ipsCA Global and ipsCA Main root certificates not supported in Firefox
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Mozilla Firefox |
Expired
|
Medium
|
|||
firefox (Ubuntu) |
Triaged
|
Wishlist
|
Unassigned |
Bug Description
Binary package hint: firefox
ipsCA is a company that provides security certificates. It, evidently, provides the certificates to educational institutions for free. Many educational institutions in the US, including the one at which I am an instructor, use the ipsCA certificates. As of December 2009, Firefox is no longer supporting the ipsCA certificates. Here is the bug from the Mozilla bug tracker:
https:/
Why is this a problem? It is costing Ubuntu users. I am no longer in a position to recommend Ubuntu to students as the security warning screens scare the students.
In Mozilla Bugzilla #529286, J-pascual (j-pascual) wrote : | #5 |
In Mozilla Bugzilla #529286, Kwilson-r (kwilson-r) wrote : | #6 |
Starting the information gathering and verification phase as per:
https:/
In Mozilla Bugzilla #529286, Kwilson-r (kwilson-r) wrote : | #7 |
Created attachment 413219
Initial Information Gathering Document
The attached document summarizes the information that has been gathered and
verified as per
https:/
The items highlighted in yellow indicate where further information or
clarification is needed. Please review the full document for accuracy and
completeness.
In Mozilla Bugzilla #529286, Kwilson-r (kwilson-r) wrote : | #8 |
Created attachment 413220
Editable Version of Info Gathering Doc
In Mozilla Bugzilla #529286, Mike Connor (mconnor) wrote : | #9 |
Looks like this bug is still blocking on further information from ipsCA. Given that there are no maintenance releases scheduled between now and December 29th, which will likely be a problem for ipsCA's customers...
In any case, we need the details requested by Kathleen here... Juan, can you follow up with the required information?
In Mozilla Bugzilla #529286, Eckardpp (eckardpp) wrote : | #10 |
The University of Wisconsin-Eau Claire 9along with ~12,000 other universities)also uses ipsCA certificates. I cannot speak for the other universities but we are seeing exactly the same issue as Kathleen Wilson has stated.
Chip Eckardt
In Mozilla Bugzilla #529286, Ndr-v (ndr-v) wrote : | #11 |
University of Florida is also experiencing this issue. This will cause major problems if Mozilla doesn't add the new CA from IPSCA.
In Mozilla Bugzilla #529286, Abraham-46 (abraham-46) wrote : | #12 |
Several sites at Ohio State University are also affected by this.
In Mozilla Bugzilla #529286, Ndr-v (ndr-v) wrote : | #13 |
Is there any way someone at Mozilla can update us on the status of this issue? Is it likely this will be resolved and released in a Firefox update soon? Thank you very much!
In Mozilla Bugzilla #529286, Eddy-nigg (eddy-nigg) wrote : | #14 |
The request to have a new root enabled was made at the 2009-11-17 by ipsCA at this bug, Kathleen follow up the day after. There were some additional issues which were discussed at the mozilla.
In Mozilla Bugzilla #529286, Ballard (ballard) wrote : | #15 |
RE: Eddy Nigg (StartCom) @ 2009-12-22 10:16:08 PST
Do you happen to have a pointer to the issues in the mozilla.
-Jeff
In Mozilla Bugzilla #529286, Eddy-nigg (eddy-nigg) wrote : | #16 |
There are a few threads, these might give some information: http://
http://
In Mozilla Bugzilla #529286, Robinsom (robinsom) wrote : | #17 |
Actually, the conversations you linked to are discussing this bug:
https:/
Which has been marked as fixed since late November.
As far as I can tell, the only action items for the inclusion of the new root are in this bug.
In Mozilla Bugzilla #529286, Eddy-nigg (eddy-nigg) wrote : | #18 |
(In reply to comment #12)
> As far as I can tell, the only action items for the inclusion of the new root
> are in this bug.
Correct. I'm just saying that from experience and knowledge about the inclusion process, this will take a while. The previous issues might influence the discussions a bit as well. See also https:/
In Mozilla Bugzilla #529286, Ndr-v (ndr-v) wrote : | #19 |
Thank you for the feedback and link to that time line. I guess what most of us end users are wondering is, can Mozilla provide an estimate on the date the updated CA will be added to Firefox? Us non-profits are looking at spending thousands of dollars in a hurry to replace certs. If we had an idea when it might be included, it would save a lot of headache. It kind of sucks when we push our users so hard to switch to Firefox from IE and now we're going to have to tell them, use IE for a while. Besides, replacing certs that quickly isn't possible. There is no doubt that most users will see the "untrusted site" error come Jan 1.
