="2010-10-26"
            to="2040-10-26"/>
      <crl url="http://crl.buypass.no/crl/BPClass3CA2.crl">CRL</crl>
      <ocsp>http://ocsp.buypass.no/ocsp/BPClass3CA2</ocsp>
      <type>OV, EV (policy OID 2.16.578.1.26.1.3.3)</type>
      <document url="http://www.buypass.com/home/support/ca-documentation-legal">Document Repository</document>
      <document url="http://www.buypass.com/home/support/ca-documentation-legal/_attachment/16251">Class 3 CP (English)</document>
      <document url="http://www.buypass.com/home/support/ca-documentation-legal/_attachment/16255">Class 3 CPS (English)</document>      
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.13.6, Firefox 16">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=685128</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=752103</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=752106</ev>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="Hongkong Post" url="http://www.hongkongpost.gov.hk/index.html" status="included">
    <summary>
     Hongkong Post is a government agency and is a recognized CA under 
     the law of Hong Kong Special Administrative Region (HKSAR) of China, 
     and has been issuing digital certificates under the e_Cert brand name 
     to individuals and organizations of HKSAR since January 2000. 
     Hongkong Post CA operations have been outsourced to E-Mice Solutions. 
     This is documented in the CPS and the Management Assertions. 
     The WebTrust audit covers both Hongkong Post and E-Mice CA operations.
    </summary>
    <audit type="WebTrust">
      <auditor url="http://www.pwc.com/">PricewaterhouseCoopers</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=125">Audit Report and Management Assertions</document>
    </audit>
    <certificate name="Hongkong Post Root CA 1" status="included">
      <summary>
       This root has only one direct subordinate, Hongkong Post e-Cert CA 1, 
       which is the signer key and is used to issue different types of recognized 
       e-Certs to individuals and organizations.  
      </summary>
      <data url="http://www.hongkongpost.gov.hk/product/download/root/img/smartid_rt.cacert"
            version="3"
            sha1="D6:DA:A8:20:8D:09:D2:15:4D:24:B5:2F:CB:34:6E:B2:58:B2:8A:58"
            modulus="2048"
            from="2003-05-15"
            to="2023-05-15"/>
      <crl url="http://crl1.hongkongpost.gov.hk/crl/eCertCA1CRL1.crl">CRL</crl>
      <ocsp><!-- None --></ocsp>
      <type>OV</type>
      <document url="http://www.hongkongpost.gov.hk/product/cps/ecert/img/cps_en23.pdf">Certificate Practice Statement for e-Certs</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.6, Firefox 3.6.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=408949</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=541499</technical>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="Sertifitseerimiskeskus" url="http://www.sk.ee" status="included">
    <summary>
    SK (Certification Centre, legal name AS Sertifitseerimiskeskus) is a 
    commercial CA, covering the Baltic region (Estonia, Lithuania, Latvia). 
    SK is Estonia's primary certification authority, providing certificates 
    for authentication and digital signing to Estonian ID Cards. Established in 
    2001, SK has the backing of Estonian and Nordic financial and telecom sector. 
    SK’s customers include the Estonian court system and notaries, Central Bank 
    and commercial banks, and enforcement organisations (e.g. Police).
    </summary>
    <audit type="ETSI TS 101 456">
      <auditor url="http://www.kpmg.ee/">KPMG Estonia</auditor>
      <document url="http://www.sk.ee/en/repository/audit/">Audit Report</document>
    </audit>
    <certificate name="Juur-SK" status="included">
      <summary>
       This root issues three types of internally operated subordinate CAs. 
       The first type of subordinate CA is used to issue electronic ID cards 
       which contain certificates for digital signature and for digital 
       identification. 
       The second type of subordinate CA is used to issue internal ID cards 
       of the Republic of Estonia. 
       The third type of subordinate CA is used to issue device and SSL certificates.
      </summary>
      <data url="http://www.sk.ee/files/JUUR-SK.der"
            version="3"
            sha1="40:9D:4B:D9:17:B5:5C:27:B6:9B:64:CB:98:22:44:0D:CD:09:B8:89"
            modulus="2048"
            from="2001-08-30"
            to="2016-08-26"/>
      <crl url="http://www.sk.ee/crls">CRL</crl>
      <ocsp><!-- None --></ocsp>
      <type>OV</type>
      <document url="http://www.sk.ee/en/repository">Document Repository</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.6, Firefox 3.6.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=414520</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=532742</technical>
      </inclusion>
      <comments></comments>
    </certificate>
	<certificate name="EE Certification Centre Root CA" status="included">
      <summary>
      This is the renewed root cert that will eventually replace the “Juur-SK” 
      root cert that was included in bug #414520.
      This new root will have the same CA hierarchy as the old “Juur-SK” root.
      The Juur-SK root has three types of internally operated subordinate CAs. 
      The first type of subordinate CA is used to issue electronic ID cards 
      which contain certificates for digital signature and for digital identification. 
      The second type of subordinate CA is used to issue internal ID cards of the Republic of Estonia. 
      The third type of subordinate CA is used to issue device and SSL certificates.
      </summary>
      <data url="http://www.sk.ee/files/EECCRCA.PEM.cer"
            version="3"
            sha1="C9:A8:B9:E7:55:80:5E:58:E3:53:77:A7:25:EB:AF:C3:7B:27:CC:D7"
            modulus="2048"
            from="2010-10-30"
            to="2030-12-17"/>
      <crl url="http://www.sk.ee/crls/eeccrca/eeccrca.crl">CRL</crl>
      <ocsp>http://ocsp.sk.ee</ocsp>
      <type>OV</type>
      <document url="http://www.sk.ee/en/repository">Document Repository</document>
      <document url="http://www.sk.ee/upload/files/SK_CPS_en_v2_5.pdf">Certificate Practice Statement (English)</document>
      <document url="http://www.sk.ee/upload/files/Asutuse_CPv2_2_EN.pdf">CP of Organisation Certificates (English)</document>
      <document url="http://www.sk.ee/file.php?id=511">Certificate Policy for Device Certificates (Estonian)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.14, Firefox 18">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=624356</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=795020</technical>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="Staat der Nederlanden / Logius" url="http://www.logius.nl/english/" status="included">
    <summary>
     Staat der Nederlanden is the Netherlands national government CA. The Dutch 
     governmental PKI hierarchy consists of 2 roots. This first root, Staat der 
     Nederlanden Root CA, is already included in NSS. The second root is the 
     next generation, Staat der Nederlanden Root CA – G2. 
     The organization operating these roots is called Logius as of January 2010, it 
     used to be called GBO.Overheid. Logius is the digital government service of the 
     Netherlands Ministry of the Interior and Kingdom Relations (BZK).
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.kpmg.com/">KPMG</auditor>
      <document url="http://cert.webtrust.org/SealFile?seal=1138&amp;file=pdf">Audit Report and Management Asserstions</document>
   </audit>
    <certificate name="Staat der Nederlanden Root CA - G2" status="included">
      <summary>
       This is the next generation of the Staat der Nederlandend Root CA that 
       is currently in the Mozilla store. The PKIoverheid issues two internally 
       operated subordinate CAs, which issue subordinate CAs to CSPs. The CSPs 
       are commercial and governmental organizations. Each CSP has to prove that 
       it complies with ETSI TS 101 456 and the Dutch law on electronic signatures. 
