Le vendredi 20 juin 2014 01:20:56 UTC+2, Kathleen Wilson a écrit :
> China Financial Certification Authority (CFCA) has applied to include 
> the "CFCA GT CA" and "CFCA EV ROOT" root certificates, turn on all three 
> trust bits for the "CFCA GT CA" root certificate, turn on the websites 
> trust bit for the "CFCA EV ROOT" root certificate, and enable EV 
> treatment for the "CFCA EV ROOT" certificate.
[...]


Under "CFCA GT CA" root:

https://cs.cfca.com.cn/cgi-bin/ 
- subscriber certificate doesn't contain the mandatory SAN extension (CABF BR 
section 9.2.1)
- MIME type of AIA:caIssuers URI is invalid ("text/plain")
- MIME type of CRLDP URI is invalid ("text/plain")
- CRL obtained by the CRLDP keeps the same CRLNumber value (1) while its 
lastUpdate changes; this is forbidden by X.509/RFC5280

Duplicate issuer+serial number found for the issuing CA (CN=CFCA OCA2). One 
certificate (sha256WithRSA-signed, expiration in 2032) is sent by the test web 
server, the other (sha1WithRSA-signed, expiration in 2026) is obtained by the 
AIA:caIssuer extension, both have the same information including the serial 
number (0x29ad8db84e). This is forbidden by X.509/RFC5280.
MIME type of CRLDP URI of this intermediate certificate is also invalid.

OCSP responder behind http://ocsp.cfca.com.cn/ocsp, when validating the 
subscriber certificate, has a 1024 bits key and is valid for 5 years (and a 
useless CRLDP extension).

OCSP responder behind http://ocsp.cfca.com.cn/ocsp, when validating the 
intermediate certificate, has the same problems.

There's no trace of a report by a Qualified Auditor about the generation of 
this root key (see CABF BR section 17.7), this is mandatory for keys generated 
after 1 July 2012.


Under "CFCA EV ROOT" root:

https://pub.cebnet.com.cn
- subscriber certificate doesn't contain the mandatory SAN extension (CABF BR 
section 9.2.1)
- MIME type of AIA:caIssuers URI is invalid ("text/plain")
- MIME type of CRLDP URI is invalid ("text/plain")
- CRL obtained by the CRLDP keeps the same CRLNumber value (1) while its 
lastUpdate changes; this is forbidden by X.509/RFC5280

MIME type of CRLDP URI of the intermediate certificate is also invalid.

OCSP responder behind http://ocsp.cfca.com.cn/ocsp, when validating the 
subscriber certificate, has a 1024 bits key for a 5 years validity (and a 
useless CRLDP extension).

OCSP responder behind http://ocsp.cfca.com.cn/ocsp, when validating the 
intermediate certificate, has the same problems.

There's no trace of a report by a Qualified Auditor about the generation of 
this root key (see CABF BR section 17.7), this is mandatory for keys generated 
after 1 July 2012.
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to