Dear all, 

As A-Trust request EV treatment, I checked the EV issued certificates from 
a-sign-SSL-EV-05 subordinate in ctr.sh (https://crt.sh/?Identity=%25&iCAID=6096)

ALL of them states in businessCategory the following text "V1.0, Clause 5.(X)". 
This text is similar to what permitted by EV guidelines version 1.2 and prior, 
although "X" should have been "b", "c", "d" or "e" depending upon whether the 
Subject qualifies in the permitted categories. This text is not permitted since 
EV guidelines version 1.3 published in 2010. 

As the EV audit conducted by E&Y states A-trust is in compliance with "WebTrust 
Principles and Criteria for Certification Authorities - Extended Validation SSL 
- Version 1.4.5" that is based on CA/Browser Forum Guidelines for the Issuance 
and Management of Extended Validation SSL Certificates - Version 1.4.5 and it's 
obvious that the auditor failed to detect this very basic issue, can we, the 
Mozilla Community, be reasonably assured of any of the auditor's necessary 
checks?

In addition there are several more issues in this certificates:

- rfc822Name in SAN (https://crt.sh/?id=8889537&opt=cablint, 
https://crt.sh/?id=8889537&opt=cablint)
- FATAL: ASN.1 Error in EmailAddress (https://crt.sh/?id=12491213&opt=cablint, 
https://crt.sh/?id=9410992&opt=cablint)
- This cert has the following errors: Cert without subject alternative names 
extension, Cert of 1024 bits (https://crt.sh/?id=8935972&opt=cablint)

Best,
J
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to