       CSPs must conclude a contract with a representative of a government 
       organization or commercial company before issuing end-entity certificates. 
       A request for a certificate is always signed by a specified representative 
       of a government organization or commercial company. 
      </summary>
        <data url="https://bugzilla.mozilla.org/attachment.cgi?id=408102"
        version="3"
        sha1="59:af:82:79:91:86:c7:b4:75:07:cb:cf:03:57:46:eb:04:dd:b7:16"
        modulus="4096" 
        from="2008-03-26" 
        to="2020-03-25"/>
      <crl url="http://crl.pkioverheid.nl/">CRL</crl>
      <type>OV</type>
            <document url="http://www.logius.nl/english/products/">Description of PKI Overheid (English)</document>
      <document url="https://www.logius.nl/producten/toegang/pkioverheid/aansluiten/programma-van-eisen/">Schedule of Requirements (Dutch) </document>
      <document url="https://www.logius.nl/producten/toegang/pkioverheid/documentatie/cps/">Certification Practice Statement of the Policy Authority PKI Overheid (Dutch)</document>
      <document url="https://www.logius.nl/producten/toegang/pkioverheid/aansluiten/programma-van-eisen/">CP for CSPs (see Deel 2)</document>
      <document url="https://www.logius.nl/producten/toegang/pkioverheid/documentatie/certificaten-pkioverheid/csp-certificaten">List of CSPs</document>
      <document url="https://www.logius.nl/producten/toegang/pkioverheid/aansluiten/programma-van-eisen/">Certificate Policy for employees of governmental organizations or commercial companies (see Deel 3a)</document>
      <document url="https://www.logius.nl/producten/toegang/pkioverheid/aansluiten/programma-van-eisen/">Certificate Policy for SSL services of governmental organizations or commercial companies (see Deel 3b)</document>
      <document url="https://www.logius.nl/producten/toegang/pkioverheid/aansluiten/programma-van-eisen/">Certificate Policy for personal use of civilians (see Deel 3c)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="email" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.6, Firefox 3.6.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=436056</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=529874</technical>
      </inclusion>
      <comments>
      The email trust bit was approved in bug #551399 and enabled in bug #670790.
      </comments>
    </certificate>
  </authority>

<authority name="Disig" url="http://www.disig.eu" status="included">
    <summary>
    Disig is a public Certification Service Provider, located in Slovakia. 
    Disig is a member of international ASSECO Group, one of the strongest 
    software houses in the CEE region. Asseco is a leader in selected IT 
    segments in countries across Central and Eastern Europe. 
    </summary>
    <audit type="ETSI 102.042">
      <auditor url="http://www.scientia.sk/">Scientia</auditor>
      <document url="https://bug455878.bugzilla.mozilla.org/attachment.cgi?id=418236">Audit Statement</document>
   </audit>
    <certificate name="CA Disig" status="included">
      <summary>
      This root has no subordinate CAs, issuing end-entity certs 
      for SSL, email, and code signing directly.
      </summary>
        <data url="http://www.disig.eu/ca/cert/ca_disig.der"
        version="3"
        sha1="2a:c8:d5:8b:57:ce:bf:2f:49:af:f2:fc:76:8f:51:14:62:90:7a:41"
        modulus="2048" 
        from="2006-03-21" to="2016-03-21"/>
      <crl url="http://www.disig.eu/ca/crl/ca_disig.crl">CRL</crl>
      <type>OV</type>
      <document url="http://www.disig.eu/_pdf/cp-disig.pdf">CP Version 4.0 (Slovak)</document>
      <document url="http://www.disig.sk/_pdf/cps_ra_cadisig.pdf">CPS Version 4.0 (Slovak)</document>
      <document url="https://bug455878.bugzilla.mozilla.org/attachment.cgi?id=384717">CP Version 3.4 (English)</document>
      <document url="http://www.disig.eu/index.php?id=ca&amp;L=1">Disig Certification Authority Website</document>
      <document url="http://www.disig.eu/_pdf/bp-disig.pdf">Security Policy (Slovak)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="email" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.6, Firefox 3.6.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=455878</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=539235</technical>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="NetLock" 
              url="http://www.netlock.hu/USEREN/index.html" status="included">
    <summary>
     NetLock Ltd. is a qualified Certificate Authority in Hungary that issues certificates to organizations and individuals.
    </summary>
    <audit type="ETSI TS 101.456, ETSI 102.042">
      <auditor url="http://webold.nhh.hu/esign/setLanguageAction.do?lang=en">National Communications Authority, Hungary</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=365687">Statement of audit conformance in English</document>
      <document url="http://webold.nhh.hu/esign/szolgReszlet/init.do?tipus=mi&amp;azon=12201521-2-41">Statement of the NCA that Netlock is a Qualified Service Provider</document>
    </audit>
    <audit type="ETSI TS 101.456, ETSI 102.042">
      <auditor url="http://www.cert-hungary.hu">CERT-Hungary</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=378081">Cover letter of the rDSP audit in Hungarian</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=378711">English Translation of part of the rDSP Audit Report</document>
   </audit>
    <certificate name="NetLock Arany (Class Gold) Főtanúsítvány" status="included">
      <summary>
       NetLock currently has four separate root CAs included in NSS. The redesigned 
       equivalent of these existing roots will be created under this new root. 
       The new root will sign seven internally-operated subordinate CAs. Two of those 
       subordinate CAs will sign sub-CAs that will be externally-operated by 
       MKB (Hungarian Trade Bank) and MNB (National Bank of Hungary). 
      </summary>
        <data url="https://bugzilla.mozilla.org/attachment.cgi?id=365241"
        version="3"
        sha1="06:08:3f:59:3f:15:a1:04:a0:69:a4:6b:a9:03:d0:06:b7:97:09:91"
        modulus="2048" 
        from="2008-12-11"
        to="2028-12-06"/>
      <crl url="http://crl1.netlock.hu/index.cgi?crl=cbca">CRL for Class B</crl>
      <ocsp>http://ocsp1.netlock.hu/gold.cgi</ocsp>
      <type>OV</type>
      <document url="https://bug480966.bugzilla.mozilla.org/attachment.cgi?id=374930">CA Hierarchy</document>
      <document url="http://www.netlock.hu/USEREN/html/dok.html">Practice Statements and Terms of Agreements in Hungarian</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=364923">CPS in English</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=366607">Verification Practice for Non-Qualified certificates </document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=366794">Non-qualified certificate CRL and OCSP profile definitions</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=366795">Certificate Issuance Practice Statement</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="email" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.6, Firefox 3.6.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=480966</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=532201</technical>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="JCSI" 
              url="http://www.jcsinc.co.jp/english/index.html" status="included">
    <summary>
    Japan Certification Services, Inc. (JCSI) is a commercial CA whose primary 
    market is Japan. Some of the relying parties are outside Japan, such as US, 
    Canada, European countries, and Asia. 
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.ey.com/">Ernst and Young ShinNihon LLC</auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=908&amp;file=pdf">Audit Report and Management’s Assertions</document>
    </audit>
    <certificate name="SecureSign RootCA11" status="included">
      <summary>
      This root has one internally-operated subordinate CA for issuing SSL 
      certificates to the public. In the future, JCSI plans to add other 
      internally-operated subordinate CAs for S/MIME, Time Stamping, and other 
      certificate types.
