Changes

Jump to: navigation, search

PSM:EV Testing Easy Version

84 bytes removed, 22:07, 2 March 2018
m
added/fixed links
This page is for [[CA:FAQ#What_are_CAs.3F | Certificate Authorities (CAs)]] who request to have a root certificate enabled for [https://www.cabforum.org/certificates.html Extended Validation (EV) treatment], and need to test that their CA hierarchy is ready for EV treatment.
To request that your root certificate be included in [https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS NSS] and enabled for EV treatment, start with the [httphttps://wwwhg.mozilla.org/projectsmozilla-central/file/tip/security/certscertverifier/policy/ Mozilla CA Certificate PolicyExtendedValidation.cpp enabled for EV treatment] and the , see [[CA:How_to_apply /Application_Process| How to ApplyMozilla's application process]] guidelines.
This page explains how you can test that your certificates and OCSP infrastructure are working correctly according to the expectations of Mozilla, Firefox, and the NSS library; and conforms to the SSL protocol specifications (as interpreted by Mozilla/NSS software.)
#* End with: -----END CERTIFICATE-----
#* [https://crt.sh/?d=853428 Example PEM Data] - open with a plain text editor like TextEdit
#* [[CAhttp:CommonCADatabase//ccadb.org/cas/fields#PEM_Data|pem-data Help with getting PEM]]
# Click on "Submit"
* If you get ''Error: TypeError: json.analysis is undefined'', then the program does not like the format of the data you entered. For instance, if you have extra spaces or characters before or after the TLS Server URL, EV Policy OID, or Root Certificate PEM.
* The EV test only uses the root certificate it is given. So, if you are using an intermediate certificate that has been cross-signed with another root certificate, you may see different results when browsing to the site in Firefox, as opposed to the results provided by the EV Test.
* OCSP must work without error for the intermediate certificates. For more information see: https://wiki.mozilla.org/CA:EV_Revocation_Checking#Requirements
* The EV Policy OID in the end-entity and intermediate certificates must match the EV Policy OID that you enter. (Note: the intermediate cert can use the anyPolicy oid rather than the EV policy oid.)
** SEC_ERROR_POLICY_VALIDATION_FAILED error may mean that the intermediate certificate being sent by the server doesn't have a certificate policies extension, or has an incorrect policy OID.
Confirm, administrator
5,526
edits

Navigation menu