Re: SHA1 certs issued this year chaining to included roots

2016-02-04 Thread dave.ta...@rsa.com
Hello- Regarding: > - https://crt.sh/?id=12501254&opt=cablint -- RSA Security 2048 V3 via > RSA Corporate CA v2 via RSA Corporate Server CA v2 All certificates issued with SHA-1 post 1 January 2016 have been revoked and replaced with SHA-2 compliant Certificates as of 4 Feb 2016. The configu

Re: SHA1 certs issued this year chaining to included roots

2016-02-01 Thread Charles Reiss
On 01/19/16 01:49, Charles Reiss wrote: > Via censys.io, I found a couple SHA-1 certs with notBefore dates from this > year > which chain to root CAs in Mozilla's program: [snip] and even more, from different subCAs than have come up yet: - https://crt.sh/?id=12501241&opt=cablint -- Baltimore Cy

Re: SHA1 certs issued this year chaining to included roots

2016-02-01 Thread Charles Reiss
we communicate that we have revoked the certificate referred to > https://crt.sh/?id= > > -Original Message- > From: Ben Wilson > Sent: Monday, January 25, 2016 10:08 AM > To: 'Charles Reiss' ; > mozilla-dev-security-pol...@lists.mozilla.org > Subject:

Re: SHA1 certs issued this year chaining to included roots

2016-01-29 Thread Richard Barnes
On Fri, Jan 29, 2016 at 4:43 PM, Kathleen Wilson wrote: > On 1/25/16 12:22 AM, Charles Reiss wrote: > >> On 01/19/16 01:49, Charles Reiss wrote: >> >>> Via censys.io, I found a couple SHA-1 certs with notBefore dates from >>> this year >>> which chain to root CAs in Mozilla's program: >>> >> [sni

Re: SHA1 certs issued this year chaining to included roots

2016-01-29 Thread Kathleen Wilson
On 1/25/16 12:22 AM, Charles Reiss wrote: On 01/19/16 01:49, Charles Reiss wrote: Via censys.io, I found a couple SHA-1 certs with notBefore dates from this year which chain to root CAs in Mozilla's program: [snip] And here are a couple more, from different subCAs: - https://crt.sh/?id=121318

RE: SHA1 certs issued this year chaining to included roots

2016-01-26 Thread Ben Wilson
ozilla.org Subject: RE: SHA1 certs issued this year chaining to included roots Thanks for spotting this Charles. We've reached out to Postecom.it for an explanation and with a request that they revoke the certificate immediately and reissue it with the proper contents. Ben Wilson DigiCert V

Re: SHA1 certs issued this year chaining to included roots

2016-01-25 Thread Andrew Ayer
On Mon, 25 Jan 2016 08:22:57 + Charles Reiss wrote: > - https://crt.sh/?id=12203339 -- chaining to Baltimore CyberTrust Root > (again) this time via (presumably external) subCA "Postecom CS3" This certificate also contains two SANs for internal names: DNS:vm-exfe01.postecom.local

RE: SHA1 certs issued this year chaining to included roots

2016-01-25 Thread Ben Wilson
o:dev-security-policy-bounces+ben=digicert@lists.mozilla.org] On Behalf Of Charles Reiss Sent: Monday, January 25, 2016 1:23 AM To: mozilla-dev-security-pol...@lists.mozilla.org Subject: Re: SHA1 certs issued this year chaining to included roots On 01/19/16 01:49, Charles Reiss wrote:

Re: SHA1 certs issued this year chaining to included roots

2016-01-25 Thread Charles Reiss
On 01/19/16 01:49, Charles Reiss wrote: > Via censys.io, I found a couple SHA-1 certs with notBefore dates from this > year > which chain to root CAs in Mozilla's program: [snip] And here are a couple more, from different subCAs: - https://crt.sh/?id=12131821 -- chaining to Deutsche Telekom Root

Re: SHA1 certs issued this year chaining to included roots

2016-01-20 Thread Charles Reiss
On 01/19/16 01:49, Charles Reiss wrote: > Via censys.io, I found a couple SHA-1 certs with notBefore dates from this > year > which chain to root CAs in Mozilla's program: > > - https://crt.sh/?id=12089828 -- chains to Baltimore CyberTrust Root > [DigiCert] > via subCA "Eurida Primary CA" via su

Re: OCSP exception contingent on must-staple (was Re: SHA1 certs issued this year chaining to included roots)

2016-01-20 Thread Jakob Bohm
On 20/01/2016 15:43, Rob Stradling wrote: On 20/01/16 14:35, Richard Barnes wrote: Changing the subject line as this is branching a bit... IIRC, the original motivation for this text was to make it possible to suppress OCSP requests directly from TLS clients (that don't support OCSP Stapling)

Re: OCSP exception contingent on must-staple (was Re: SHA1 certs issued this year chaining to included roots)

2016-01-20 Thread Rob Stradling
On 20/01/16 14:35, Richard Barnes wrote: Changing the subject line as this is branching a bit... IIRC, the original motivation for this text was to make it possible to suppress OCSP requests directly from TLS clients (that don't support OCSP Stapling). In particular, there was a concern that

OCSP exception contingent on must-staple (was Re: SHA1 certs issued this year chaining to included roots)