      </summary>
        <data url="https://www2.jcsinc.co.jp/repository/certs/SSAD-rca.der"
        version="3"
        sha1="3B:C4:9F:48:F8:F3:73:A0:9C:1E:BD:F8:5B:B1:C3:65:C7:D8:11:B3"
        modulus="2048" 
        from="2009-04-07"
        to="2029-04-07"/>
      <crl url="http://ssignadcrl01.jcsinc.co.jp/repository/crl/rca.crl">CRL</crl>
      <ocsp><!-- None --></ocsp>
      <type>OV</type>
      <document url="http://www.jcsinc.co.jp/english/repository/index.html">Repository</document>
      <document url="https://www2.jcsinc.co.jp/repository/SSAD-CPS-en.pdf">CP/CPS in English</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
          </trust>
      <inclusion date="NSS 3.12.6, Firefox 3.6.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=496863</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=542798</technical>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="EDICOM" 
              url="http://acedicom.edicomgroup.com/en/index.htm" status="included">
    <summary>
     The Edicom Certification Authority (ACEDICOM) provides companies, communities 
     and physical persons with secure electronic identification mechanisms that 
     enable them to engage in activities where the digital signature replaces the 
     handwritten with identical legal guarantees. To this end, ACEDICOM issues 
     certificates in accordance with the stipulations of Directive 1999/93/EC of 
     13th December 1999 and Law 59/2003 of 19th December, on electronic signature, 
     and so has sufficient recognition to operate in all countries of the European 
     Union. The Edicom CA is responsible for obtaining the corresponding official 
     authorisation in those places outside the Union where it operates commercially.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.ey.com/es">Ernst and Young</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=1001">Audit Report and Management's Assertsions</document>
    </audit>
    
    <certificate name="ACEDICOM Root" status="included">
      <summary>
      This root has three internally-operated subordinate CAs. The ACEDICOM 01 
      subordinate CA issues Qualified certificates for identification and advanced 
      electronic signature, for the use of physical persons or legal organisations. 
      The ACEDICOM 02 subordinate CA issues certificates for purposes other than 
      Qualified electronic signature. The ACEDICOM Servidores subordinate CA issues 
      server/client certificates and code signing certificates.
      </summary>
        <data url="http://acedicom.edicomgroup.com/archivos/certificados/ACEDICOM%20Root.crt"
        version="3"
        sha1="e0:b4:32:2e:b2:f6:a5:68:b6:54:53:84:48:18:4a:50:36:87:43:84"
        modulus="4096" 
        from="2008-04-18"
        to="2028-04-13"/>
      <crl url="http://acedicom.edicomgroup.com/rootca.crl">Root CRL</crl>
      <ocsp>http://ocsp.acedicom.edicomgroup.com/acedicom01</ocsp>
      <type>OV</type>
      <document url="http://acedicom.edicomgroup.com/en/archivos/politicas/ACEDICOM_CertificationPractice.pdf">CPS in English</document>
      <document url="http://acedicom.edicomgroup.com/es/archivos/politicas/ACEDICOM_PracticasCertificacion.pdf">CPS in Spanish</document>
      <document url="http://acedicom.edicomgroup.com/en/contenidos/practicasyPoliticas/punto1.htm">Declaration of Certification Practices and Policies according to Certificate Type</document>
      <document url ="http://acedicom.edicomgroup.com/es/archivos/politicas/ACEDICOM%20-%20Politica%20Certificados%20TLS.pdf">TLS Certificate Policy (in Spanish)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="email" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.7, Firefox 3.6.7">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=471045</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=550521</technical>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
   <authority name="E-Guven" url="http://www.e-guven.com" status="included">
    <summary>
      E-Guven is a private corporation that serves certificates mainly the 
      Turkish market and they plan to expand their market to other countries.
      E-Guven certificates are used in Public projects, such as www.turkiye.gov.tr,
      and Mobile Signature as well. 
      E-Guven also develops B2B secure transaction projects.
    </summary>
    <audit type="ETSI 101.456">
      <auditor url="http://www.tk.gov.tr">Republic of Turkey Telecommunicatins Authority</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=421006">Audit Statement</document>
    </audit>
    <certificate name="e-Guven Kok Elektronik Sertifika Hizmet Saglayicisi" status="included">
      <summary>
       This root certificate signs SSL certificates directly. 
       Additionally, this root has the following three intermediate CAs: 
       E-Guven Mobile CA issues mobile certificates for end users; 
       E-Guven NES CA issues qualified electronic certificates for Turkish citizens; 
       and E-Guven Secure Client Certificates issues Class 3 certificates. 
       All of the intermediate CAs chaining up to this root are operated internally 
       by e-Guven.
      </summary>
        <data url="https://bugzilla.mozilla.org/attachment.cgi?id=367292"
        version="3"
        sha1="dd:e1:d2:a9:01:80:2e:1d:87:5e:84:b3:80:7e:4b:b1:fd:99:41:34"
        modulus="2048" 
        from="2007-01-04"
        to="2017-01-04"/>
      <crl url="http://sil.e-guven.com/ElektronikBilgiGuvenligiASSSLClient/LatestCRL.crl">CRL</crl>
      <ocsp>http://ocsp2.e-guven.com/ocsp.xuda</ocsp>
      <type>OV</type>
      <document url="https://bug476428.bugzilla.mozilla.org/attachment.cgi?id=360065">CA Hierarchy</document>
      <document url="http://www.e-guven.com/default.asp?ID=52">E-Guven Document Repository</document>
      <document url="http://www.e-guven.com/Documents/genel_kullanima_iliskin_nes_ilkeleri.pdf">Qualified Electronic CP (GKNESI) in Turkish</document>
      <document url="http://www.e-guven.com/documents/SUE_v1.2.pdf">SSL Cert Application Basics (SUE) in Turkish</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="email" startdate="" enddate=""/>
          </trust>
      <inclusion date="NSS 3.12.8, Firefox 3.6.12">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=476428</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=571932</technical>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>

  <authority name="Izenpe" url="http://www.izenpe.com/"    status="included">
    <summary>Izenpe is owned by the government of the Basque country, Spain.</summary>
    <audit type="ETSI TS 101.456">
      <auditor url="http://www.bsi-global.com/ClientDirectory">BSI Management Systems</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=401406">ETSI Certificate</document>
    </audit>
    <audit type="WebTrust EV Readiness">
      <auditor url="http://www.kpmg.com/">KPMG</auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=1017&amp;file=pdf">Audit Report and Management Assertions</document>
    </audit>
    <certificate name="Izenpe.com" status="included">
      <summary>
       This SHA256 root has five internally-operated subordinate CAs. 
