We have re-issued and installed the certificates of our OCSP responders: now they have the id-pkix-ocsp-nocheck extension, as per BR 1.1 section 13.2.5.

Adriano


Il 18/03/2014 01:08, Kathleen Wilson ha scritto:
On 3/13/14, 3:23 AM, Adriano Santoni - Actalis S.p.A. wrote:
See below:

Il 13/03/2014 01:09, Erwann Abalea ha scritto:
When requesting the OCSP responder to check the subscriber certificate
(thus signed by the intermediate), the response contains a self-signed
certificate for your intermediate CA, instead of the "root-issued"
genuine one. Why? It can make some software reject your responses
(even if they shouldn't).

Right. We will fix it shortly.
The authorized OCSP responders certificates don't contain the
mandatory OCSPNoCheck extension (BR 1.1, section 13.2.5).

We forgot that extension, will reissue the responder certificate at the
earliest.


Please let us know when these have been addressed.


Does anyone else have feedback on this request from Actalis to enable EV treatment for the “Actalis Authentication Root CA” root certificate?


Thanks,
Kathleen


_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to