In Mozilla Bugzilla #529286, Eckardpp (eckardpp) wrote : | #20 |
I verified that the "untrusted site" error does not show in Internet Explorer 8. That will work for all our PC users, but we still have around 500 Mac users (the error also shows in Apple's Safari browser as well) and running IE is not an option for them.
In Mozilla Bugzilla #529286, Eddy-nigg (eddy-nigg) wrote : | #21 |
(In reply to comment #15)
> I verified that the "untrusted site" error does not show in Internet Explorer
> 8. That will work for all our PC users, but we still have around 500 Mac users
> (the error also shows in Apple's Safari browser as well) and running IE is not
> an option for them.
This might be an incomplete installation - does the server send the complete CA certificates chain as required?
In Mozilla Bugzilla #529286, Robinsom (robinsom) wrote : | #22 |
So, because ipsCA regenerated their root back in September to fix some of the problems in the previous bug, the ~1 year process starts over again?
In Mozilla Bugzilla #529286, Eddy-nigg (eddy-nigg) wrote : | #23 |
Mike, this isn't a good place for discussions, the mozilla.
In Mozilla Bugzilla #529286, Eckardpp (eckardpp) wrote : | #24 |
(In reply to comment #16)
> (In reply to comment #15)
> > I verified that the "untrusted site" error does not show in Internet Explorer
> > 8. That will work for all our PC users, but we still have around 500 Mac users
> > (the error also shows in Apple's Safari browser as well) and running IE is not
> > an option for them.
> This might be an incomplete installation - does the server send the complete CA
> certificates chain as required?
Yes.
In Mozilla Bugzilla #529286, David-rossde (david-rossde) wrote : | #25 |
To all those who are impatient for this certificate to be approved and implemented for Gecko-based products:
The presence of a root certificate in the NSS database used by Gecko-based products indicates that users can place some degree of trust in the use of that certificate for secure Web browsing. For that trust to be valid, the certificate authority owning the root certificate must undergo some scrutiny, which takes time.
The timeline for such scrutiny is described at <https:/
Thus, the problem lies in the hands of ipsCA and not Mozilla. As pointed out in comment #18, the very late recognition by ipsCA that they had to replace a root certificate that was about to expire compounded the problem.
Further expressions of the need for haste will not speed the process. Any shortcuts or other measures to hasten the process can only weaken the trust users have in the overall certificate database.
In Mozilla Bugzilla #529286, David-rossde (david-rossde) wrote : | #26 |
I almost forgot. Those who are anxious for these root certificates, who already trust them, and who have no patience with the Mozilla process for scrutinizing certificate authorities can download and install the root certificates themselves. The links are at <http://
When downloaded, open the Certificate Manager at the "Authorities" tab and select the Import button. On SeaMonkey, the Certificate Manager is reached from the menu bar via [Edit > Preferences > Privacy & Security > Certificates]. Since I don't use Firefox, I don't know the path.
In Mozilla Bugzilla #529286, Abraham-46 (abraham-46) wrote : | #27 |
At OSU, we will be undertaking other alternatives to the ipSCA certs for the time being. We believe this process is necessary and worth the time consumed.
In Mozilla Bugzilla #529286, Kwilson-r (kwilson-r) wrote : | #28 |
*** Bug 536406 has been marked as a duplicate of this bug. ***
In Mozilla Bugzilla #529286, Maxxer (lorenzo-milesi) wrote : | #29 |
Hi, sorry for the "annoying" questions, but is still there any missing information from IPSCA?
Is it possible to know an estimate date when the cert will be considered trusted?
I'm not putting pressure, it's just to know if we are more likely talking about weeks, months or year, as stated before.
Thanks!
In Mozilla Bugzilla #529286, Eddy-nigg (eddy-nigg) wrote : | #30 |
See my comment 13 and comment 16. Realistically this process has always taken something between 9 - 12 month. If there are problems it might take even longer than that and according to attachment 413219 , a new audit statement will have to be provided by ipsCA first. Hope this helps!