       One sub-CA issues EV SSL certs. Two of the sub-CAs are for Qualified certificates, 
       one for Public Administration, and one for Citizens and Entities.  There are also 
       two sub-CAs for non-Qualified certificates, one for Public Administration and one 
       for Citizens and Entities, which issue SSL Server, Email, and Code Signing certs.</summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=385230"
            version="3"
            sha1="2F:78:3D:25:52:18:A7:4A:65:39:71:B5:2C:A2:9C:45:15:6F:E9:19"
            modulus="4096"
            from="2007-12-13"
            to="2037-12-13"/>
      <crl url="http://crl.izenpe.com/cgi-bin/crl2">CRL</crl>
      <ocsp>http://ocsp.izenpe.com:8097</ocsp>
      <type>OV, EV (Policy OID 1.3.6.1.4.1.14777.6.1.1)</type>
      <document url="https://servicios.izenpe.com/jsp/descarga_ca/s27descarga_ca_c.jsp">CA Hierarchy</document>
      <document url="http://www.izenpe.com/cps">Links to CPS in Spanish, Basque, and English</document>
      <document url="http://www.izenpe.com/s15-12020/es/contenidos/informacion/descarga_certificados/es_url/adjuntos/DPC%20V4%206-EN.pdf">CPS in English</document>
      <document url="http://www.izenpe.com/s15-12020/es/contenidos/informacion/descarga_certificados/es_url/adjuntos/DPC%20V4.6%20castellano.pdf">CPS in Spanish</document>
      <document url="http://www.izenpe.com/s15-12020/es/contenidos/informacion/solicitar_certificado_digital/es_solicita/solicitar_certificado_digital.html">Certificate Specific Documentation</document>
      <document url="http://www.izenpe.com/s15-12020/es/contenidos/informacion/solicitar_certificado_digital/es_solicita/adjuntos/Documentaci%C3%B3n%20espec%C3%ADfica%20%20SSL%20EV%20castellano_nov09.pdf">Procedures for EV SSL Secure Server Certificates (Spanish)</document>
      <document url="http://www.izenpe.com/s15-12020/es/contenidos/informacion/solicitar_certificado_digital/es_solicita/adjuntos/Documentaci%C3%B3n%20espec%C3%ADfica%20SSL%20castellano_nov09.pdf">Procedures for Secure Server Certificates (Spanish)</document>
      <document url="http://www.izenpe.com/s15-12020/es/contenidos/informacion/solicitar_certificado_digital/es_solicita/adjuntos/Procedimiento_Firma_C%C3%B3digo_castellano_06-03-24.pdf">Procedures for Code Signing Certificates (Spanish)</document>
      <document url="http://www.izenpe.com/s15-12020/es/contenidos/informacion/solicitar_certificado_digital/es_solicita/adjuntos/Documentaci%C3%B3n%20Espec%C3%ADfica%20Corporativo%20reconocido%20castellano_nov09.pdf">Procedures for Corporate Certificates (Spanish)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.9, Firefox 4.0">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=361957</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=578491</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=578499</ev>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>

<authority name="Camerfirma" url="http://www.camerfirma.com" status="included">
    <summary>
    AC Camerfirma S.A. is a commercial CA issuing certificates for companies 
    primarily in Spain. Camerfirma is the digital certification authority for 
    Chambers of Commerce in Spain.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.ey.com/">Ernst and Young</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=874">Audit Report and Management's Assertions</document>
    </audit>
        <audit type="WebTrust EV">
      <auditor url="http://www.ey.com/">Ernst and Young</auditor>
      <document url="http://docs.camerfirma.com/mod_web/usuarios/pdf/Informe_agrupado_Camerfirma_WebTrust_EV.pdf">Audit Report and Management's Assertions (Spanish)</document>
      <document url="http://docs.camerfirma.com/mod_web/usuarios/pdf/Informe_agrupado_Camerfirma_EV_English.pdf">Audit Report and Management's Assertions (English)</document>
    </audit>
    <certificate name="Chambers of Commerce Root - 2008" status="included">
      <summary>
       This CA has internally-operated subordinate CAs that issue certificates 
       for Spanish companies and representatives. Chambers of Commerce act as RAs 
       for end user registration.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=339325"
            version="3"
            sha1="78:6a:74:ac:76:ab:14:7f:9c:6a:30:50:ba:9e:a8:7e:fe:9a:ce:3c"
            modulus="4096"
            from="2008-08-01"
            to="2038-07-31"/>
      <crl url="http://crl.camerfirma.com/camerfirma_cserver-2009.crl">CRL</crl>
      <ocsp>http://ocsp.camerfirma.com</ocsp>
      <type>OV, EV (Policy OIDs 1.3.6.1.4.1.17326.10.14.2.1.2 and 1.3.6.1.4.1.17326.10.14.2.2.2) </type>
      <document url="http://policy.camerfirma.com/">Policy Repository</document>
      <document url="http://www.camerfirma.com/mod_web/usuarios/politicas/CPS_V_3_2_1.pdf">Certificate Practice Statement (Spanish)</document>
      <document url="http://policy.camerfirma.com/politicas/PC_Camerfirma_Express_Corporate_Server_1_0_1.pdf">Certification Policy Camerfirma Express Corporate Server (Spanish)</document>
      <document url="http://www.camerfirma.com/mod_web/usuarios/pdf/PC_Camerfirma_Corporate_Server_EV_1_0.pdf">Certification Policy for Camerfirma Corporate Server EV (Spanish)</document>
      <document url="http://policy.camerfirma.com/politicas/PC_Camerfirma_CodeSign_1_0_1.pdf">Certification Policy for Code Signing (Spanish)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.9, Firefox 4.0">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=406968</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=562395</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=562399</ev>
      </inclusion>
      <comments></comments>
    </certificate>
    <certificate name="Global Chambersign Root - 2008" status="included">
      <summary>
       This CA has internally-operated subordinate CAs that issue certificates for 
       general use globally. Other companies act as RAs for end user registration.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=339324"
            version="3"
            sha1="4a:bd:ee:ec:95:0d:35:9c:89:ae:c7:52:a1:2c:5b:29:f6:d6:aa:0c"
            modulus="4096"
            from="2008-08-01"
            to="2038-07-31"/>
      <crl url="http://crl.camerfirma.com/racer-2009.crl">CRL</crl>
      <ocsp>http://ocsp.camerfirma.com</ocsp>
      <type>OV, EV (Policy OIDs 1.3.6.1.4.1.17326.10.8.12.1.2 and 1.3.6.1.4.1.17326.10.8.12.2.2)</type>
      <document url="http://policy.camerfirma.com/">Policy Repository</document>
      <document url="http://www.camerfirma.com/mod_web/usuarios/politicas/CPS_V_3_2_1.pdf">Certificate Practice Statement (Spanish)</document>
      <document url="http://policy.camerfirma.com/pdf/PC_RACER_1_2_1.pdf">CP of RACER sub-CA (Spanish)</document>
      <document url="http://policy.camerfirma.com/politicas/PC_Camerfirma_Express_Corporate_Server_1_0_1.pdf">Certification Policy Camerfirma Express Corporate Server (Spanish)</document>
      <document url="http://www.camerfirma.com/mod_web/usuarios/pdf/PC_Camerfirma_Corporate_Server_EV_1_0.pdf">Certification Policy for Camerfirma Corporate Server EV (Spanish)</document>
      <document url="http://policy.camerfirma.com/politicas/PC_Camerfirma_CodeSign_1_0_1.pdf">Certification Policy for Code Signing (Spanish)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.9, Firefox 4.0">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=406968</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=562395</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=562399</ev>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="Unizeto Certum" url="http://www.certum.eu/" status="included">
    <summary>
     Broader Certification Center (CERTUM) is an organizational unit of Unizeto Technologies SA, 
     providing certification services related to electronic signatures. It is the oldest public 
     certification authority in Poland and the commercial certification authority, operating on 
     a global scale - serving customers in over 50 countries worldwide.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.ey.com/pl">Ernst &amp; Young</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=1072">Audit Report and Management’s Assertions</document>
    </audit>
    <audit type="WebTrust EV">
      <auditor url="http://www.ey.com/pl">Ernst &amp; Young</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=1140">Audit Report and Management’s Assertions</document>
    </audit>
    <certificate name="Certum Trusted Network CA" status="included">
      <summary>
       This root currently has two internally-operated sub-CAs; the Certum Class 1 sub-CA signs 
       3 month test certs, and the Certum Extended Validation CA signs EV SSL certs.
