Enterprise roots mode should also import Intermediate CAs on Windows
Categories
(Core :: Security: PSM, enhancement, P1)
Tracking
()
Tracking | Status | |
---|---|---|
firefox67 | --- | fixed |
People
(Reporter: christoph.pilgersdorfer, Assigned: keeler)
References
(Blocks 1 open bug)
Details
(Whiteboard: [psm-assigned])
Attachments
(6 files)
Comment 1•7 years ago
|
||
Reporter | ||
Comment 2•7 years ago
|
||
Reporter | ||
Comment 3•7 years ago
|
||
Comment 4•7 years ago
|
||
Reporter | ||
Comment 5•7 years ago
|
||
Reporter | ||
Comment 6•7 years ago
|
||
Comment 7•7 years ago
|
||
Updated•7 years ago
|
![]() |
Assignee | |
Updated•7 years ago
|
![]() |
Assignee | |
Comment 8•7 years ago
|
||
Reporter | ||
Comment 9•7 years ago
|
||
Reporter | ||
Comment 10•7 years ago
|
||
![]() |
Assignee | |
Comment 11•7 years ago
|
||
Reporter | ||
Comment 12•7 years ago
|
||
Reporter | ||
Comment 13•7 years ago
|
||
Reporter | ||
Comment 14•7 years ago
|
||
Reporter | ||
Comment 15•7 years ago
|
||
![]() |
Assignee | |
Comment 16•7 years ago
|
||
Reporter | ||
Comment 17•7 years ago
|
||
![]() |
Assignee | |
Comment 18•7 years ago
|
||
Comment 19•6 years ago
|
||
Comment 20•6 years ago
|
||
Comment 21•6 years ago
|
||
Comment 22•6 years ago
|
||
Comment 23•6 years ago
|
||
Comment 24•6 years ago
|
||
Comment 25•6 years ago
|
||
Comment 26•6 years ago
|
||
Comment 27•6 years ago
|
||
![]() |
Assignee | |
Comment 28•6 years ago
|
||
![]() |
Assignee | |
Updated•6 years ago
|
![]() |
Assignee | |
Updated•6 years ago
|
Comment 30•6 years ago
|
||
Did anything happen here? I am trying the GPO on Firefox 65. No change in the issue.
Comment 31•6 years ago
|
||
(In reply to ccc from comment #30)
Did anything happen here? I am trying the GPO on Firefox 65. No change in the issue.
No; you'll see this bug get resolved fixed and a version number. I'm afraid we don't have a target date yet, but we're working on one. Feel free to ping me outside the bug if you need more information.
Comment 32•6 years ago
|
||
This is my testing with Firefox ESR 60.5.0
I only activated 1 setting in GPO which is Import Enterprise Roots = Enabled
My server certificate is internally sign with the following hierarchy
root1 (root cert) - ca1 (intermediate cert) - server cert
root1 is imported to Trusted Root Certification Authorities Store
ca1 is imported to Intermediate Certificate Authorities Store
server cert is the signed server certificate, appended with the ca1 cert (intermediate)
(In reply to J.C. Jones [:jcj] (he/him) from comment #27)
OK, in the mean time, if the server provides the intermediate in the
handshake, that will solve your problem too.Marking this for the Q1 backlog.
Even when the server provides the intermediate in the handshake, the problem still presist
the following is my log file
you can see that the root1 certificate is correctly imported
[2392:Main Thread]: D/pipnss nsNSSComponent::ctor
[2392:Main Thread]: D/pipnss Beginning NSS initialization
[2392:Main Thread]: D/pipnss nsNSSComponent::InitializeNSS
[2392:Main Thread]: D/pipnss NSS Initialization beginning
[2392:Main Thread]: D/pipnss NSS profile at 'C:\Users\Hendry.Leo\AppData\Roaming\Mozilla\Firefox\Profiles\J1H24C1.DEF'1.DEF, 0, 1)
[2392:Main Thread]: D/pipnss inSafeMode: 0
[2392:Main Thread]: D/certverifier InitializeNSS(sql:C:\Users\Hendry.Leo\AppData\Roaming\Mozilla\Firefox\Profiles\J1H24C
[2392:Main Thread]: D/pipnss initialized NSS in r/w mode
[2392:Main Thread]: D/pipnss AccountHasFamilySafetyEnabled?
