://www.mozilla.org/projects/security/certs/pending/
Summary of Information Gathered and Verified:
https://bugzilla.mozilla.org/attachment.cgi?id=8382446
Thank you to those of you who reviewed and contributed to this
discussion about the request from Actalis to enable EV treatment
that extension, will reissue the responder certificate at the
earliest.
Please let us know when these have been addressed.
Does anyone else have feedback on this request from Actalis to enable EV
treatment for the “Actalis Authentication Root CA” root certificate?
Thanks,
Kathleen
See below:
Il 13/03/2014 01:09, Erwann Abalea ha scritto:
When requesting the OCSP responder to check the subscriber certificate (thus signed by
the intermediate), the response contains a self-signed certificate for your intermediate
CA, instead of the root-issued genuine one. Why? It can
Bonjour,
Le jeudi 13 mars 2014 11:23:34 UTC+1, Adriano Santoni - Actalis S.p.A. a écrit :
Il 13/03/2014 01:09, Erwann Abalea ha scritto:
[...]
The authorized OCSP responders certificates don't contain the mandatory
OCSPNoCheck extension (BR 1.1, section 13.2.5).
We forgot that extension,
See below:
Il 13/03/2014 01:09, Erwann Abalea ha scritto:
When requesting the OCSP responder to check the subscriber certificate (thus signed by
the intermediate), the response contains a self-signed certificate for your intermediate
CA, instead of the root-issued genuine one. Why? It can
Le jeudi 6 mars 2014 22:43:12 UTC+1, Kathleen Wilson a écrit :
Actalis has applied to enable EV treatment for the Actalis
Authentication Root CA root certificate that was included in NSS via
bug #520557.
[...]
* EV Policy OID: 1.3.159.1.17.1
* Test Website:
of the request from Actalis to enable EV
treatment for the “Actalis Authentication Root CA” root certificate. At
the conclusion of this discussion I will provide a summary of issues
noted and action items. If there are outstanding issues, then an
additional discussion may be needed as follow-up
7 matches
Mail list logo