       Eventually, the certificates under the old “Certum CA” root (included in NSS) will be 
       moved to this new root. The sub-CAs of the “Certum CA” root are Certum Level I CA, 
       Certum Level II CA, Certum Level III CA, Certum Level IV CA, and Certum Partners CA.
      </summary>
      <data url="http://repository.certum.pl/CTNCA.crt"
            version="3"
            sha1="07:E0:32:E0:20:B7:2C:3F:19:2F:06:28:A2:59:3A:19:A7:0F:06:9E"
            modulus="2048"
            from="2008-10-22"
            to="2029-12-31"/>
      <crl url="http://crl.certum.pl/ctnca.crl">CRL</crl>
      <ocsp>http://evca.ocsp.certum.pl</ocsp> 
      <type>DV, OV, EV (policy OID 1.2.616.1.113527.2.5.1.1)</type>
      <document url="http://www.certum.pl/repository">Certum Cert and Document Repository</document>
      <document url="http://www.certum.eu/upload_module/downloads/certum/dokumenty/kodeks_postepowania_certyfikacyjnego/Certum_CPS_v3_1.pdf">CPS of CERTUM’s Non-Qualified Certification Services (English)</document>
      <document url="http://www.certum.eu/upload_module/downloads/certum/dokumenty/polityka_certyfikacji/Certum_CP_v3_1.pdf">CP of CERTUM’s Non-Qualified Certification Services (English)</document>
      <document url="http://www.certum.eu/upload_module/downloads/certum/dokumenty/kodeks_postepowania_certyfikacyjnego/Certum_CPS_v3_1_EV.pdf">EV CP (English)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.10, Firefox 6.0">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=532377</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=635385</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=635390</ev>
      </inclusion>
    </certificate>
  </authority>
  
  <authority name="Trend Micro / AffirmTrust" url="http://www.affirmtrust.com/" status="included">
    <summary>
    AffirmTrust is a wholly-owned subsidiary of Trend Micro, Inc.
    AffirmTrust offers certificates 
    for web-based and mobile applications including microbanking, debit cards and smartcards, mobile phone 
    applications, new media, cloud computing, social networking, etc. 
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.grantthornton.com">Grant Thornton</auditor>
      <document url="http://www.affirmtrust.com/images/AffirmTrust%20WebTrust%20Independent%20Practitioner%20Report%20as%20of%201-31-2011.pdf">Audit Report</document>
    </audit>
    <audit type="WebTrust EV">
      <auditor url="http://www.grantthornton.com">Grant Thornton</auditor>
      <document url="http://www.affirmtrust.com/images/AffirmTrust%20EV%20WebTrust%20Independent%20Practitioner%20Report%20as%20of%201-31-2011.pdf">Audit Report</document>
    </audit>
    <certificate name="AffirmTrust Commercial" status="included">
      <summary> 
      This root will sign internally-operated sub-CAs which will sign end-entity certificates. 
      AffirmTrust initially plans to only issue EV SSL certificates, but may in the future issue DV SSL, 
      OV SSL, email (S/MIME), and code signing certificates under different sub-CAs.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=425501"
            version="3"
            sha1="F9:B5:B6:32:45:5F:9C:BE:EC:57:5F:80:DC:E9:6E:2C:C7:B2:78:B7"
            modulus="2048"
            from="2010-01-29"
            to="2030-12-31"/>
      <crl url="http://crl.affirmtrust.com/crl/AffirmTrustCommercial.crl">CRL</crl>
      <ocsp>http://ocsp.affirmtrust.com/commev</ocsp>
      <type>DV, OV, EV (Policy OID 1.3.6.1.4.1.34697.2.1)</type>
      <document url="https://ssl.trendmicro.com/en/resources/">Trend Micro SSL document repository</document> 
      <document url="http://www.affirmtrust.com/resources/">AffirmTrust document repository</document> 
      <document url="http://www.affirmtrust.com/repo/AffirmTrust_CPS_v1.1_12-23-2010.pdf">AffirmTrust Certification Practice Statement (English)</document>
      <document url="http://www.affirmtrust.com/repo/AffirmTrust_Relying_Party_Agreement_v1.1_12-23-2010.pdf">AffirmTrust Relying Party Agreement (English)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.10, Firefox 6.0">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=543639</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=633546</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=633552</ev>
      </inclusion>
    </certificate>
    <certificate name="AffirmTrust Networking" status="included">
      <summary> 
      This root will sign internally-operated sub-CAs which will sign end-entity certificates. 
      AffirmTrust initially plans to only issue EV SSL certificates, but may in the future issue DV SSL, 
      OV SSL, email (S/MIME), and code signing certificates under different sub-CAs.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=425506"
            version="3"
            sha1="29:36:21:02:8B:20:ED:02:F5:66:C5:32:D1:D6:ED:90:9F:45:00:2F"
            modulus="2048"
            from="2010-01-29"
            to="2030-12-31"/>
      <crl url="http://crl.affirmtrust.com/crl/AffirmTrustNetworking.crl">CRL</crl>
      <ocsp>http://ocsp.affirmtrust.com/ntwkev</ocsp>
      <type>DV, OV, EV (Policy OID 1.3.6.1.4.1.34697.2.2)</type>
      <document url="http://www.affirmtrust.com/resources/">AffirmTrust document repository</document> 
      <document url="http://www.affirmtrust.com/repo/AffirmTrust_CPS_v1.1_12-23-2010.pdf">AffirmTrust Certification Practice Statement (English)</document>
      <document url="http://www.affirmtrust.com/repo/AffirmTrust_Relying_Party_Agreement_v1.1_12-23-2010.pdf">AffirmTrust Relying Party Agreement (English)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.10, Firefox 6.0">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=543639</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=633546</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=633552</ev>
      </inclusion>
    </certificate>
    <certificate name="AffirmTrust Premium" status="included">
      <summary> 
      This root will sign internally-operated sub-CAs which will sign end-entity certificates. 