[2392:Main Thread]: D/pipnss Users subkey not present - Parental Controls not enabled
[2392:Main Thread]: D/pipnss certificate is trust anchor for TLS server auth
[2392:Main Thread]: D/pipnss Imported 'Microsoft Root Certificate Authority'
[2392:Main Thread]: D/pipnss certificate not trust anchor for TLS server auth
[2392:Main Thread]: D/pipnss skipping cert not trust anchor for TLS server auth
[2392:Main Thread]: D/pipnss certificate is trust anchor for TLS server auth
[2392:Main Thread]: D/pipnss Imported 'Microsoft Root Authority'
[2392:Main Thread]: D/pipnss certificate is trust anchor for TLS server auth
[2392:Main Thread]: D/pipnss Imported 'Microsoft Root Certificate Authority 2011'
[2392:Main Thread]: D/pipnss certificate not trust anchor for TLS server auth
[2392:Main Thread]: D/pipnss skipping cert not trust anchor for TLS server auth
[2392:Main Thread]: D/pipnss certificate is trust anchor for TLS server auth
[2392:Main Thread]: D/pipnss Imported 'DigiCert High Assurance EV Root CA'
[2392:Main Thread]: D/pipnss certificate is trust anchor for TLS server auth
[2392:Main Thread]: D/pipnss Imported 'Microsoft Root Certificate Authority 2010'
[2392:Main Thread]: D/pipnss certificate not trust anchor for TLS server auth
[2392:Main Thread]: D/pipnss skipping cert not trust anchor for TLS server auth
[2392:Main Thread]: D/pipnss certificate not trust anchor for TLS server auth
[2392:Main Thread]: D/pipnss skipping cert not trust anchor for TLS server auth
[2392:Main Thread]: D/pipnss imported 5 roots
[2392:Main Thread]: D/pipnss certificate is trust anchor for TLS server auth
[2392:Main Thread]: D/pipnss Imported 'root1<removed local domain name>'*
[2392:Main Thread]: D/pipnss imported 1 roots
[2392:Main Thread]: D/pipnss imported 0 roots
[2392:Main Thread]: D/pipnss NSS Initialization done
[2392:Main Thread]: D/pipnss nsNSSComponent: adding observers
[2392:LoadRoots]: D/pipnss loaded CKBI from c:\PROGRA2\MOZILL1
[2392:Socket Thread]: D/pipnss [1F6E9FE0] nsSSLIOLayerSetOptions: using TLS version range (0x0301,0x0304)
[2392:Socket Thread]: D/pipnss [1F6E9FE0] Socket set up
[2392:Socket Thread]: D/pipnss [1F6E9FE0] connecting SSL socket
[2392:Socket Thread]: E/pipnss [1F6E9FE0] Lower layer connect error: -5934
[2392:Socket Thread]: D/pipnss [1FFFD0C0] starting AuthCertificateHook
[2392:SSL Cert #1]: D/pipnss [0CF4FAB0] SSLServerCertVerificationJob::Run
[2392:SSL Cert #1]: D/certverifier Top of VerifyCert
[2392:SSL Cert #1]: D/certverifier NSSCertDBTrustDomain: CheckSignatureDigestAlgorithm
[2392:SSL Cert #1]: D/certverifier NSSCertDBTrustDomain: CheckSignatureDigestAlgorithm
[2392:SSL Cert #1]: D/certverifier NSSCertDBTrustDomain: IsChainValid
[2392:SSL Cert #1]: D/certverifier NSSCertDBTrustDomain: Top of CheckRevocation
[2392:SSL Cert #1]: D/certverifier OCSPCache::Get(2147F234,"") not in cache
[2392:SSL Cert #1]: D/certverifier NSSCertDBTrustDomain: no cached OCSP response
[2392:SSL Cert #1]: D/certverifier NSSCertDBTrustDomain: Top of CheckRevocation
[2392:SSL Cert #1]: D/certverifier NSSCertDBTrustDomain: no stapled OCSP response