2016-01-20 Thread Richard Barnes
Changing the subject line as this is branching a bit... On Wed, Jan 20, 2016 at 8:24 AM, Rob Stradling wrote: > On 19/01/16 21:13, Charles Reiss wrote: > >> On 01/19/16 11:49, Jakob Bohm wrote: >> > > >> If there is no OCSP, it obviously cannot be stapled. >>> >> >> The CA/Browser forum BRs con

Re: SHA1 certs issued this year chaining to included roots

2016-01-20 Thread Rob Stradling
On 19/01/16 21:13, Charles Reiss wrote: On 01/19/16 11:49, Jakob Bohm wrote: If there is no OCSP, it obviously cannot be stapled. The CA/Browser forum BRs contemplate OCSP stapling without an OCSP responder being listed in the certificate in section 7.1.2.2.c ("The HTTPURL of the Issuin

Re: SHA1 certs issued this year chaining to included roots

2016-01-19 Thread Charles Reiss
On 01/19/16 11:49, Jakob Bohm wrote: > On 19/01/2016 02:49, Charles Reiss wrote: >> Via censys.io, I found a couple SHA-1 certs with notBefore dates from this >> year >> which chain to root CAs in Mozilla's program: >> >> - https://crt.sh/?id=12089828 -- chains to Baltimore CyberTrust Root >> [Di

RE: SHA1 certs issued this year chaining to included roots

2016-01-19 Thread Jeremy Rowley
=digicert@lists.mozilla.org] On Behalf Of Jakob Bohm Sent: Tuesday, January 19, 2016 4:49 AM To: mozilla-dev-security-pol...@lists.mozilla.org Subject: Re: SHA1 certs issued this year chaining to included roots On 19/01/2016 02:49, Charles Reiss wrote: > Via censys.io, I found a couple SHA-1 ce

Re: SHA1 certs issued this year chaining to included roots

2016-01-19 Thread Jakob Bohm
On 19/01/2016 02:49, Charles Reiss wrote: Via censys.io, I found a couple SHA-1 certs with notBefore dates from this year which chain to root CAs in Mozilla's program: - https://crt.sh/?id=12089828 -- chains to Baltimore CyberTrust Root [DigiCert] via subCA "Eurida Primary CA" via subCA "DnB NOR

Re: SHA1 certs issued this year chaining to included roots

2016-01-19 Thread Kurt Roeckx
On Mon, Jan 18, 2016 at 10:45:17PM -0500, Reed Loden wrote: > https://cabforum.org/pipermail/public/2016-January/006519.html has > more information on these certs. Thanks, that seems to list the same 5 I already had. I'm currently also seeing: https://crt.sh/?id=12090324 Kurt _

Re: SHA1 certs issued this year chaining to included roots

2016-01-18 Thread Reed Loden
Correct. Sorry, I meant to say "on the Symantec-issued certs". ~reed On Mon, Jan 18, 2016 at 10:55 PM, Eric Mill wrote: > On Mon, Jan 18, 2016 at 10:45 PM, Reed Loden wrote: >> >> https://cabforum.org/pipermail/public/2016-January/006519.html has >> more information on these certs. > > > I don'

Re: SHA1 certs issued this year chaining to included roots

2016-01-18 Thread Eric Mill
On Mon, Jan 18, 2016 at 10:45 PM, Reed Loden wrote: > https://cabforum.org/pipermail/public/2016-January/006519.html has > more information on these certs. > I don't think that includes the Digicert one, though? > > ~reed > > On Mon, Jan 18, 2016 at 10:23 PM, Kurt Roeckx wrote: > > On Tue, Ja

Re: SHA1 certs issued this year chaining to included roots

2016-01-18 Thread Reed Loden
https://cabforum.org/pipermail/public/2016-January/006519.html has more information on these certs. ~reed On Mon, Jan 18, 2016 at 10:23 PM, Kurt Roeckx wrote: > On Tue, Jan 19, 2016 at 01:49:21AM +, Charles Reiss wrote: >> Via censys.io, I found a couple SHA-1 certs with notBefore dates from

Re: SHA1 certs issued this year chaining to included roots

2016-01-18 Thread Charles Reiss
On 01/19/16 03:37, Charles Reiss wrote: > On 01/19/16 03:23, Kurt Roeckx wrote: >> On Tue, Jan 19, 2016 at 01:49:21AM +, Charles Reiss wrote: >>> Via censys.io, I found a couple SHA-1 certs with notBefore dates from this >>> year >>> which chain to root CAs in Mozilla's program: >> >> I also h

Re: SHA1 certs issued this year chaining to included roots

2016-01-18 Thread Charles Reiss
On 01/19/16 03:23, Kurt Roeckx wrote: > On Tue, Jan 19, 2016 at 01:49:21AM +, Charles Reiss wrote: >> Via censys.io, I found a couple SHA-1 certs with notBefore dates from this >> year >> which chain to root CAs in Mozilla's program: > > I also have some from C=US,O=VeriSign\, Inc.,OU=VeriSig

Re: SHA1 certs issued this year chaining to included roots

2016-01-18 Thread Kurt Roeckx
On Tue, Jan 19, 2016 at 01:49:21AM +, Charles Reiss wrote: > Via censys.io, I found a couple SHA-1 certs with notBefore dates from this > year > which chain to root CAs in Mozilla's program: I also have some from C=US,O=VeriSign\, Inc.,OU=VeriSign Trust Network,OU=Terms of use at https://www.