In Mozilla Bugzilla #529286, Jbecerra-mozilla (jbecerra-mozilla) wrote : | #31 |
*** Bug 542392 has been marked as a duplicate of this bug. ***
In Mozilla Bugzilla #529286, Gervase Markham (gerv-mozilla) wrote : | #32 |
As far as I can tell, this bug is still waiting (after 3 months) for ipsCA's response to Kathleen's Initial Information Gathering Document. As Eddy notes, they have had other issues to deal with meanwhile. But any delay here is not the responsibility of Mozilla.
If anyone has been sold an ipsCA certificate on the expectation that it would work in all popular browsers, they need to take that up with ipsCA.
Gerv
In Mozilla Bugzilla #529286, Benoit-n (benoit-n) wrote : | #33 |
I just emailed IPS to ask when this would be taken care of. Their response was:
Dear customer
Our technicians are gathering all the information required by Mozilla. Everything will be sent soon.
Best Regards
ipsCA support
In Mozilla Bugzilla #529286, Nick (morrownr) wrote : | #34 |
I am an instructor at a US educational institution that uses ipsCA certificates. The failure to resolve this issue is driving students away from Firefox. Out here in userland, most people don't care if ipsCA is at fault or if Mozilla is at fault. They simply want a product that works.
Getting this fixed in a release of Firefox that is available for download before fall semester starts is something that really needs to happen.
visibility: | private → public |
Chris Coulson (chrisccoulson) wrote : | #1 |
This isn't a security vulnerability
I'm not sure why you reported this here. The upstream bug report makes it perfectly clear about the process of including new certificates, and that process takes some time. We aren't going to be bypassing that process just because it takes a long time, so the certificate will appear in Ubuntu when Mozilla have added it, and not before
security vulnerability: | yes → no |
Changed in firefox (Ubuntu): | |
importance: | Undecided → Wishlist |
status: | New → Triaged |
Nick (morrownr) wrote : | #2 |
I reported this here because it is an issue that affects your product. This "it is to upstream to fix this" attitude is one reason that Linux has about 1% market share on the desktop. How can administrators go to a product that they can't count on? They can't as they will get fired.
This is a problem that has existed since the 4th quarter of 2009 and it is now the 3rd quarter of 2010. The progress on this issue is not acceptable. Would it be reasonable for someone at Canonical to contact Mozilla to discuss this issue? It certainly seems so to me.
This is an issue that is making the acceptance of Ubuntu at many educational institutions difficult. I will NOT be recommending Ubuntu until this issue is resolved.
Chris Coulson (chrisccoulson) wrote : | #3 |
Making threats such as "I will NOT be recommending Ubuntu until this issue is resolved" isn't going to make the issue be resolved any faster. As I pointed out, Mozilla have a well defined process for accepting and scrutinizing new certificates, which can take a long time (and rightly so. There would be no web of trust if we just accepted certificates on a whim because of a single users threats).
It's quite clear from the upstream bug report that the process of accepting the certificate is already under way (it's actually waiting on information from ipsCA, and has already been delayed because ipsCA had to replace a certificate which was close to expiring). You seem to be expecting us to just bypass Mozilla's process and add the certificate, and this will not be happening under any circumstances.
Nick (morrownr) wrote : | #4 |
What I expected was additional questions about the type of problems this is causing and how widespread the problem is. It is very difficult to convince people to try Linux on the desktop. When there are additional road-blocks such as this issue it becomes almost impossible.
I am very disappointed in the reception that this report received.
In Mozilla Bugzilla #529286, David-rossde (david-rossde) wrote : | #35 |
Regarding comment #29, you are free to download and install the root certificates yourself as cited in comment #21. Note that central maintenance of work stations in LANs and WANs -- such as might be practiced at your institution -- might allow for a central installation of the ipsCA root certificates in the workstations there without requiring each user to do it individually. If you don't trust ipsCA sufficiently for you to install its certificates now, then why would you think the Mozilla organization has more trust in ipsCA?
In Mozilla Bugzilla #529286, Nick (morrownr) wrote : | #36 |
Regarding comment #30. I think there is a fundamental misunderstanding of the message in comment #29.
If product market share does not matter then disregard rest.