[2392:SSL Cert #1]: D/certverifier OCSPCache::Get(2147F524,"") not in cache
[2392:SSL Cert #1]: D/certverifier NSSCertDBTrustDomain: no cached OCSP response
[2392:SSL Cert #1]: D/certverifier Setting up OCSP request: pre all path =/ pathlen=-1
[2392:SSL Cert #1]: D/pipnss nsNSSHttpRequestSession::trySendAndReceiveFcn to http://ocsp.digicert.com:80/
[2392:SSL Cert #1]: D/certverifier NSSCertDBTrustDomain: caching OCSP response
[2392:SSL Cert #1]: D/certverifier OCSPCache::Put(2147F524, "") added to cache
[2392:SSL Cert #1]: D/certverifier NSSCertDBTrustDomain: returning after VerifyEncodedOCSPResponse
[2392:SSL Cert #1]: D/pipnss AuthCertificate setting NEW cert 20B85C60
[2392:Socket Thread]: D/pipnss [1F6E9FE0] nsNSSSocketInfo::NoteTimeUntilReady
[2392:Socket Thread]: D/pipnss CanFalseStartCallback [1FFFD0C0] ok
[2392:Socket Thread]: D/pipnss [1FFFD0C0] HandshakeCallback: succeeded using TLS version range (0x0301,0x0304)
[2392:Socket Thread]: D/pipnss HandshakeCallback KEEPING existing cert
[2392:Socket Thread]: D/pipnss [1F6E9FE0] nsNSSSocketInfo::SetHandshakeCompleted
[2392:Socket Thread]: D/pipnss [0A7A2060] nsSSLIOLayerSetOptions: using TLS version range (0x0301,0x0304)
[2392:Socket Thread]: D/pipnss [0A7A2060] Socket set up
[2392:Socket Thread]: D/pipnss [0A7A2060] connecting SSL socket
[2392:Socket Thread]: E/pipnss [0A7A2060] Lower layer connect error: -5934
[2392:Socket Thread]: D/pipnss [0A745240] nsSSLIOLayerSetOptions: using TLS version range (0x0301,0x0304)
[2392:Socket Thread]: D/pipnss [0A745240] Socket set up
[2392:Socket Thread]: D/pipnss [0A745240] connecting SSL socket
[2392:Socket Thread]: E/pipnss [0A745240] Lower layer connect error: -5934
[2392:Socket Thread]: D/pipnss [0A745BE0] nsSSLIOLayerSetOptions: using TLS version range (0x0301,0x0304)
[2392:Socket Thread]: D/pipnss [0A745BE0] Socket set up
[2392:Socket Thread]: D/pipnss [0A745BE0] connecting SSL socket
[2392:Socket Thread]: E/pipnss [0A745BE0] Lower layer connect error: -5934
[2392:Socket Thread]: D/pipnss [0A745BE0] Shutting down socket
[2392:Socket Thread]: D/pipnss [0A745980] nsSSLIOLayerSetOptions: using TLS version range (0x0301,0x0304)
[2392:Socket Thread]: D/pipnss [0A745980] Socket set up
[2392:Socket Thread]: D/pipnss [0A745980] connecting SSL socket
[2392:Socket Thread]: E/pipnss [0A745980] Lower layer connect error: -5934
[2392:Socket Thread]: D/pipnss [0A7A22C0] nsSSLIOLayerSetOptions: using TLS version range (0x0301,0x0304)
[2392:Socket Thread]: D/pipnss [0A7A22C0] Socket set up
[2392:Socket Thread]: D/pipnss [0A7A22C0] connecting SSL socket
[2392:Socket Thread]: E/pipnss [0A7A22C0] Lower layer connect error: -5934
[2392:Socket Thread]: D/pipnss [0A7A2100] starting AuthCertificateHook
[2392:SSL Cert #2]: D/pipnss [0CF4FEF0] SSLServerCertVerificationJob::Run
[2392:SSL Cert #2]: D/certverifier Top of VerifyCert
[2392:SSL Cert #2]: D/certverifier NSSCertDBTrustDomain: CheckSignatureDigestAlgorithm
[2392:SSL Cert #2]: D/certverifier NSSCertDBTrustDomain: CheckSignatureDigestAlgorithm
[2392:SSL Cert #2]: D/certverifier NSSCertDBTrustDomain: IsChainValid
