Add "Certainly Root R1" and "Certainly Root E1" root certificates to NSS
Categories
(NSS :: CA Certificates Code, task)
Tracking
(Not tracked)
People
(Reporter: kathleen.a.wilson, Assigned: djackson)
References
Details
(Whiteboard: June 2022 batch of root changes)
Attachments
(3 files)
This bug requests inclusion in the NSS root store of the following root certificates owned by Certainly LLC.
Friendly Name: Certainly Root R1
Cert Location: http://root-r1.certainly.com
SHA-1 Fingerprint: A050EE0F2871F427B2126D6F509625BACC8642AF
SHA-256 Fingerprint: 77B82CD8644C4305F7ACC5CB156B45675004033D51C60C6202A8E0C33467D3A0
Trust Flags: Websites
Test URL: https://valid.root-r1.certainly.com
Friendly Name: Certainly Root E1
Cert Location: http://root-e1.certainly.com/
SHA-1 Fingerprint: F9E16DDC0189CFD58245633EC5377DC2EB936F2B
SHA-256 Fingerprint: B4585F22E4AC756A4E8612A1361C5D9D031A93FD84FEBB778FA3068B0FC42DC2
Trust Flags: Websites
Test URL: https://valid.root-e1.certainly.com
This CA has been assessed in accordance with the Mozilla project guidelines, and the certificates approved for inclusion in bug #1727941
The next steps are as follows:
- A representative of the CA must confirm that all the data in this bug is correct, and that the correct certificates have been attached.
- A Mozilla representative creates a patch with the new certificates.
- The Mozilla representative requests that another Mozilla representative review the patch.
- The Mozilla representative adds (commits) the patch to NSS, then closes this bug as RESOLVED FIXED.
- At some time after that, various Mozilla products will move to using a version of NSS which contains the certificates. This process is mostly under the control of the release drivers for those products.
| Reporter | ||
Comment 1•3 years ago
|
||
| Reporter | ||
Comment 2•3 years ago
|
||
| Reporter | ||
Updated•3 years ago
|
Comment 4•3 years ago
|
||
Representing Certainly, I confirm that all the data in this bug is correct, and that the correct certificates have been attached.
| Assignee | ||
Comment 5•3 years ago
|
||
Depends on D148824
| Assignee | ||
Comment 6•3 years ago
|
||
| Assignee | ||
Updated•3 years ago
|
| Reporter | ||
Comment 7•3 years ago
|
||
Wayne, Please test in Firefox Nightly. I get errors when I try to browse to these test URLs, and I'm not seeing these errors for other websites.
Unable to connect
An error occurred during a connection to valid.root-e1.certainly.com.
The site could be temporarily unavailable or too busy. Try again in a few moments.
If you are unable to load any pages, check your computer’s network connection.
If your computer or network is protected by a firewall or proxy, make sure that Nightly is permitted to access the Web.
Comment 8•3 years ago
|
||
Hi Kathleen, those sites were experiencing some issues but should now be stable for your testing.
I have tested using those sites in Nightly in Windows 11 and macOS, and I am seeing something that I can't explain. When examining the certificate chain in Nightly, I see the r1 site chaining to the R1 root as expected. However, I see the e1 site chaining via the cross-cert to the Starfield G2 root. I think this could indicate a problem with the E1 root because I can't see anything in how the website is configured that would explain it. I also don't know how to force Firefox to ignore the cross-cert so that I can verify the E1 root.
| Reporter | ||
Comment 9•3 years ago
|
||
(In reply to Wayne Thayer from comment #8)
Hi Kathleen, those sites were experiencing some issues but should now be stable for your testing.
Hi Wayne, In Firefox Nightly with a new profile, both test websites work as expected now.
I have tested using those sites in Nightly in Windows 11 and macOS, and I am seeing something that I can't explain. When examining the certificate chain in Nightly, I see the r1 site chaining to the R1 root as expected. However, I see the e1 site chaining via the cross-cert to the Starfield G2 root. I think this could indicate a problem with the E1 root because I can't see anything in how the website is configured that would explain it. I also don't know how to force Firefox to ignore the cross-cert so that I can verify the E1 root.
I'm seeing the e1 site chaining correctly to the E1 root cert.
Maybe you are using a profile that you have previously used to browse to the e1 test site using the cross-cert? I think if you Distrust the Starfield G2 root, that it will force Firefox to find the other chain.
Comment 10•3 years ago
|
||
(In reply to Kathleen Wilson from comment #9)
(In reply to Wayne Thayer from comment #8)
I'm seeing the e1 site chaining correctly to the E1 root cert.
Maybe you are using a profile that you have previously used to browse to the e1 test site using the cross-cert? I think if you Distrust the Starfield G2 root, that it will force Firefox to find the other chain.
That was the problem. With a new profile, the E1 test website works as expected, chaining to the E1 root. Using my exiting profile, I had to distrust both the Starfield G2 root and the older Starfield Class 2 root before it would properly build a chain to the Certainly E1 root when visiting https://valid.root-e1.certainly.com.
Description
•