My story is far from unique as I have found out while researching the issue: The tech support department at the university where I am an instructor has been a heavy recommender of Firefox to students who have had problems accessing university online resources (including online classes.) This changed in January of this year as the difficulties associated with Firefox due to the lack of ipsCA support made it more work than alternatives. University tech support folks generally go for the low hanging fruit. They could care less about the issues behind the scenes.
In researching this issue I have found ipsCA offers certificates to educational institutions for free. Further research seems to indicate they have a sizable market share with educational institutions. As I found evidence that educational institutions were using ipsCA, I wrote down the size of the student bodies. I stopped when the number went over one million. ipsCA appears to be a major player in an area where Firefox likely gains significant market share...or looses market share given bad decisions.
Further research and testing shows that Chrome does support the new ipsCA certificates and it appears to have matured enough for me to switch which browser I recommend to my students. I'll be working on my syllabi for fall over the next couple of weeks. Which browser will I recommend? It is really up to whether this issue is fixed.
Over the years I've been a big fan and supporter of Firefox. I'm at a decision point. Help me to help you.
Is the point now clear?
In Mozilla Bugzilla #529286, Lemworld (lemworld) wrote : | #37 |
I also agree with Nicky. We are at a crucial decision point where we are deploying computer images to classrooms and labs and we need to know whether or not our web-based applications will be supported when the Fall semester begins. We also have trumpeted Firefox and open source software, but we are at a point where we cannot continue to recommend Firefox to our faculty, staff, and students when they will not support the technologies on which we rely. Must we really spend untold amounts of money on Verisign certificates just so that the browser will not throw a confusing error, or shall we make a seamless transition to Chrome that fully supports our deployed environments?
In Mozilla Bugzilla #529286, Bpkroth (bpkroth) wrote : | #38 |
Really your choice should not be about which browser to use for your applications, but rather which certificates to use. ipsCA has shown that the trust you should place in them isn't much better than self signed certs. I mean they continued to issue certs after their CA was expired. If that's all the more trust you need for your applications then I wouldn't bother to worry about the annoyance you're giving your users. Might as well set up your own CA, distribute the cert to your lab machines, and deal with it that way.
If you need something more, then you should go out and get some real certs. digicert [1] has wildcard certs for ~$500. That's quite reasonable, they're well trusted, work in just about every client app I've tried (minus eudora :P), and can be managed fairly easily since typically one will work for a number of services.
I for one am much happier in the mozilla folks taking their time to diligently check the purported security that a particular CA offers before my browser magically trusts them.
In Mozilla Bugzilla #529286, Wyang (wyang) wrote : | #39 |
As far as I can tell, there is no reason ipsCA should not be considered trustworthy. All I see is that they made a mistake in delaying when they notified browser vendors of a new root CA. I'm nearly certain that all new certs issued after their old CA expired were issued using their new CA cert. However, I also think you've missed the point here. If an edu uses their own CA, they need to dedicate staff and resources to do that, and still deal with the fact that the cert exists in no browser right now. A number of people have pointed out central deployment of root CAs in browsers, but are you going to manage every student's personal computer as well? There are even some universities dropping computer labs, so the vast majority of computers are student-owned and not university-managed. If an edu uses ipsCA, the CA is already installed in at least IE and Chrome, but not Mozilla. The latter remains more convenient for helpdesks and users.
And lest we forget, ipsCA never did this: http://
No offense, but sometimes I think people need to act less like computers and more like humans that are capable of more than just following precisely written directions and processes. There are times when an established process no longer fulfills its purpose and does more harm than good, and as far as I can tell this is one of them. But of course everyone is entitled to their own opinion and choice of browser.
In Mozilla Bugzilla #529286, Ballard (ballard) wrote : | #40 |
Re 34:
"I'm nearly certain that all new certs issued after their old CA expired were issued using their new CA cert."
I was issued certificates approximately two weeks before IPS SERVERDORES expired. To say the least, these "free" certificates cost me quite a bit.
The pressure here needs to be put on ipsCA, not Mozilla. There are costs of doing business as a CA. It is only due to their negligence that they are not in the Mozilla browser.
Changed in firefox: | |
status: | Unknown → In Progress |
In Mozilla Bugzilla #529286, Eddy-nigg (eddy-nigg) wrote : | #41 |
(In reply to comment #34)
> And lest we forget, ipsCA never did this:
> http://
> get removed from Mozilla? Despite the fact that the incident specifically
> involved Mozilla?