[2392:SSL Cert #2]: D/certverifier NSSCertDBTrustDomain: Top of CheckRevocation
[2392:SSL Cert #2]: D/certverifier OCSPCache::Get(224FF09C,"") not in cache
[2392:SSL Cert #2]: D/certverifier NSSCertDBTrustDomain: no cached OCSP response
[2392:SSL Cert #2]: D/certverifier NSSCertDBTrustDomain: Top of CheckRevocation
[2392:SSL Cert #2]: D/certverifier NSSCertDBTrustDomain: no stapled OCSP response
[2392:SSL Cert #2]: D/certverifier OCSPCache::Get(224FF38C,"") not in cache
[2392:SSL Cert #2]: D/certverifier NSSCertDBTrustDomain: no cached OCSP response
[2392:SSL Cert #2]: D/certverifier Setting up OCSP request: pre all path =/GTSGIAG3 pathlen=9
[2392:SSL Cert #2]: D/pipnss nsNSSHttpRequestSession::trySendAndReceiveFcn to http://ocsp.pki.goog:80/GTSGIAG3
[2392:Socket Thread]: D/pipnss [0A745520] starting AuthCertificateHook
[2392:SSL Cert #3]: D/pipnss [0A7E1230] SSLServerCertVerificationJob::Run
[2392:SSL Cert #3]: D/certverifier Top of VerifyCert
[2392:SSL Cert #3]: D/certverifier NSSCertDBTrustDomain: CheckSignatureDigestAlgorithm
[2392:SSL Cert #3]: D/certverifier NSSCertDBTrustDomain: CheckSignatureDigestAlgorithm
[2392:SSL Cert #3]: D/certverifier NSSCertDBTrustDomain: IsChainValid
[2392:SSL Cert #3]: D/certverifier NSSCertDBTrustDomain: Top of CheckRevocation
[2392:SSL Cert #3]: D/certverifier OCSPCache::Get(225FEECC,"") not in cache
[2392:SSL Cert #3]: D/certverifier NSSCertDBTrustDomain: no cached OCSP response
[2392:SSL Cert #3]: D/certverifier NSSCertDBTrustDomain: Top of CheckRevocation
[2392:SSL Cert #3]: D/certverifier NSSCertDBTrustDomain: no stapled OCSP response
[2392:SSL Cert #3]: D/certverifier OCSPCache::Get(225FF1BC,"") not in cache
[2392:SSL Cert #3]: D/certverifier NSSCertDBTrustDomain: no cached OCSP response
[2392:SSL Cert #3]: D/certverifier Setting up OCSP request: pre all path =/GTSGIAG3 pathlen=9
[2392:SSL Cert #3]: D/pipnss nsNSSHttpRequestSession::trySendAndReceiveFcn to http://ocsp.pki.goog:80/GTSGIAG3
[2392:Socket Thread]: D/pipnss [0A745B00] starting AuthCertificateHook
[2392:SSL Cert #4]: D/pipnss [0A7E1450] SSLServerCertVerificationJob::Run
[2392:SSL Cert #4]: D/certverifier Top of VerifyCert
[2392:SSL Cert #4]: D/certverifier NSSCertDBTrustDomain: CheckSignatureDigestAlgorithm
[2392:SSL Cert #4]: D/certverifier NSSCertDBTrustDomain: CheckSignatureDigestAlgorithm
[2392:SSL Cert #4]: D/certverifier NSSCertDBTrustDomain: IsChainValid
[2392:SSL Cert #4]: D/certverifier NSSCertDBTrustDomain: Top of CheckRevocation
[2392:SSL Cert #4]: D/certverifier OCSPCache::Get(226FF30C,"") not in cache
[2392:SSL Cert #4]: D/certverifier NSSCertDBTrustDomain: no cached OCSP response
[2392:SSL Cert #4]: D/certverifier NSSCertDBTrustDomain: Top of CheckRevocation
[2392:SSL Cert #4]: D/certverifier NSSCertDBTrustDomain: no stapled OCSP response
[2392:SSL Cert #4]: D/certverifier OCSPCache::Get(226FF5FC,"") not in cache
[2392:SSL Cert #4]: D/certverifier NSSCertDBTrustDomain: no cached OCSP response
[2392:SSL Cert #4]: D/certverifier Setting up OCSP request: pre all path =/GTSGIAG3 pathlen=9