      AffirmTrust initially plans to only issue EV SSL certificates, but may in the future issue DV SSL, 
      OV SSL, email (S/MIME), and code signing certificates under different sub-CAs.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=425507"
            version="3"
            sha1="D8:A6:33:2C:E0:03:6F:B1:85:F6:63:4F:7D:6A:06:65:26:32:28:27"
            modulus="4096"
            from="2010-01-29"
            to="2040-12-31"/>
      <crl url="http://crl.affirmtrust.com/crl/AffirmTrustPremium.crl">CRL</crl>
      <ocsp>http://ocsp.affirmtrust.com/premev</ocsp>
      <type>DV, OV, EV (Policy OID 1.3.6.1.4.1.34697.2.3)</type>
      <document url="http://www.affirmtrust.com/resources/">AffirmTrust document repository</document> 
<document url="http://www.affirmtrust.com/repo/AffirmTrust_CPS_v1.1_12-23-2010.pdf">AffirmTrust Certification Practice Statement (English)</document>
      <document url="http://www.affirmtrust.com/repo/AffirmTrust_Relying_Party_Agreement_v1.1_12-23-2010.pdf">AffirmTrust Relying Party Agreement (English)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.10, Firefox 6.0">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=543639</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=633546</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=633552</ev>
      </inclusion>
    </certificate>
    <certificate name="AffirmTrust Premium ECC" status="included">
      <summary> 
      This root will sign internally-operated sub-CAs which will sign end-entity certificates. 
      AffirmTrust initially plans to only issue EV SSL certificates, but may in the future issue DV SSL, 
      OV SSL, email (S/MIME), and code signing certificates under different sub-CAs.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=425513"
            version="3"
            sha1="B8:23:6B:00:2F:1D:16:86:53:01:55:6C:11:A4:37:CA:EB:FF:C3:BB"
            modulus="Elliptic Curve secp384r1"
            from="2010-01-29"
            to="2040-12-31"/>
      <crl url="http://crl.affirmtrust.com/crl/AffirmTrustPremiumECC.crl">CRL</crl>
      <ocsp>http://ocsp.affirmtrust.com/premeccev</ocsp>
      <type>DV, OV, EV (Policy OID 1.3.6.1.4.1.34697.2.4)</type>
      <document url="http://www.affirmtrust.com/resources/">AffirmTrust document repository</document> 
      <document url="http://www.affirmtrust.com/repo/AffirmTrust_CPS_v1.1_12-23-2010.pdf">AffirmTrust Certification Practice Statement (English)</document>
      <document url="http://www.affirmtrust.com/repo/AffirmTrust_Relying_Party_Agreement_v1.1_12-23-2010.pdf">AffirmTrust Relying Party Agreement (English)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.10, Firefox 6.0">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=543639</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=633546</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=633552</ev>
      </inclusion>
    </certificate>
  </authority>

<authority name="ACCV" url="http://www.pki.gva.es/"  status="included">
    <summary>
      ACCV (Autoritat de Certificacio de la Comunitat Valenciana) is 
      a CA operated by the government of the Valencia region of Spain.
      ACCV is a public certificate service provider and the intended use 
      for this root certificate is to improve the electronic administration 
      between citizens and the administration.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.dnbcons.com/">DNB</auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=1142&amp;file=pdf"> Audit Report and Management's Assertions </document>
    </audit>

    <certificate name="Root CA Generalitat Valenciana" status="included">
      <summary>
      This root has four internally-operated subordinate CAs which sign 
      end-entity certificates for individuals and organizations.
      </summary>
      <data url="http://www.pki.gva.es/gestcert/rootca.crt"
            version="3"
            sha1="A0:73:E5:C5:BD:43:61:0D:86:4C:21:13:0A:85:58:57:CC:9C:EA:46"
            modulus="2048"
            from="2001-07-06"
            to="2021-07-01">
      </data>
      <crl url="http://www.pki.gva.es/gestcert/rootgva_der.crl">CRL</crl>
      <ocsp>http://ocsp.pki.gva.es/</ocsp>
      <type>DV, IV</type>
      <document url="http://www.accv.es/quienes-somos/practicas-y-politicas-de-certificacion/"> ACCV Document Repository </document>
      <document url="http://www.accv.es/fileadmin/Archivos/Practicas_de_certificacion/ACCV-CPS-V2.1.pdf"> ACCV Certification Practice Statement (Spanish)</document>
      <document url="http://www.accv.es/quienes-somos/practicas-y-politicas-de-certificacion/politicas-de-certificacion/"> ACCV Certification Policy Documents listed by certificate usage</document>
      <document url="http://www.accv.es/fileadmin/Archivos/Politicas_pdf/PKIGVA-CP-03V2.0-c2010.pdf"> SSL CP (Spanish)</document>
      <document url="http://www.accv.es/fileadmin/Archivos/Politicas_pdf/PKIGVA-CP-04V2.0-c.pdf"> Code Signing CP (Spanish)</document>
      <document url="http://www.accv.es/fileadmin/Archivos/Politicas_de_certificacion/ACCV-CP-13V2.0-c.pdf"> Qualified Certs CP for Public Employees (Spanish)</document>
      <document url="http://www.accv.es/fileadmin/Archivos/politicas_certificacion/ACCV-CP-07V4.0-c.pdf"> Qualified Certs CP for Citizens (Spanish)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.11, Firefox 6.0.2">
        <authorisation>http://bugzilla.mozilla.org/show_bug.cgi?id=274100</authorisation>
        <technical>http://bugzilla.mozilla.org/show_bug.cgi?id=653761</technical>
      </inclusion>
    </certificate>
  </authority>

<authority name="TWCA" url="http://www.twca.com.tw/Portal/english/coporate_profile/mission.html" status="included">
    <summary>
     Taiwan CA. Inc. (TWCA) is a commercial CA that provides a consolidated on-line 
     financial security certificate service and a sound financial security environment, 
     to ensure the security of on-line finance and electronic commercial trade in Taiwan.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.dfk.com/">SunRise CPAs’ Firm, a member firm of DFK</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=900">Audit Report and Management's Assertsions</document>
    </audit>
    <certificate name="TWCA Root Certification Authority" status="included">
      <summary>
      This root has four internally-operated subordinate CAs according to their application and usage.
            </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=402647"
            version="3"
            sha1="cf:9e:87:6d:d3:eb:fc:42:26:97:a3:b5:a3:7a:a0:76:a9:06:23:48"
            modulus="2048"
            from="2008-08-28"
            to="2030-12-31"/>
      <crl url="http://RootCA.twca.com.tw/TWCARCA/revoke_2048.crl">CRL</crl>
      <ocsp><!-- None --></ocsp>
      <type>OV</type>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=426285">CA Hierarchy Diagram</document>
      <document url="http://www.twca.com.tw/Portal/english/coporate_profile/Repository.html">Document Repository</document>
      <document url="http://www.twca.com.tw/picture/file/20110610-162851208.pdf">TWCA UCA CPS (Chinese)</document>
      <document url="http://www.twca.com.tw/picture/file/20110523-180517756.pdf">TWCA UCA CPS (English)</document>
      <document url="http://www.twca.com.tw/picture/file/20090806-171745500.pdf">TWCA PKI Certificate Policy (Chinese)</document>
      <document url="http://www.twca.com.tw/picture/file/20100910-115805367.pdf">TWCA PKI Certificate Policy (English)</document>
      <document url="http://www.twca.com.tw/picture/file/20090114-11212952.pdf">TWCA Root CA Certification Practice Statement (Chinese)</document>
      <document url="http://www.twca.com.tw/picture/file/20100114-180956726.pdf">TWCA Root CA Certification Practice Statement (English)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.11, Firefox 6.0.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=518503</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=666681</technical>
      </inclusion>
    </certificate>
  </authority>

<authority name="A-Trust" url="https://www.a-trust.at/" status="included">
    <summary>
      A-Trust is an accredited TrustCenter in Austria issuing smartcard based qualified 
      certificates for Austrian citizens used in eGovernment. A-Trust has been accredited 
      according to the Austrian Signature Law by Telekom-Control-Kommission, the Austrian 
      supervisory body.