Just for your knowledge, neither was ipsCA removed because of this: http://
In Mozilla Bugzilla #529286, Wyang (wyang) wrote : | #42 |
Re: comment #35: I'm not saying ipsCA isn't at fault, but ultimately between ipsCA and Mozilla, users (and IT staff dealing with the consequences) are the ones that are suffering. I suppose you could also say that it is due to Microsoft's lack of due diligence that ipsCA _is_ in there. Unfortunately, at least in our case, time is something that can be spent on the ipsCA problem, but hard cash to buy certs from elsewhere isn't available. I'm curious though, are we still actually waiting for ipsCA to send their information to Mozilla or is Mozilla in the review process now? No one from Mozilla or ipsCA seems to have posted an update here in awhile.
Re: comment #36: Thanks for the info, I admit I didn't know about that. I do feel like the scope is different though; while potentially more serious, it also involves a flaw in browsers (which Mozilla fixed but MS hadn't), while the first can't really be fixed in code.
In Mozilla Bugzilla #529286, Eddy-nigg (eddy-nigg) wrote : | #43 |
(In reply to comment #37)
> I'm curious though,
> are we still actually waiting for ipsCA to send their information to Mozilla or
> is Mozilla in the review process now? No one from Mozilla or ipsCA seems to
> have posted an update here in awhile.
I believe the last comment with relevance was comment 3. According to https:/
In Mozilla Bugzilla #529286, Joe-moore (joe-moore) wrote : | #44 |
The way I understand the issue, Firefox needs to trust the CA before they can pass that trust on. Err on the side of making sure the trust is well placed.
The bigger 'problem' is the nature of cert use. There are really 2 reasons to use a cert. One is to truly trust the source page, the other is to encrypt traffic on the wire. In a perfect world, the customer would know the difference--but we don't live in a perfect world. If I tell a casual user they can do their banking as long as the padlock in the browser is OK and the url says https--I'd better know *not just hope* that the browser did its homework in putting the cert in the trust path. Am I ready to suggest banking over chrome? Probably not. Firefox? Yes. IE--that's an entirely different set of questions :-)
If I'm running a bank with a few dozen certs, $500/cert is nothing. If I'm running a small computer science dept with a dozen production servers and 2 dozen test servers that all need certs I have a different business case. I may need to tell my users to go past an extra page of verification or (ugh!) use a browser that I don't trust to go to the bank with. Nothing against chrome--it just lives in a different world (assuming the statement made about chrome was correct--I didn't check it out myself).
In Mozilla Bugzilla #529286, Kwilson-r (kwilson-r) wrote : | #45 |
In order to proceed with this request as per
https:/
a representative of ipsCA must respond to the attached Initial Information Gathering Document as per Comment 2 and Comment 3.
This request is still in the "Information Gathering and Verification" phase.
See https:/
In Mozilla Bugzilla #529286, Nick (morrownr) wrote : | #46 |
Firefox, it has been good knowing you, but comment 40 makes it clear that I must move on. I've been testing Chrome since the initial reply to my initial comment on this thread. Chrome has matured to the point that it meets my needs. I'll also be changing the browser I recommend to my students.
All major browsers, including IE8, Chrome, and Safari, have current ipsCA support, with the exception of Firefox. If Firefox was in a monopoly position in the market, it might be a situation where this attitude could work. This isn't the case. Most market share data I have looked at shows Firefox market share peaking late last year. I'll forecast that the second half of 2010 is not good to the market share of Firefox. However, I'm moving on to Chrome I no longer care. Hasta la vista.
In Mozilla Bugzilla #529286, Eddy-nigg (eddy-nigg) wrote : | #47 |
Some interesting observations:
Microsoft is currently the only software vendor supporting these roots. Chrome, Safari and IE work on Windows platforms because they make use of the native certificates store. No other platform or browser works besides that at the moment.
Safari and Chrome use native libraries on the respective platforms for the moment. E.g. Mozilla NSS on Linux and Apple Keychain on MAC OSX. Firefox and Opera use their own certificate store.
As to market share, competition is great! But CA roots are a matter of declared policies and not a drive for market share. So long...