[2392:SSL Cert #4]: D/pipnss nsNSSHttpRequestSession::trySendAndReceiveFcn to http://ocsp.pki.goog:80/GTSGIAG3
[2392:Socket Thread]: D/pipnss [0A7A2660] starting AuthCertificateHook
[2392:SSL Cert #5]: D/pipnss [0A7E1670] SSLServerCertVerificationJob::Run
[2392:SSL Cert #5]: D/certverifier Top of VerifyCert
[2392:SSL Cert #5]: D/certverifier NSSCertDBTrustDomain: CheckSignatureDigestAlgorithm
[2392:SSL Cert #5]: D/certverifier NSSCertDBTrustDomain: CheckSignatureDigestAlgorithm
[2392:SSL Cert #5]: D/certverifier NSSCertDBTrustDomain: IsChainValid
[2392:SSL Cert #5]: D/certverifier NSSCertDBTrustDomain: Top of CheckRevocation
[2392:SSL Cert #5]: D/certverifier OCSPCache::Get(227FF1CC,"") not in cache
[2392:SSL Cert #5]: D/certverifier NSSCertDBTrustDomain: no cached OCSP response
[2392:SSL Cert #5]: D/certverifier NSSCertDBTrustDomain: Top of CheckRevocation
[2392:SSL Cert #5]: D/certverifier NSSCertDBTrustDomain: no stapled OCSP response
[2392:SSL Cert #5]: D/certverifier OCSPCache::Get(227FF4BC,"") not in cache
[2392:SSL Cert #5]: D/certverifier NSSCertDBTrustDomain: no cached OCSP response
[2392:SSL Cert #5]: D/certverifier Setting up OCSP request: pre all path =/GTSGIAG3 pathlen=9
[2392:SSL Cert #5]: D/pipnss nsNSSHttpRequestSession::trySendAndReceiveFcn to http://ocsp.pki.goog:80/GTSGIAG3
[2392:SSL Cert #2]: D/certverifier NSSCertDBTrustDomain: caching OCSP response
[2392:SSL Cert #2]: D/certverifier OCSPCache::Put(224FF38C, "") added to cache
[2392:SSL Cert #2]: D/certverifier NSSCertDBTrustDomain: returning after VerifyEncodedOCSPResponse
[2392:SSL Cert #2]: D/pipnss AuthCertificate setting NEW cert 0A7A0980
[2392:Socket Thread]: D/pipnss [0A7A2100] HandshakeCallback: succeeded using TLS version range (0x0301,0x0304)
[2392:Socket Thread]: D/pipnss HandshakeCallback KEEPING existing cert
[2392:Socket Thread]: D/pipnss [0A7A2060] nsNSSSocketInfo::NoteTimeUntilReady
[2392:Socket Thread]: D/pipnss [0A7A2060] nsNSSSocketInfo::SetHandshakeCompleted
[2392:SSL Cert #3]: D/certverifier NSSCertDBTrustDomain: caching OCSP response
[2392:SSL Cert #3]: D/certverifier OCSPCache::Put(225FF1BC, "") already in cache - replacing
[2392:SSL Cert #3]: D/certverifier NSSCertDBTrustDomain: returning after VerifyEncodedOCSPResponse
[2392:SSL Cert #3]: D/pipnss AuthCertificate setting NEW cert 07656480
[2392:Socket Thread]: D/pipnss [0A745520] HandshakeCallback: succeeded using TLS version range (0x0301,0x0304)
[2392:Socket Thread]: D/pipnss HandshakeCallback KEEPING existing cert
[2392:Socket Thread]: D/pipnss [0A745240] nsNSSSocketInfo::NoteTimeUntilReady
[2392:Socket Thread]: D/pipnss [0A745240] nsNSSSocketInfo::SetHandshakeCompleted
[2392:SSL Cert #4]: D/certverifier NSSCertDBTrustDomain: caching OCSP response
[2392:SSL Cert #4]: D/certverifier OCSPCache::Put(226FF5FC, "") already in cache - replacing
[2392:SSL Cert #4]: D/certverifier NSSCertDBTrustDomain: returning after VerifyEncodedOCSPResponse
[2392:SSL Cert #4]: D/pipnss AuthCertificate setting NEW cert 0A7D67C0
[2392:Socket Thread]: D/pipnss [0A745B00] HandshakeCallback: succeeded using TLS version range (0x0301,0x0304)
