CA/EV Processing for CAs: Difference between revisions

Add EV TLS Capable section
(make the relationship between certificate path building and policy checking more clear)
(Add EV TLS Capable section)
Line 1: Line 1:
= EV TLS Capable =
Mozilla considers an intermediate certificate to be capable of issuing EV TLS certificates when all of the following are true. The intermediate certificate:
* either directly or transitively chains up to a root certificate included in Mozilla's root store with the TLS (Websites) trust bit turned on, and EV enabled
* is not revoked and not expired
* does not have an Extended Key Usage (EKU) extension or does have an EKU extension containing KeyPurposeIds: anyExtendedKeyUsage or id-kp-serverAuth
* has Policy Identifiers containing one or more of: 2.23.140.1.1 (CABF EV OID), 2.5.29.32.0  (anyPolicy OID), the CA's EV OIDs used by Mozilla in [https://dxr.mozilla.org/mozilla-central/source/security/certverifier/ExtendedValidation.cpp ExtendedValidation.cpp]
* is signed by an EV TLS Capable certificate (when not directly signed by the root certificate)
= Firefox EV Processing Logic =
= Firefox EV Processing Logic =


Confirmed users, Administrators
5,526

edits