To confirm the bug is simple:
1) go to https://www.ingdirect.it
and open the certificate details. Into the extensions you can see the CA access info field with the value OCSP: URI: http://ocsp.verisign.com
This site correctly support OCSP (moreover you can also see CRL support even if it is an obsolete approach for certificate revocation)
2) go to https://www.poste.it
open the certificate details. In the extensions you cannot see any CA access info field nor any CRL support field
If you don't see any warning message from Firefox about this last issue (I say again that it's a security issue) you can mark this bug "confirmed"
To confirm the bug is simple: /www.ingdirect. it ocsp.verisign. com
1) go to
https:/
and open the certificate details. Into the extensions you can see the CA access info field with the value OCSP: URI: http://
This site correctly support OCSP (moreover you can also see CRL support even if it is an obsolete approach for certificate revocation)
2) go to /www.poste. it
https:/
open the certificate details. In the extensions you cannot see any CA access info field nor any CRL support field
If you don't see any warning message from Firefox about this last issue (I say again that it's a security issue) you can mark this bug "confirmed"