[2392:Socket Thread]: D/pipnss HandshakeCallback KEEPING existing cert
[2392:Socket Thread]: D/pipnss [0A745980] nsNSSSocketInfo::NoteTimeUntilReady
[2392:Socket Thread]: D/pipnss [0A745980] nsNSSSocketInfo::SetHandshakeCompleted
[2392:SSL Cert #5]: D/certverifier NSSCertDBTrustDomain: caching OCSP response
[2392:SSL Cert #5]: D/certverifier OCSPCache::Put(227FF4BC, "") already in cache - replacing
[2392:SSL Cert #5]: D/certverifier NSSCertDBTrustDomain: returning after VerifyEncodedOCSPResponse
[2392:SSL Cert #5]: D/pipnss AuthCertificate setting NEW cert 0A745960
[2392:Socket Thread]: D/pipnss [0A7A2660] HandshakeCallback: succeeded using TLS version range (0x0301,0x0304)
[2392:Socket Thread]: D/pipnss HandshakeCallback KEEPING existing cert
[2392:Socket Thread]: D/pipnss [0A7A22C0] nsNSSSocketInfo::NoteTimeUntilReady
[2392:Socket Thread]: D/pipnss [0A7A22C0] nsNSSSocketInfo::SetHandshakeCompleted
[2392:Socket Thread]: D/pipnss [0A745240] Shutting down socket
[2392:Socket Thread]: D/pipnss [0A745980] Shutting down socket
[2392:Socket Thread]: D/pipnss [0A7A22C0] Shutting down socket
[2392:Socket Thread]: D/pipnss [0A857160] nsSSLIOLayerSetOptions: using TLS version range (0x0301,0x0304)
[2392:Socket Thread]: D/pipnss [0A857160] Socket set up
[2392:Socket Thread]: D/pipnss [0A857160] connecting SSL socket
[2392:Socket Thread]: E/pipnss [0A857160] Lower layer connect error: -5934
[2392:Socket Thread]: D/pipnss [0A857EE0] starting AuthCertificateHook
[2392:SSL Cert #2]: D/pipnss [0A885450] SSLServerCertVerificationJob::Run
[2392:SSL Cert #2]: D/certverifier Top of VerifyCert
[2392:SSL Cert #2]: D/certverifier NSSCertDBTrustDomain: CheckSignatureDigestAlgorithm
[2392:SSL Cert #2]: D/certverifier NSSCertDBTrustDomain: CheckSignatureDigestAlgorithm
[2392:SSL Cert #2]: D/certverifier NSSCertDBTrustDomain: CheckSignatureDigestAlgorithm
[2392:SSL Cert #2]: D/certverifier NSSCertDBTrustDomain: CheckSignatureDigestAlgorithm
[2392:SSL Cert #2]: D/pipnss [0A857EE0][0A858460] Before dispatching CertErrorRunnable
[2392:Main Thread]: D/pipnss [0A857EE0][0A858460] top of CheckCertOverrides
[2392:Main Thread]: D/pipnss [0A857EE0][0A858460] no HSTS or HPKP - overrides allowed
[2392:Main Thread]: D/pipnss [0A857EE0][0A858460] Certificate error was not overridden
[2392:Socket Thread]: D/pipnss [0A857160] polling SSL socket right after certificate verification failed or NSS shutdown or SDR logout 6
[2392:Socket Thread]: D/pipnss [0A857160] Shutting down socket
[2392:Socket Thread]: D/pipnss [0A7A2060] Shutting down socket
[2392:Socket Thread]: D/pipnss [1F6E9FE0] Shutting down socket
[2392:Main Thread]: D/pipnss receiving profile change or XPCOM shutdown notification
[2392:Main Thread]: D/pipnss nsNSSComponent::ShutdownNSS
[2392:Main Thread]: D/certverifier OCSPCache::Clear: clearing cache
[2392:Main Thread]: D/pipnss receiving profile change or XPCOM shutdown notification
[2392:Main Thread]: D/pipnss nsNSSComponent::ShutdownNSS
[2392:Main Thread]: D/pipnss nsNSSComponent::dtor
