Thanks for mentioning this here.

Could you explain why you see it as an issue? RFC 5280 defines a trust
anchor as a subject and a public key. Everything else is optional, and the
delivery of a trust anchor as a certificate does not necessarily imply the
constraints of that certificate, including expiration, should apply.

On Sun, Jul 14, 2019 at 1:52 PM Vincent Lours via dev-security-policy <
[email protected]> wrote:

> Hi there,
>
> Following my "question" in the Mozilla Support Forum (
> https://support.mozilla.org/en-US/questions/1264544), I would like to
> notice you that there are 2 certificates expired in your Root CA file
> certdata.txt.
>
> The following certificates expired days ago:
> | Expiration date | Certificate CN |
> | 2019-07-06 | Class 2 Primary CA |
> | 2019-07-09 | Deutsche Telekom Root CA 2 |
>
> New certificates should be retrieved for these 2 CA, or they should be
> deleted from the certdata.txt as they are no longer valid.
>
> certdata.txt References:
>  nss: '
> https://hg.mozilla.org/projects/nss/raw-file/default/lib/ckfw/builtins/certdata.txt
> ',
>  central:
> https://hg.mozilla.org/mozilla-central/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt
> ',
>  beta:
> https://hg.mozilla.org/releases/mozilla-beta/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt
> ',
>  release: '
> https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt
> ',
>
> Thanks for your help.
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to