On 01/19/16 03:37, Charles Reiss wrote:
> On 01/19/16 03:23, Kurt Roeckx wrote:
>> On Tue, Jan 19, 2016 at 01:49:21AM +0000, Charles Reiss wrote:
>>> Via censys.io, I found a couple SHA-1 certs with notBefore dates from this 
>>> year
>>> which chain to root CAs in Mozilla's program:
>>
>> I also have some from C=US,O=VeriSign\, Inc.,OU=VeriSign Trust
>> Network,OU=Terms of use at https://www.verisign.com/rpa
>> (c)10,CN=VeriSign Class 3 International Server CA - G3".  I'm not
>> sure that CA is still included, but I think it it.
>>
>> It includes certificates like C=US,ST=California,L=Mountain
>> View,O=Symantec Corp.,CN=psslnoov.symantec.com
> 
> https://crt.sh/?id=11876802 would be an example then.

On further investigation, this certificate is revoked, at 4 Jan 2016 17:42 UTC
according to the CRL (and the OCSP server also responds accordingly). (Its
notBefore datetime is 4 Jan 2016 00:00 UTC.)

> 
> The Class 3 Internal Server CA - G3 appears to have a cert issued from 
> "VeriSign
> Class 3 Public Primary Certification Authority - G5", which is an included CA
> with the websites trust bit enabled.
> 
> 
>> I didn't have time to file bugs for this yet.
>>
>>
>> Kurt
>>
> 

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to