The SHA1 certificate issued by Postecom.it with serial number 35:6c:f3:ee:ae:90:77:cd:11:aa:11:ec:1d:62:fd:e5:16:b7:ef:09 has been revoked. Here is the corresponding CRL: http://postecert.poste.it/postecomcs3/crl.crl Ben
-----Original Message----- From: Marco Bongiovanni [mailto:[email protected]] Sent: Tuesday, January 26, 2016 6:05 AM we communicate that we have revoked the certificate referred to https://crt.sh/?id= -----Original Message----- From: Ben Wilson Sent: Monday, January 25, 2016 10:08 AM To: 'Charles Reiss' <[email protected]>; [email protected] Subject: RE: SHA1 certs issued this year chaining to included roots Thanks for spotting this Charles. We've reached out to Postecom.it for an explanation and with a request that they revoke the certificate immediately and reissue it with the proper contents. Ben Wilson DigiCert VP of Compliance -----Original Message----- From: dev-security-policy [mailto:[email protected]] On Behalf Of Charles Reiss Sent: Monday, January 25, 2016 1:23 AM To: [email protected] Subject: Re: SHA1 certs issued this year chaining to included roots On 01/19/16 01:49, Charles Reiss wrote: > Via censys.io, I found a couple SHA-1 certs with notBefore dates from > this year which chain to root CAs in Mozilla's program: [snip] And here are a couple more, from different subCAs: - https://crt.sh/?id=12131821 -- chaining to Deutsche Telekom Root CA 2 [T-Systems] via subCA "Shared Business CA 3" - https://crt.sh/?id=12203339 -- chaining to Baltimore CyberTrust Root (again) this time via (presumably external) subCA "Postecom CS3" Also, the OCSP responder for this certificate appears to use an OCSP responder certificate for some subCA with CN=Postecom CA3 (instead of CS3). Even SHA-256 certificates from this subCA (e.g. https://crt.sh/?id=12138276) appear to have an Authority Key Identifier extension that specifies the serial number of the subCA cert instead of the keyid: X509v3 Authority Key Identifier: DirName:/C=IE/O=Baltimore/OU=CyberTrust/CN=Baltimore CyberTrust Root serial:07:27:52:62 Does this mean they couldn't be used with a SHA-256 version of the subCA certificate? _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