[2392:Main Thread]: D/pipnss nsNSSComponent::ShutdownNSS
[2392:Main Thread]: D/pipnss nsNSSComponent::dtor finished
Comment 33•6 years ago
|
||
![]() |
Assignee | |
Comment 34•6 years ago
|
||
(In reply to ghost.orchid2001 from comment #33)
Created attachment 9040312 [details]
server cert with intermediate.png
Can you file a new bug with as much detail as you can include? (Looking at what you've said so far, the quickest way for me to help you is if I can look at the actual certificates you're using.)
https://bugzilla.mozilla.org/enter_bug.cgi?product=Core&component=Security%3A%20PSM
Thanks.
Comment 35•6 years ago
|
||
I have open new bug
https://bugzilla.mozilla.org/show_bug.cgi?id=1524903
(In reply to Dana Keeler (she/her) (use needinfo) (:keeler for reviews) from comment #34)
(In reply to ghost.orchid2001 from comment #33)
Created attachment 9040312 [details]
server cert with intermediate.pngCan you file a new bug with as much detail as you can include? (Looking at what you've said so far, the quickest way for me to help you is if I can look at the actual certificates you're using.)
https://bugzilla.mozilla.org/enter_bug.cgi?product=Core&component=Security%3A%20PSM
Thanks.
![]() |
Assignee | |
Updated•6 years ago
|
![]() |
Assignee | |
Comment 36•6 years ago
|
||
![]() |
Assignee | |
Comment 37•6 years ago
|
||
This is complicated enough that I'm going to break it up into Windows first and then MacOS.
![]() |
Assignee | |
Comment 38•6 years ago
|
||
Comment 39•6 years ago
|
||
![]() |
||
Comment 40•6 years ago
|
||
bugherder |
Comment 41•6 years ago
|
||
Is this upliftable to ESR and/or beta?
![]() |
Assignee | |
Comment 42•6 years ago
|
||
I wouldn't be comfortable with that - there are a number of bugs we would have to uplift as well, and there's already been one regression.
Comment 43•6 years ago
|
||
Enterprises need to leverage ESR for supportability and maintability. Not being able to centrally manage certificates is a major gap. Frankly this should be table stakes. I'd strongly ask you to reconsider bringing this back to ESR.
Comment 44•6 years ago
|
||
(In reply to scott.driver42 from comment #43)
Enterprises need to leverage ESR for supportability and maintability. Not being able to centrally manage certificates is a major gap. Frankly this should be table stakes. I'd strongly ask you to reconsider bringing this back to ESR.
This would be declining to move a large number of patches back to ESR 60 (from here in 67). ESR 68 is the next train, starting mid-month, and this (and everything else since 60) would be included. See https://wiki.mozilla.org/Release_Management/Calendar
Comment 46•6 years ago
|
||
I just tested FF 67.0b8 in my lab and can confirm that it works correctly, loading the intermediate and root certs from the Windows OS store. I have the enterprise_roots.enable set to true in both a mozilla.cfg file and via the Firefox ADMX file. Both are pushed via GPO.
Comment 48•6 years ago
|
||
Bugbug thinks this bug is a regression, but please revert this change in case of error.
![]() |
Assignee | |
Updated•6 years ago
|
Description
•