In Mozilla Bugzilla #529286, Chengw (chengw) wrote : | #48 |
Just to add some clarification to comment 42: Safari and Chrome only accept ipsCA certificates when running in Windows because they use the native certificate store in Windows that IE8 uses. Don't expect them to work on Safari or Chrome for Mac OS X or Linux because it won't! By way if you are teaching in higher ed and your school is somewhat typical like ours, your students will be overwhelmingly coming with Macs to the classroom this fall semester.
You truly get what you pay for (free in .edu's case): it is IMHO extremely unethical that ipsCA issued certificates that expire AFTER their root CA's expiration! Mind you they've had 11 YEARS to avoid this problem and instead waited until 9/7/2009 to just begin to solve it! We are now half a year into Mozilla's vetting process and they still have not responded to the INITIAL information gathering! Is it really worth keeping them as your SSL certificate issuer when you can get a wild card certificate for just over $200 and it will cover an *unlimited* number of websites and not student will have an issue?
For a more permanent solution, ask your school's IT department to seriously consider setting up a trusted root signed CA internally or use a 3rd party SSL managed service so you can issue your own certificates that are accepted everywhere. If you have large numbers of certificates it is a lot more cost effective and easier to manage in the long run.
In Mozilla Bugzilla #529286, 2011pgodofsk (2011pgodofsk) wrote : | #49 |
Overwhelming numbers of mac users? On what planet? What are you, a film school?
Furthermore, why can't firefox have an option to use the OS's built-in certificate store?
In Mozilla Bugzilla #529286, Chengw (chengw) wrote : | #50 |
On planet earth actually, what planet do you hail from? I don't understand it either: we are a laptop university and we give our students a choice between several models of PC laptops and Mac laptops. Since we've started offering Macs as an option 3 years ago, students have opted for on more and more. This year well over 70% of the incoming class has chosen a Mac, and that's after the extra fee for choosing a more expensive Mac!
Using the built-in certificate store of the OS makes the browser less portable to different operating systems. Also the info. security officer in my also would like to point out that it also makes the browser more vulnerable to security issues that are specific to an operating system. I suppose that's why, from a design standpoint, Mozilla and Opera picked to do it this way. Probably one of the many reasons why you can easily port Firefox to just about any operating system whereas that process is not so easy with Chrome (both being open source). You can even get Firefox for AmigaOS now :-)!
In Mozilla Bugzilla #529286, Wyang (wyang) wrote : | #51 |
Is that only considering students that buy from your program? I know that the large majority of students here (at JHU) do not buy from the university laptop purchase program and opt to purchase on their own, but it's possible that Mac buyers are more likely to use the program than PC buyers.
In Mozilla Bugzilla #529286, Johnath (johnath) wrote : | #52 |
Folks, this stopped being bug-relevant a while ago.
Changed in firefox: | |
importance: | Unknown → Wishlist |
In Mozilla Bugzilla #529286, Padra1g (padra1g) wrote : | #53 |
any chance this could be sorted ?? we use ff & ipsCA certificates - but most of our users have now opted for ie8 !! -
In Mozilla Bugzilla #529286, Robinsom (robinsom) wrote : | #54 |
padraig,
This has already been discussed here and the problem lies with ipsCA. They still have not provided the required information to continue with the next step. So, the correct group to ask is ipsCA and not Mozilla.
In Mozilla Bugzilla #529286, Kwilson-r (kwilson-r) wrote : | #55 |
Closing this bug because it has been over a year since the CA has provided input (see Comment #2 and Comment #40). If the CA wishes to proceed, they may create a new bug and provide all of the information listed here:
https:/
Changed in firefox: | |
status: | In Progress → Expired |
In Mozilla Bugzilla #529286, Jpickerell (jpickerell) wrote : | #56 |
I contacted ipsCA support today and thought I would post their response. It looks like there is not much hope of getting this resolved any time soon.
Submitted by RGU Tue 07 Feb 2012 - 17:31:36
Dear customer,
Currently, our root CA is recognized in Internet Explorer and all browsers which use Windows certificate store in Windows plattforms, i.e, Google Chrome or Apple Safari. Regarding Firefox, we are in process for being included within Firefox browser.
As a temp solution, you can add a code within your web page in order to enable your customer to install themselves our trust chain manually. We are including a code sample.
This is the link to install manually the CA root:
http://
Thanks for trusting ipsCA
ipsCA support
Where in the timeline is ipsCA in getting the ipsCA root certs included in Firefox? What steps still need to be completed?
