Add Certplus and OpenTrust root certificates to NSS

RESOLVED FIXED

Status

task
RESOLVED FIXED
3 years ago
3 years ago

People

(Reporter: kwilson, Unassigned)

Tracking

Dependency tree / graph

Firefox Tracking Flags

(Not tracked)

Details

(Whiteboard: Included in NSS 3.25, and Firefox 49)

Attachments

(5 attachments)

1.92 KB, application/x-x509-ca-cert
Details
808 bytes, application/x-x509-ca-cert
Details
1.93 KB, application/x-x509-ca-cert
Details
1.93 KB, application/x-x509-ca-cert
Details
812 bytes, application/x-x509-ca-cert
Details
(Reporter)

Description

3 years ago
This bug requests inclusion in the NSS root store of the following root certificates owned by DocuSign (OpenTrust/Keynectis).
	 
Friendly Name: Certplus Root CA G1
Cert Location: https://bugzilla.mozilla.org/attachment.cgi?id=8446784
SHA-1 Fingerprint: 2:FD:D0:B7:FD:A2:4E:0D:AC:49:2C:A0:AC:A6:7B:6A:1F:E3:F7:66
SHA-256 Fingerprint: 15:2A:40:2B:FC:DF:2C:D5:48:05:4D:22:75:B3:9C:7F:CA:3E:C0:97:80:78:B0:F0:EA:76:E5:61:A6:C7:43:3E
Trust Flags: Email; Websites
Test URL: https://certplusrootcag1-test.opentrust.com
	 
Friendly Name: Certplus Root CA G2
Cert Location: https://bugzilla.mozilla.org/attachment.cgi?id=8446790
SHA-1 Fingerprint: 4F:65:8E:1F:E9:06:D8:28:02:E9:54:47:41:C9:54:25:5D:69:CC:1A
SHA-256 Fingerprint: 6C:C0:50:41:E6:44:5E:74:69:6C:4C:FB:C9:F8:0F:54:3B:7E:AB:BB:44:B4:CE:6F:78:7C:6A:99:71:C4:2F:17
Trust Flags: Email; Websites
Test URL: https://certplusrootcag2-test.opentrust.com
 
Friendly Name: OpenTrust Root CA G1
Cert Location: https://bugzilla.mozilla.org/attachment.cgi?id=8446791
SHA-1 Fingerprint: 79:91:E8:34:F7:E2:EE:DD:08:95:01:52:E9:55:2D:14:E9:58:D5:7E
SHA-256 Fingerprint: 56:C7:71:28:D9:8C:18:D9:1B:4C:FD:FF:BC:25:EE:91:03:D4:75:8E:A2:AB:AD:82:6A:90:F3:45:7D:46:0E:B4
Trust Flags: Email; Websites
Test URL: https://opentrustrootcag1-test.opentrust.com
	 
Friendly Name: OpenTrust Root CA G2
Cert Location: https://bugzilla.mozilla.org/attachment.cgi?id=8446792
SHA-1 Fingerprint: 79:5F:88:60:C5:AB:7C:3D:92:E6:CB:F4:8D:E1:45:CD:11:EF:60:0B
SHA-256 Fingerprint: 27:99:58:29:FE:6A:75:15:C1:BF:E8:48:F9:C4:76:1D:B1:6C:22:59:29:25:7B:F4:0D:08:94:F2:9E:A8:BA:F2
Trust Flags: Email; Websites
Test URL: https://opentrustrootcag2-test.opentrust.com
	 
Friendly Name: OpenTrust Root CA G3
Cert Location: https://bugzilla.mozilla.org/attachment.cgi?id=8446793
SHA-1 Fingerprint: 6E:26:64:F3:56:BF:34:55:BF:D1:93:3F:7C:01:DE:D8:13:DA:8A:A6
SHA-256 Fingerprint: B7:C3:62:31:70:6E:81:07:8C:36:7C:B8:96:19:8F:1E:32:08:DD:92:69:49:DD:8F:57:09:A4:10:F7:5B:62:92
Trust Flags: Email; Websites
Test URL: https://opentrustrootcag3-test.opentrust.com

This CA has been assessed in accordance with the Mozilla project guidelines, and the certificates approved for inclusion in Bug #1025095.

