Firefox Rejects Certificate with Policy Mappings Extension (Error code: SEC_ERROR_UNKNOWN_CRITICAL_EXTENSION)
Categories
(NSS :: Libraries, defect)
Tracking
(Not tracked)
People
(Reporter: 2295456556, Unassigned)
Details
Attachments
(8 files)
2.12 KB,
application/x-x509-ca-cert
|
Details | |
1.50 KB,
application/x-x509-ca-cert
|
Details | |
1.13 KB,
application/x-x509-ca-cert
|
Details | |
797 bytes,
application/x-x509-ca-cert
|
Details | |
56.57 KB,
image/png
|
Details | |
44.74 KB,
image/png
|
Details | |
56.60 KB,
image/png
|
Details | |
1.69 KB,
application/octet-stream
|
Details |
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36 Edg/123.0.0.0
Steps to reproduce:
1.Generating a mutated digital certificate with an additional Subject Alternative Name (SAN) of "ypj.test.com", along with its corresponding root CA and private key.
2.Configuring an Nginx web server to use the mutated certificate and private key in HTTPS mode.
3.Setting up the local machine (127.0.0.1) as the server and mapping "ypj.test.com" to 127.0.0.1 in the hosts file.
4.Adding the root CA to the system's trusted root certificate store using certutil.
5.Running nginx.exe. Accessing the URL "https://ypj.test.com:443" in a web browser, where the certificate's SAN matches the URL.
Firefox-version-113.0
Actual results:
Firefox rejects a certificate containing the critical Policy Mappings extension (OID 2.5.29.33) and displays the error code: SEC_ERROR_UNKNOWN_CRITICAL_EXTENSION. Conversely, Chrome correctly accepts the certificate.
There are two issues identified:
- Firefox fails to parse the OID 2.5.29.33 (Policy Mappings) and incorrectly treats it as an unknown extension.
- Firefox blocks normal access due to this failure.
Expected results:
Firefox should behave consistently with Chrome by:
- Correctly parsing the OID 2.5.29.33 as Policy Mappings.
- If the Policy Mappings field is valid, Firefox should pass the verification and allow normal access.
Please address this inconsistency to ensure proper handling of the Policy Mappings extension in certificates.
Reporter | ||
Comment 1•1 year ago
|
||
Reporter | ||
Comment 2•1 year ago
|
||
Reporter | ||
Comment 3•1 year ago
|
||
Reporter | ||
Comment 4•1 year ago
|
||
Reporter | ||
Comment 5•1 year ago
|
||
Reporter | ||
Comment 6•1 year ago
|
||
Reporter | ||
Comment 7•1 year ago
|
||
![]() |
||
Comment 8•11 months ago
|
||
At this time, mozilla::pkix does not support the policy mappings extension, and we have no plans to support it. The baseline requirements recommend that it not be used, and we see no reason to support it.
Description
•