      A-Trust’s product range comprises user certificates, developer certificates and corporate 
      certificates as well as consultation services and support with  the development of 
      e-commerce and signature applications in accordance with the Directive 1999/93/EC.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.ey.com/">Ernst &amp; Young</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=1016">Audit Report and Management's Assertions</document>
    </audit>
    <audit type="WebTrust EV Readiness">
      <auditor url="http://www.ey.com/">Ernst &amp; Young</auditor>
      <document url="https://trusties.a-trust.at/ev.pdf">Audit Report and Management's Assertions</document>
    </audit>
    <certificate name="A-Trust-nQual-03" status="included">
      <summary>
       This root has internally-operated intermediate CAs that issue smartCard-based certificates to a natural 
       person after a face-to-face identification (eg.: email), software certificates (pKCS#12), and
       server certificates (eg. SSL and EV SSL).</summary>
      <data url="http://www.a-trust.at/certs/A-Trust-nQual-03.crt"
            version="3"
            sha1="D3:C0:63:F2:19:ED:07:3E:34:AD:5D:75:0B:32:76:29:FF:D5:9A:F2"
            modulus="2048"
            from="2005-08-17"
            to="2015-08-17"/>
      <crl url="http://www.a-trust.at/html/crl_download.asp?CA=a-trust-nqual&amp;vers=-03">CRL</crl>
      <ocsp>http://ocsp.a-trust.at/ocsp</ocsp>
      <type>OV, EV (Policy OID 1.2.40.0.17.1.22) </type>
      <document url="https://www.a-trust.at/docs/cp">Full list of CP documents</document>
      <document url="http://www.a-trust.at/docs/cp/a-sign-ssl/a-sign-ssl.pdf">SSL CP (German)</document>
      <document url="http://www.a-trust.at/docs/CP/a-sign-ssl-ev/a-sign-ssl-ev.pdf">EV SSL CP (German)</document>
      <document url="https://www.a-trust.at/docs/cps">Full list of CPS documents</document>
      <document url="http://www.a-trust.at/docs/cps/a-sign-ssl/a-sign-ssl_cps.pdf">SSL CPS (German)</document>
      <document url="http://www.a-trust.at/docs/CPS/a-sign-ssl-ev/a-sign-ssl-ev_cps.pdf">EV SSL CPS (German)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.11, Firefox 6.0.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=530797</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=661672</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=661681</ev>
      </inclusion>
    </certificate>
    </authority>
    
    <authority name="Certinomis" url="http://www.certinomis.com" status="included">
    <summary>
     Certinomis is a commercial CA that delivers certificates to the general public in France, and is the 
     Certificate Service Provider of the French Postal Service. 
    </summary>
    <audit type="ETSI 101 456">
      <auditor url="http://www.lsti-certification.fr">LSTI</auditor>
      <document url="http://www.lsti-certification.fr/index.php?option=com_content&amp;view=article&amp;id=58&amp;Itemid=53&amp;lang=en">ETSI Certificate</document>
    </audit>
    <certificate name="Certinomis - Autorité Racine" status="included">
      <summary> 
        This root has internally-operated subordinate CAs: “Certinomis AC 1 étoile”  (OV verification for SSL), 
        “Certinomis AC 2 étoiles” (EV like verification for SSL), “Certinomis - Autorité de Test” 
        (for internal testing only), “Certinomis Corporate” (discontinued). 
      </summary>
      <data url="http://www.certinomis.com/publi/rgs/ac-racine-g2.cer"
            version="3"
            sha1="2e:14:da:ec:28:f0:fa:1e:8e:38:9a:4e:ab:eb:26:c0:0a:d3:83:c3"
            modulus="4096"
            from="2008-09-17"
            to="2028-09-17"/>
      <crl url="http://crl.certinomis.com/AC_Racine/crl/crl-1.crl">CRL</crl>
      <type>OV</type>
      <document url="http://www.certinomis.com/documents-et-liens/nos-politiques">Document Repository</document> 
      <document url="http://www.certinomis.com/publi/rgs/PR_AE_OpC_110075.pdf"> CPS (French)</document> 
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=517740">Sections 2.1 and 3.4 of CPS (English)</document>
      <document url="http://www.certinomis.com/publi/rgs/DT-FL-0905-001-PC-RACINE-1.2.pdf"> Root CP (French) </document> 
      <document url="http://www.certinomis.com/publi/rgs/DT-FL-0808-006-PC-SERV-1E-SSL-1.2.pdf"> CP Serveur SSL 1 étoile (French) </document> 
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=517725">Section 3.2 of CP Serveur SSL 1 étoile (English)</document>
      <document url="http://www.certinomis.com/publi/rgs/DT-FL-0808-006-PC-SERV-2E-SSL-1.2.pdf"> CP Serveur SSL 2 étoiles (French)</document> 
      <document url="http://www.certinomis.com/publi/rgs/FC_AE_OPC_JUSTIFS_110207.pdf">RA Procedures Document – PROC (French)</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=518021">Part of RA Procedures Document – PROC (English)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.12.11, Firefox 6.0.2">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=545614</authorisation>
         <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=645880</technical>
      </inclusion>
    </certificate>
  </authority>
  
  <authority name="CATCert" 
              url="http://www.catcert.net" status="included">
    <summary>
     CATCert is the Catalan Agency of Certification (Agència Catalana de Certificació).
     CATCert’s aim is to provide digital certification services and promote the usage 
     of digital signature in order to make safer the communications within the Catalan 
     government and the communications (within and for) the Catalan government.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.ey.com/es">Ernst and Young</auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=1238&amp;file=pdf">Audit Report and Management Assertions</document>
    </audit>
    <certificate name="EC-ACC" status="included">
      <summary>
      This root has seven internally-operated subordinate CAs. The subordinate CAs 
      are used to distinguish who the certificates are issued to.  The EC-IDCAT 
      certificates are issued to Catalan citizens.  The EC-SAFP (a sub-CA of EG-GENCAT), 
      EC-AL, and EC-PARLAMENT certificates are not issued to the general public, but 
      only to the civil servants and computers or devices of the Regional Catalan 
      government, the Catalan Government, and the Catalan Parliament. The EC-UR and 
      EC-URV certificates are not issued to the general public, but to employees, 
      students and computers or devices of Catalan universities and research centers 
      connected to the “Anella Científica” group, and the Universitat Rovira i 
      Virgili (URV).
