The default bug view has changed. See this FAQ.

CA Certificates
14 years ago
9 years ago


(Reporter: William Jon McCann, Assigned: Frank Hecker)





14 years ago
User-Agent:       Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.3) Gecko/20030313
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.3) Gecko/20030313

I'm not affiliated with the US Department of Defense but it seems that the DoD
root CA should be trusted in the Mozilla database.

I think that adding this would help mozilla browser acceptance in US government

The Cert. Hierarchy looks like this:

DoD Class 3 Root CA
    DOD Class 3 Email CA-3

where the user's name is FIRST LAST.

Reproducible: Always

Steps to Reproduce:

Comment 1

14 years ago
Severity: normal → enhancement
Component: Daemon → Client Library
OS: Linux → All
QA Contact: junruh → bmartin
Assignee: ssaux → wchang0222
Component: Client Library → Libraries
Product: PSM → NSS
QA Contact: bmartin → bishakhabanerjee
where does one find this root CA cert?

Comment 3

13 years ago
(In reply to comment #2)
> where does one find this root CA cert?

I think this is the one at

But note that this is not a WebTrust-audited CA :-)

Nelson/Wan-Teh: If you'd like I can accept this bug.
Yes, Frank, please take this enhancement request and add it to the list of
candidates for your consideration.  Thanks.
Ever confirmed: true
Assignee: wchang0222 → hecker
Component: Libraries → CA Certificates
Product: NSS →
QA Contact: bishakhabanerjee
Version: unspecified → other

Comment 5

13 years ago
Accepting this bug. My initial comments: The last time I dealt with the issue of
the DoD PKI it was essentially a DoD-internal PKI for the use of U.S. military
personnel (active or retired), DoD civilian employees, DoD contractors, and
(maybe) allied forces (e.g., NATO). It was *not* intended for the use of the
general public (whether U.S. citizens or not), and I'm not aware that members of
the general public would ever be in a situation where they would encounter
SSL-enabled web servers, S/MIME email, or signed code that used DoD-issued

Based on that I would consider this an "intranet" CA (albeit for a very large
intranet) and based on my previous "meta-policy" comments I would recommend
*not* including this in Mozilla I'll leave this bug open for a period of
public comments, and then I'll close it with "WONTFIX" unless someone can
provide compelling reasons why I should do otherwise.

Comment 6

13 years ago
Hi Frank,

Thanks for taking this bug.  I opened it after I received a signed email,
certified by this CA, from someone in the DoD.  Anyone ever receiving a signed
email from any one of the groups you mentioned (whether they are in one of those
groups or are, like me, a civilian) would have a use for this addition.

Comment 7

13 years ago
Right, but your argument would apply to any possible private PKI: E.g., if Acme
Widgets sets up an internal PKI to issue email certs to their employees, and
then those employees send email to people outside the company, the recipients
will have an issue if they don't recognize and trust the Acme root CA cert. So
does that mean that the Acme root CA cert should be added to Mozilla

I don't think so. My position would be that if Acme employees want to use their
certs for external correspondence then they need to work with potential
recipients to ensure that their certs are recognized.

Comment 8

13 years ago
The last part of my argument could apply to any Root CA.  I was merely arguing
against your assertion that the "general public" would have no use for this.

I think it is entirely reasonable to expect and require that the commercial
sector use WebTrust-audited CAs.  The same goes for the private and most of the
public sector.

I am not sure it is reasonable to require that some parts of national
goverments,  or NATO, or the UN, to have a dependency on these external
resources.  I think there is an implicit trust in these bodies.

And then there is the market potential to consider.  If Firefox/Thunderbird Just
Work with DoD web sites and signed emails it makes it that much easier to
promote adoption with anyone working in or with the DoD (a pretty huge market).  

Currently, these certs have to be configured on every client on every system
they ever use.  This means that someone has to write documentation for this. 
And perform testing.  This is a lot more work than doing nothing.  This means
that by default new browsers won't be supported - as a policy.

Comment 9

13 years ago

The government organizations are in no way required to use the built-in roots of
the Mozilla products. They can install their own roots in their cert database
for internal computers if they like, through trusted means other than
downloading the binaries from .

The problem only exists for interoperability between the internal DoD PKI and
the outside world, primarily for S/MIME e-mails .

This case perhaps needs a different solution, involving cross-certification of
the DoD root CA by one of the public included in Mozilla . Cross-certification
isn't supported currently by NSS/PSM/Mozilla, but is being worked on for NSS .

Comment 10

12 years ago
I'm resolving this bug as WONTFIX. For reasons stated in my previous comments,
it's not clear that the DoD PKI meets our policy requirements as being a CA for
use by the general public or otherwise "[providing] some service relevant to
typical users of our software products" (as the draft certificate policy puts it). 

We can revisit this issue later if desired. Note that I'm not averse to
including government CAs in the pre-loaded CA certificate list; it's just that
IMO this is most justifiable in the case of of PKI-enabled applications like
secure government communications to/from ordinary citizens (e.g., using S/MIME
email) or government web sites used by ordinary citizens. I don't see this as
the case with the DoD PKI, which to my knowledge is oriented primarily toward
DoD services and agencies, DoD contractors, and those doing business with the
aforementioned groups.
Last Resolved: 12 years ago
Resolution: --- → WONTFIX

Comment 11

10 years ago
I would like to see this bug reconsidered.  With the addition of the annoying SSL error page in Firefox 3, it becomes a much greater issue.

From my perspective, all US Army personnel use AKO (Army Knowledge Online).  It is a portal site and includes things like web mail and more that all soldiers must use.  This is a pretty large demographic, and as far as I know the other services have similar sites.

Comment 12

9 years ago
for people unfamiliar with that, it's: which redirects to:

which fails instantly.

the second hit is:
which is a gateway.

the first three primary links fail with the same error for the same reason:

contact information seems to be present here:

interestingly, one of those links is:
AKO browser/mail certificate problems
Installing the DoD root certificate <>

Which is of course blocked.

What is the DoD root certificate, and do I need it?
  	What is the DoD root certificate, and do I need it?
A certificate is a digital document providing the identity of a web site or individuals. The Army Portal uses a certificate to identify itself to its users and to enable secure connections. If you are receiving a warning that this site is untrusted/insecure, you will need to install the "DoD Certificate." To download the DoD Certificates, please go to Enter your AKO username & password. Select the link labeled DoD Root Certificate at the top. Click the link for InstallRoot V2.18.A and save the file to your desktop. After the file has completely downloaded, go to your desktop and follow the directions on the page.

NOTE: This is not a CAC certificate nor does this certificate have any association with a Common Access Card (CAC). This certificate is only used to ensure that the security of the AKO/DKO website is verified by the DoD.

Which has:
NOTE: If you area Firefox user, click here to download the DoD add-on for CAC authentication. Please read and follow the setup instructions carefully.

This is *VERY* strange. It took me around 4-5 exemptions and probably 15-20 clicks in order to get to this point. And by now if I was actually being phished, I'd have accepted someone's root CA blindly.

For reference, the official bits seem to come from:

And require JavaScript enabled (I'm using NoScript and one time temporary grants in order to navigate this maze).

I think someone should contact them and ask. This whole experience is strange, but it should be noted that right now they're clearly trying to reconfigure Firefox beyond merely adding a CA certificate.

One further note: the addon has a prelicense which claims to be GPL, I can't figure out why.
Making a root CA cert available for download ONLY from an https (SSL) server
whose own cert depends on that same root CA cert is just silly.
You need to log in before you can comment on or make changes to this bug.