> As reported inhttps://bugzilla.mozilla.org/show_bug.cgi?id=408949#c27
> this CA uses partitioned CRLs with CRL IDP extensions marked critical.
> NSS does not handle partitioned CRLs at this time, and any CRLs with
> critical CRL IDP extensions are rejected due to the presence of
> unknown critical extensions.  At present, this causes no problem
> because Firefox and NSS do not automatically fetch CRLs using the
> CRL DP extension.  But we're working on that, and when we implement
> it, it may well cause problems.

Comments #35 and #36 had updates on this:
"Exactly, our design of full CRL is inline with your recommendation.
Our full
CRL (http://crl1.hongkongpost.gov.hk/crl/eCertCA1CRL1.crl) does not
carry the
CIDP extensions."

> It is much less likely to cause problems for CAs that are NOT approved
> for EV than for CAs that ARE approved for EV, so one relevant question
> is: is this CA intended to be approved for EV?

This request is not for EV-enablement.

> Does this CA also implement OCSP?  

No
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to