      </summary>
        <data url="http://www.catcert.net/descarrega/acc.crt"
        version="3"
        sha1="28:90:3A:63:5B:52:80:FA:E6:77:4C:0B:6D:A7:D6:BA:A6:4A:F2:E8"
        modulus="2048" 
        from="2003-01-07"
        to="2031-01-07"/>
      <crl url="http://epscd.catcert.net/crl/ec-acc.crl">CRL</crl>
      <ocsp>http://ocsp.catcert.net</ocsp>
      <type>OV</type>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=379561">CA Hierarchy Diagram</document>
      <document url="http://www.catcert.cat/registre">Document Repository (Catalan)</document>
      <document url="http://www.catcert.cat/web/cat/5_1_politica_general.jsp">Certification Policy (Catalan)</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=479370">Certification Policy Section 3 (English)</document>
      <document url="http://www.catcert.cat/web/cat/5_2_declaracio.jsp">Declaración de Prácticas de Certificación (DPC) for each sub-CA (Catalan)</document>
      <document url="http://www.catcert.cat/descarrega/ER_T_CAT/Procediments.zip">Operative Procedure (Catalan)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.13.2, Firefox 11">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=295474</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=707995</technical>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="HARICA" url="http://www.harica.gr/" status="included">
    <summary>
    The main goal of HARICA (Hellenic Academic and Research Institutions Certification Authority / Greek 
    Universities Network) is the deployment of an infrastructure for secure communication between 
    the collaborating members of the Greek Academic and Research Institutions.
    All HARICA certificates have a clear mark indicating that the certificate is subject to Greek 
    laws and their CPS.
    </summary>
    <audit type="ETSI TS 101 456"> 
       <auditor url="http://deventum.com">Deventum</auditor>
       <document url="http://www.trust-it.gr/userfiles/Harica.2011.03.18.Rev1.2.ENG.pdf">Audit Statement</document>
   </audit>
    <certificate name="Hellenic Academic and Research Institutions RootCA 2011" status="included">
      <summary>
      Certificates in this hierarchy may only be used for academic, research, or educational purposes. 
      This root will eventually have the same subordinate CAs as HARICA's current MD5 root, which has
      several internally-operated sub-CAs, and one externally operated sub-CA.
      Each sub-CA is used for a different Academic or Research Institution and issues both user and server certificates.
      </summary>
        <data url="http://www.harica.gr/certs/HaricaRootCA2011.der"
        version="3"
        sha1="FE:45:65:9B:79:03:5B:98:A1:61:B5:51:2E:AC:DA:58:09:48:22:4D"
        modulus="2048" 
        from="2011-12-06" 
        to="2031-12-01"/>
      <crl url="http://crlv1.harica.gr/HaricaRootCA2011/crlv1.der.crl">CRL</crl>
      <ocsp>http://ocsp.harica.gr</ocsp>
      <type>OV</type>
      <document url="http://www.harica.gr/procedures.php">Certificate Practices</document>
      <document url="http://www.harica.gr/documents/CPS-EN.pdf">Certification Policy and Certification Practices Statement (English)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="email" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.13.2, Firefox 11">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=581901</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=711594</technical>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="Actalis" url="http://www.actalis.it" status="included">
    <summary>
     Actalis is a public CA offering PKI services to a wide number of customers, 
     mainly banks and local government. 
     Actalis is a Qualified certification service provider according to the 
     EU Signature Directive (Directive 1999/93/EC).
     Actalis designs, develops, delivers and manages services and solutions 
     for on-line security, digital signatures and document certification; 
     develops and offers PKI-enabling components, supplies complete digital 
     signature and strong authentication kits (including hardware and software), 
     delivers ICT security consultancy and training.
    </summary>
    <audit type="ETSI TS 101 456">
      <auditor url="http://www.digitpa.gov.it/">DigitPA</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=598788">Audit Statement</document>
      <document url="https://applicazioni.cnipa.gov.it/TSL/IT_TSL_HR.pdf">National Accredited Service Providers</document>
      <document url="http://www.digitpa.gov.it/sites/default/files/linee%20guida%20per%20la%20vigilanza%20sui%20certificatori%20qualificati%20v1.2.pdf">Audit Criteria (see section 1.3 re ETSI TS 101 456)</document>
    </audit>
    <certificate name="Actalis Authentication Root CA" status="included">
      <summary>
      This new root certificate will eventually replace the Actalis Authentication CA G1 root certificate.
      It will sign internally-operated subordinate CAs which will sign end-entity certificates.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=563066"
            version="3"
            sha1="F3:73:B3:87:06:5A:28:84:8A:F2:F3:4A:CE:19:2B:DD:C7:8E:9C:AC"
            modulus="4096"
            from="2011-09-22"
            to="2030-09-22"/>
      <crl url="http://portal.actalis.it/Repository/AUTH-ROOT/getLastCRL">CRL</crl>
      <ocsp>http://portal.actalis.it/VA/AUTH-G2</ocsp>
      <type>OV</type>
      <document url="http://portal.actalis.it/Info/cmsContent?cmsRef=actalis/Info/Manuali">Actalis Policy Documents</document>
      <document url="http://portal.actalis.it/cms/actalis/Info/Manuali/CPS_certificati_SSL_server_e_Code_Signing_v2.1.0_IT">CPS for SSL and Code Signing Certs (Italian)</document>
      <document url="http://portal.actalis.it/cms/actalis/Info/Manuali/CPS_certificati_SSL_server_e_Code_Signing_v2.1.0_EN.pdf">CPS for SSL and Code Signing Certs (English)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.13.6, Firefox 16">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=520557</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=742525</technical>
      </inclusion>
    </certificate><technical>https://bugzilla.mozilla.org/show_bug.cgi?id=742525</technical>
  </authority>
  
  <authority name="Trustis" url="http://www.trustis.com/" status="included">
    <summary>
    Trustis is a commercial CA operating primarily in the UK and Europe.
    </summary>
    <audit type="WebTrust CA"> 
       <auditor url="http://www.kpmg.com/">KPMG</auditor>
       <document url="https://cert.webtrust.org/ViewSeal?id=1250">Audit Report and Management's Assertions</document>
   </audit>
    <certificate name="Trustis FPS Root CA" status="included">
      <summary>
      </summary>
        <data url="http://www.trustis.com/roots/fps/certs/fpsroot.crt"
        version="3"
        sha1="3B:C0:38:0B:33:C3:F6:A6:0C:86:15:22:93:D9:DF:F5:4B:81:C0:04"
        modulus="2048" 
        from="2003-12-23" 
        to="2024-01-21"/>
      <crl url="http://www.trustis.com/pki/fps/crl/fpsder.crl">CRL</crl>
      <type>OV</type>
      <document url="http://www.trustis.com/pki/fpsia/">Trustis Document Repository</document>
      <document url="http://www.trustis.com/pki/fpsia/policy/T-0104-002-ATL-013-Trustis-FPS-Minimum-Enrolment-Requirements-V3_0.pdf">Trustis FPS Minimum Enrolment Requirements</document>
      <document url="http://www.trustis.com/pki/fpsia/policy/T-FPS-CP-V1-04.pdf">Trustis FPS Certificate Policy</document>
      <document url="http://www.trustis.com/pki/fpsia/policy/disclosure.htm">Trustis FPS Issuing Authority PKI Disclosure Statement</document>
      <document url="http://www.trustis.com/pki/fpsia/policy/subscriber-agreement.htm">Subscriber Agreement</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="NSS 3.13.6, Firefox 16">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=577665</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=742514</technical>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>

  
</certificates>