Add Chunghwa Telecom's HiPKI Root CA - G1 root certificate to NSS
Categories
(NSS :: CA Certificates Code, task, P1)
Tracking
(Not tracked)
People
(Reporter: kathleen.a.wilson, Assigned: jschanck)
References
Details
(Whiteboard: December 2021 Batch of Root Changes)
Attachments
(2 files)
This bug requests inclusion in the NSS root store of the following root certificates owned by Chunghwa Telecom.
Friendly Name: HiPKI Root CA - G1
Cert Location: http://eca.hinet.net/download/HRCA_b64.crt
SHA-1 Fingerprint: 6A92E4A8EE1BEC964537E3295749CD96E3E5D260
SHA-256 Fingerprint: F015CE3CC239BFEF064BE9F1D2C417E1A0264A0A94BE1F0C8D121864EB6949CC
Trust Flags: Websites
Test URL: https://good.hipkig1ev.hinet.net
This CA has been assessed in accordance with the Mozilla project guidelines, and the certificate approved for inclusion in bug #1563417
The next steps are as follows:
- A representative of the CA must confirm that all the data in this bug is correct, and that the correct certificate has been attached.
- A Mozilla representative creates a patch with the new certificates.
- The Mozilla representative requests that another Mozilla representative review the patch.
- The Mozilla representative adds (commits) the patch to NSS, then closes this bug as RESOLVED FIXED.
- At some time after that, various Mozilla products will move to using a version of NSS which contains the certificate. This process is mostly under the control of the release drivers for those products.
Reporter | ||
Comment 1•3 years ago
|
||
Li-Chun, Please see step #1 above.
Comment 2•3 years ago
|
||
Hi, Kathleen,
(In reply to Kathleen Wilson from comment #0)
Created attachment 9243343 [details]
HRCA_b64.crtThis bug requests inclusion in the NSS root store of the following root certificates owned by Chunghwa Telecom.
Friendly Name: HiPKI Root CA - G1
Cert Location: http://eca.hinet.net/download/HRCA_b64.crt
SHA-1 Fingerprint: 6A92E4A8EE1BEC964537E3295749CD96E3E5D260
SHA-256 Fingerprint: F015CE3CC239BFEF064BE9F1D2C417E1A0264A0A94BE1F0C8D121864EB6949CC
Trust Flags: Websites
Test URL: https://good.hipkig1ev.hinet.net
Test USL:
Valid: https://good.hipkig1ev.hinet.net
Expired: https://expired.hipkig1ev.hinet.net
Revoked: https://revoked.hipkig1ev.hinet.net
For other information in the bug is correct and the correct certificate has been attached.
Regards,
Li-Chun
This CA has been assessed in accordance with the Mozilla project guidelines, and the certificate approved for inclusion in bug #1563417
The next steps are as follows:
- A representative of the CA must confirm that all the data in this bug is correct, and that the correct certificate has been attached.
- A Mozilla representative creates a patch with the new certificates.
- The Mozilla representative requests that another Mozilla representative review the patch.
- The Mozilla representative adds (commits) the patch to NSS, then closes this bug as RESOLVED FIXED.
- At some time after that, various Mozilla products will move to using a version of NSS which contains the certificate. This process is mostly under the control of the release drivers for those products.
Assignee | ||
Comment 3•2 years ago
|
||
Reporter | ||
Updated•2 years ago
|
Comment 4•2 years ago
|
||
Description
•