Closed Bug 1733012 Opened 3 years ago Closed 2 years ago

Add Chunghwa Telecom's HiPKI Root CA - G1 root certificate to NSS

Categories

(NSS :: CA Certificates Code, task, P1)

Tracking

(Not tracked)

RESOLVED FIXED

People

(Reporter: kathleen.a.wilson, Assigned: jschanck)

References

Details

(Whiteboard: December 2021 Batch of Root Changes)

Attachments

(2 files)

Attached file HRCA_b64.crt

This bug requests inclusion in the NSS root store of the following root certificates owned by Chunghwa Telecom.

Friendly Name: HiPKI Root CA - G1
Cert Location: http://eca.hinet.net/download/HRCA_b64.crt
SHA-1 Fingerprint: 6A92E4A8EE1BEC964537E3295749CD96E3E5D260
SHA-256 Fingerprint: F015CE3CC239BFEF064BE9F1D2C417E1A0264A0A94BE1F0C8D121864EB6949CC
Trust Flags: Websites
Test URL: https://good.hipkig1ev.hinet.net

This CA has been assessed in accordance with the Mozilla project guidelines, and the certificate approved for inclusion in bug #1563417

The next steps are as follows:

  1. A representative of the CA must confirm that all the data in this bug is correct, and that the correct certificate has been attached.
  2. A Mozilla representative creates a patch with the new certificates.
  3. The Mozilla representative requests that another Mozilla representative review the patch.
  4. The Mozilla representative adds (commits) the patch to NSS, then closes this bug as RESOLVED FIXED.
  5. At some time after that, various Mozilla products will move to using a version of NSS which contains the certificate. This process is mostly under the control of the release drivers for those products.

Li-Chun, Please see step #1 above.

Blocks: 1733014

Hi, Kathleen,

(In reply to Kathleen Wilson from comment #0)

Created attachment 9243343 [details]
HRCA_b64.crt

This bug requests inclusion in the NSS root store of the following root certificates owned by Chunghwa Telecom.

Friendly Name: HiPKI Root CA - G1
Cert Location: http://eca.hinet.net/download/HRCA_b64.crt
SHA-1 Fingerprint: 6A92E4A8EE1BEC964537E3295749CD96E3E5D260
SHA-256 Fingerprint: F015CE3CC239BFEF064BE9F1D2C417E1A0264A0A94BE1F0C8D121864EB6949CC
Trust Flags: Websites
Test URL: https://good.hipkig1ev.hinet.net

Test USL:

Valid: https://good.hipkig1ev.hinet.net
Expired: https://expired.hipkig1ev.hinet.net
Revoked: https://revoked.hipkig1ev.hinet.net

For other information in the bug is correct and the correct certificate has been attached.

Regards,

Li-Chun 

This CA has been assessed in accordance with the Mozilla project guidelines, and the certificate approved for inclusion in bug #1563417

The next steps are as follows:

  1. A representative of the CA must confirm that all the data in this bug is correct, and that the correct certificate has been attached.
  2. A Mozilla representative creates a patch with the new certificates.
  3. The Mozilla representative requests that another Mozilla representative review the patch.
  4. The Mozilla representative adds (commits) the patch to NSS, then closes this bug as RESOLVED FIXED.
  5. At some time after that, various Mozilla products will move to using a version of NSS which contains the certificate. This process is mostly under the control of the release drivers for those products.
Assignee: nobody → jschanck
Status: NEW → ASSIGNED
Severity: -- → N/A
Status: ASSIGNED → RESOLVED
Closed: 2 years ago
Priority: -- → P1
Resolution: --- → FIXED
Target Milestone: --- → 3.74
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: