Bonjour, Le mardi 9 février 2016 10:47:16 UTC+1, Jesus F a écrit : > Dear all, > > As A-Trust request EV treatment, I checked the EV issued certificates from > a-sign-SSL-EV-05 subordinate in ctr.sh > (https://crt.sh/?Identity=%25&iCAID=6096) > > ALL of them states in businessCategory the following text "V1.0, Clause > 5.(X)". This text is similar to what permitted by EV guidelines version 1.2 > and prior, although "X" should have been "b", "c", "d" or "e" depending upon > whether the Subject qualifies in the permitted categories. This text is not > permitted since EV guidelines version 1.3 published in 2010. > > As the EV audit conducted by E&Y states A-trust is in compliance with > "WebTrust Principles and Criteria for Certification Authorities - Extended > Validation SSL - Version 1.4.5" that is based on CA/Browser Forum Guidelines > for the Issuance and Management of Extended Validation SSL Certificates - > Version 1.4.5 and it's obvious that the auditor failed to detect this very > basic issue, can we, the Mozilla Community, be reasonably assured of any of > the auditor's necessary checks? > > In addition there are several more issues in this certificates: > > - rfc822Name in SAN (https://crt.sh/?id=8889537&opt=cablint, > https://crt.sh/?id=8889537&opt=cablint) > - FATAL: ASN.1 Error in EmailAddress > (https://crt.sh/?id=12491213&opt=cablint, > https://crt.sh/?id=9410992&opt=cablint) > - This cert has the following errors: Cert without subject alternative names > extension, Cert of 1024 bits (https://crt.sh/?id=8935972&opt=cablint)
Without saying that the audit was perfect, but all the presented evidences here have been produced after the audit was performed. _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

