On 01/19/16 01:49, Charles Reiss wrote:
> Via censys.io, I found a couple SHA-1 certs with notBefore dates from this 
> year
> which chain to root CAs in Mozilla's program:
> 
> - https://crt.sh/?id=12089828 -- chains to Baltimore CyberTrust Root 
> [DigiCert]
> via subCA "Eurida Primary CA" via subCA "DnB NOR ASA PKI Class G"
> 
> Also, the OCSP responder for this certificate appears to not include a
> nextUpdate field.
> 
> 
> - https://crt.sh/?id=12090324 -- chains to Security Communication RootCA1
> [SECOM] via subCA "YourNet SSL for business"
>       
> Also, this certificate is also missing OCSP information and appears to be 
> being
> served without OCSP stapling support.
> 

I also found this recent SHA-1 cert that appears to chain to "IGC/A"
(Government of France) -- https://crt.sh/?id=12129393

In addition to being a SHA-1 certificate issued this year:
- the OCSP responder for this certificate does not seem to respond to
GET requests;
- the signing certificate used by the OCSP responder appears to be
signed by a different subCA (https://crt.sh/?id=115 instead of
https://crt.sh/?id=11159611) than the one that issued this certificate;
- the signing certificate used by the OCSP responder does not include
the id-pkix-ocsp-nocheck extension;
- the OCSP response does not include a nextUpdate field; and
- the CRL referenced by the subCA certificate
(https://crt.sh/?id=11159611) has a nextUpdate 18 months after its last
update date. (The BRs require at most 12 months.)

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to