Is it within a month, 6 months, 1 year? It seems this issue has existed since December 2009. I don't mean to be skeptical, but I am, as to if this issue will ever get resolved.
Thanks
Jared
Submitted by SAL Tue 07 Feb 2012 - 19:04:30
Dear Customer
We continue working in the process of inclusion. We do not have an exact time, but it will take several more months.
Best Regards and Thanks for Trusting ipsCA
ipsCA Support
http://
In Mozilla Bugzilla #529286, Kwilson-r (kwilson-r) wrote : | #57 |
> Where in the timeline is ipsCA in getting the ipsCA root certs included in
> Firefox? What steps still need to be completed?
>
> Is it within a month, 6 months, 1 year? It seems this issue has existed
> since December 2009. I don't mean to be skeptical, but I am, as to if this
> issue will ever get resolved.
A representative of the CA would need to either re-open this bug and provide the requested information, or create a new bug before this request would even get into the queue for public discussion (which in itself takes a long time).
Changed in firefox: | |
importance: | Wishlist → Medium |
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; es-ES; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5
Build Identifier:
ipsCA, a Spanish company in public key technologies applied to digital trust announced the upcoming availability of two new hierarchies of trust will be released during the fourth quarter of this year. Hierarchies have been created during the previous quarter and has been working on improving service quality and security features of the certificates will be issued by the new hierarchy. During this time they have been conducting activities aimed at achieving the maximum dissemination of new roots of trust, which spread to major software vendors require stamps based quality audits, so we would like to apply for including these two new roots within Mozilla Software.
1. General information about the CA’s associated organization (i.e., the company, nonprofit organization, or government agency operating the CA), including www.ipsca. com
1. Name: ipsCA Main Root
2. Website URL: http://
3. Organizational type: private
4. Primary market / customer base: worldwide CA, with special focus on Spain, where there are the headquarters. More than 12.000 Universities and educational entities (in the USA mainly) had obtained without any cost our SSL certificates.
2. For each root CA whose certificate is to be included in Mozilla (or whose metadata is to be modified):
1. The name of the root CAs. ipsCA Main Root ipsCA Global Root certs.ipsca. com/store/ ipsCAMain. der certs.ipsca. com/store/ ipsCAGlobal. der 6.1.5.5. 7.3.1 6.1.5.5. 7.3.2 6.1.5.5. 7.3.4 6.1.5.5. 7.3.3 6.1.5.5. 7.3.8 6.1.4.1. 311.10. 3.4 6.1.5.5. 7.3.6 6.1.5.5. 7.3.7
2. The root CA certificate.
http://
http://
3. The X.509 certificate version. Version 3
4. SHA-1 fingerprint. Respectively:
ipsCA Main Root - cf e4 31 3d ba 05 b8 a7 c3 00 63 99 5a 9e b7 c2 47 ad 8f d5
ipsCA Global Root - 3c 71 d7 0e 35 a5 da a8 b2 e3 81 2d c3 67 74 17 f5 99 0d f3
5. Type of signing key. RSA
6. Signing key parameters. 2048 bits.
EKUs Assigned (check if EKUs apply):
X Server Authentication EKU=1.3.
X Client Authentication EKU=1.3.
X Secure E-mail EKU=1.3.
X Code Signing EKU=1.3.
X Time stamping EKU=1.3.
X Encrypting File System EKU=1.3.
IPSec (Tunnel) EKU=1.3.
IPSec (User) EKU=1.3.
7. Valid from (YYYY-MM-DD). 07 September 2009
8. Valid to (YYYY-MM-DD). 25 December 2029
9. A description of the PKI hierarchy rooted at or otherwise associated with this root CA certificate, including:
No subordinated CA exists for the moment. Our plan is to generate new SubCAs for different purposes and all of them will be under our CPS. In the near future we will build up a subCA for SSL certificates issuance by ipsCA to continue our SSL business area where our the currently root certificate IPS SERVIDORES, included in the Mozilla trusted Store, is expiring on 29 December 2009.
10. Whether certificates are issued for any of the following purposes within the hierarchy rooted at this root CA certificate:
Only this one -> Certificates usable for enabling web or other servers to support SSL/TLS connections.
11. If SSL certificates are issued within the hierarchy rooted at this root CA certificate:
Whether or not the domain name r...