The next steps are as follows:
1) A representative of the CA must confirm that all the data in this bug is correct, and that the correct certificates have been attached.
2) A Mozilla representative creates a patch with the new certificates, and provides a special test version of Firefox.
3) A representative of the CA uses the test version of Firefox to confirm (by adding a comment in this bug) that the certificates have been correctly imported and that websites work correctly.
4) The Mozilla representative requests that another Mozilla representative review the patch.
5) The Mozilla representative adds (commits) the patch to NSS, then closes this bug as RESOLVED FIXED.
6) At some time after that, various Mozilla products will move to using a version of NSS which contains the certificates. This process is mostly under the control of the release drivers for those products.

Note: Must use a new profile to test, see
https://bugzilla.mozilla.org/show_bug.cgi?id=1025095#c18
(Reporter)

Comment 1

3 years ago
(Reporter)

Comment 2

3 years ago
(Reporter)

Comment 3

3 years ago
(Reporter)

Comment 4

3 years ago
(Reporter)

Comment 5

3 years ago
(Reporter)

Comment 6

3 years ago
Remi, Please see step #1 above.
(Reporter)

Updated

3 years ago
Blocks: 1274677

Comment 7

3 years ago
Fingerprints, trust flags, and test URLs have been verified and are correct, with a small typo for the SHA1 fingerprint of Certplus Root CA G1, there's a leading '2' missing (i.e. the first octet is 22).
Certificates attached to this bug have been compared to the ones we generated in Key Ceremony and found to be equal.
(Reporter)

Comment 8

3 years ago
Erwann, Thank you for pointing out the mistake in the SHA1 fingerprint of Certplus Root CA G1, which should read:
SHA-1 Fingerprint: 22:FD:D0:B7:FD:A2:4E:0D:AC:49:2C:A0:AC:A6:7B:6A:1F:E3:F7:66

Updated

3 years ago
Depends on: 1275533
(Reporter)

Comment 9

3 years ago
The test build is available here:
https://ftp-ssl.mozilla.org/pub/firefox/try-builds/kaie@kuix.de-021f86879b2677953a2c171707cf72dadd683c24/

I have tested on MacOS. I confirm that the requested certificates were added with the correct trust bits, and the test websites work as expected.
Note that due to cross-signing, I had to turn off the trust bits for all of the certs listed above, except for the one I was testing. I also cleared browser history between each test. I found it easiest to do this using the Certificate Manager Addon via the latest version of the @certmanager.xpi available here: 
https://github.com/sidstamm/FirefoxCertificateManager

Erwann, please use the test build to perform your testing this week, and comment in this bug when you have finished testing.
https://wiki.mozilla.org/CA:How_to_apply#Testing_Inclusion

Comment 10

3 years ago
I downloaded the file named firefox-49.0a1.en-US.mac.dmg, verified the MD5/SHA1/SHA512 hash according to the checksums file, installed the "Nightly" app, and tried to run this app, with no success.
The error message is (translated): "Nightly" is damaged and can't be open. You should place this element in the Trash.

I'm setting up a Linux VM to test the Linux version.

Comment 11

3 years ago
Testing the Linux versions gave positive results, for the 5 roots, and the 5 test websites.
There's no EV UI, I guess it's normal?
(Reporter)

Comment 12

3 years ago
Thanks for testing. EV treatment is handled separately (via Bug #1274677), and after the root cert is included.

Regarding Comment #10... On the Mac you have to change the Gatekeeper settings to allow 3rd party apps to be run. For details see Bug #1090459.
(Reporter)

Updated

3 years ago
Status: NEW → RESOLVED
Last Resolved: 3 years ago
Resolution: --- → FIXED
Whiteboard: Included in NSS 3.25, and Firefox 49
You need to log in before you can comment on or make changes to this bug.