Le jeudi 30 octobre 2014 19:17:41 UTC+1, Kathleen Wilson a écrit :
> IdenTrust has applied to include the "IdenTrust Commercial Root CA 1" 
> and "IdenTrust Public Sector Root CA 1" root certificates, and turn on 
> the Websites and Email trust bits for both. The "IdenTrust Commercial 
> Root CA 1" root will eventually replace the "DST Root X3" certificate, 
> and the "IdenTrust Public Sector Root CA 1" root will eventually replace 
> the "DST ACES X6" certificate. Both of the currently-included root 
> certificates were included via Bugzilla Bug #394733.
[...]
> * Root Cert URLs
> https://bugzilla.mozilla.org/attachment.cgi?id=8473319
> http://validation.identrust.com/roots/commercialrootca1.p7c
> https://bugzilla.mozilla.org/attachment.cgi?id=8473320
> http://validation.identrust.com/roots/publicrootca1.p7c
> 
> * Test Websites
> https://sha2ssl-trustidvalid.identrustssl.com/
> https://sha2ssl-acesvalid.identrust.com/
> Comprehensive list: http://testssl.identrust.com/
> 
> * CRL
> http://validation.identrust.com/crl/commercialrootca1.crl
> http://validation.identrust.com/crl/trustidcaa52.crl

> http://validation.identrust.com/crl/publicrootca1.crl
> http://validation.identrust.com/crl/acesca2.crl
> 
> * OCSP
> http://commercial.ocsp.identrust.com
> http://public.ocsp.identrust.com

Nothing's obviously wrong on the certificates, CRLs, CP/CPS.

Intermediate certificates include EKU OIDs for IPSec {Tunnel, User, End 
System}, which is weird; why would anyone want a *public* certificate to 
authentify against a virtual *private* network? That's not a blocker. These EKU 
OIDs are obsolete anyway.

The sha2ssl-acesvalid subscriber certificate includes the BR IV policyId OID, 
but this OID isn't granted to the issuer. Not a blocker, but if a RP 
explicitely requires this OID to be present, this chain will be rejected (see 
recent discussions on CABForum about CP OID chaining).

The OCSP responders both include too many certificates, this has a performance 
impact for your users; no need to include intermediate and root certificates in 
the response. Not a blocker.

The OCSP responders answer "unknown" when asked to verify the 2 given 
intermediate certificates. Not a blocker, but probably not expected.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to