ipsCA Global and ipsCA Main root certificates not supported in Firefox

Bug #600779 reported by Nick
10
This bug affects 2 people
Affects Status Importance Assigned to Milestone
Mozilla Firefox
Expired
Medium
firefox (Ubuntu)
Triaged
Wishlist
Unassigned

Bug Description

Binary package hint: firefox

ipsCA is a company that provides security certificates. It, evidently, provides the certificates to educational institutions for free. Many educational institutions in the US, including the one at which I am an instructor, use the ipsCA certificates. As of December 2009, Firefox is no longer supporting the ipsCA certificates. Here is the bug from the Mozilla bug tracker:

https://bugzilla.mozilla.org/show_bug.cgi?id=529286

Why is this a problem? It is costing Ubuntu users. I am no longer in a position to recommend Ubuntu to students as the security warning screens scare the students.

Revision history for this message
In , J-pascual (j-pascual) wrote :
Download full text (14.4 KiB)

User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; es-ES; rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5
Build Identifier:

ipsCA, a Spanish company in public key technologies applied to digital trust announced the upcoming availability of two new hierarchies of trust will be released during the fourth quarter of this year. Hierarchies have been created during the previous quarter and has been working on improving service quality and security features of the certificates will be issued by the new hierarchy. During this time they have been conducting activities aimed at achieving the maximum dissemination of new roots of trust, which spread to major software vendors require stamps based quality audits, so we would like to apply for including these two new roots within Mozilla Software.

1. General information about the CA’s associated organization (i.e., the company, nonprofit organization, or government agency operating the CA), including
1. Name: ipsCA Main Root
2. Website URL: http://www.ipsca.com
3. Organizational type: private
4. Primary market / customer base: worldwide CA, with special focus on Spain, where there are the headquarters. More than 12.000 Universities and educational entities (in the USA mainly) had obtained without any cost our SSL certificates.

2. For each root CA whose certificate is to be included in Mozilla (or whose metadata is to be modified):

1. The name of the root CAs. ipsCA Main Root ipsCA Global Root
2. The root CA certificate.
http://certs.ipsca.com/store/ipsCAMain.der
http://certs.ipsca.com/store/ipsCAGlobal.der
3. The X.509 certificate version. Version 3
4. SHA-1 fingerprint. Respectively:
ipsCA Main Root - cf e4 31 3d ba 05 b8 a7 c3 00 63 99 5a 9e b7 c2 47 ad 8f d5
ipsCA Global Root - 3c 71 d7 0e 35 a5 da a8 b2 e3 81 2d c3 67 74 17 f5 99 0d f3
5. Type of signing key. RSA
6. Signing key parameters. 2048 bits.
EKUs Assigned (check if EKUs apply):
X Server Authentication EKU=1.3.6.1.5.5.7.3.1
X Client Authentication EKU=1.3.6.1.5.5.7.3.2
X Secure E-mail EKU=1.3.6.1.5.5.7.3.4
X Code Signing EKU=1.3.6.1.5.5.7.3.3
X Time stamping EKU=1.3.6.1.5.5.7.3.8
X Encrypting File System EKU=1.3.6.1.4.1.311.10.3.4
 IPSec (Tunnel) EKU=1.3.6.1.5.5.7.3.6
 IPSec (User) EKU=1.3.6.1.5.5.7.3.7
7. Valid from (YYYY-MM-DD). 07 September 2009
8. Valid to (YYYY-MM-DD). 25 December 2029
9. A description of the PKI hierarchy rooted at or otherwise associated with this root CA certificate, including:
No subordinated CA exists for the moment. Our plan is to generate new SubCAs for different purposes and all of them will be under our CPS. In the near future we will build up a subCA for SSL certificates issuance by ipsCA to continue our SSL business area where our the currently root certificate IPS SERVIDORES, included in the Mozilla trusted Store, is expiring on 29 December 2009.
10. Whether certificates are issued for any of the following purposes within the hierarchy rooted at this root CA certificate:
Only this one -> Certificates usable for enabling web or other servers to support SSL/TLS connections.
11. If SSL certificates are issued within the hierarchy rooted at this root CA certificate:
Whether or not the domain name r...

Revision history for this message
In , Kwilson-r (kwilson-r) wrote :

Starting the information gathering and verification phase as per:
https://wiki.mozilla.org/CA:How_to_apply#Information_gathering_and_verification

Revision history for this message
In , Kwilson-r (kwilson-r) wrote :

Created attachment 413219
Initial Information Gathering Document

The attached document summarizes the information that has been gathered and
verified as per
https://wiki.mozilla.org/CA:How_to_apply#Information_gathering_and_verification

The items highlighted in yellow indicate where further information or
clarification is needed. Please review the full document for accuracy and
completeness.

Revision history for this message
In , Kwilson-r (kwilson-r) wrote :

Created attachment 413220
Editable Version of Info Gathering Doc

Revision history for this message
In , Mike Connor (mconnor) wrote :

Looks like this bug is still blocking on further information from ipsCA. Given that there are no maintenance releases scheduled between now and December 29th, which will likely be a problem for ipsCA's customers...

In any case, we need the details requested by Kathleen here... Juan, can you follow up with the required information?

Revision history for this message
In , Eckardpp (eckardpp) wrote :

The University of Wisconsin-Eau Claire 9along with ~12,000 other universities)also uses ipsCA certificates. I cannot speak for the other universities but we are seeing exactly the same issue as Kathleen Wilson has stated.

Chip Eckardt

Revision history for this message
In , Ndr-v (ndr-v) wrote :

University of Florida is also experiencing this issue. This will cause major problems if Mozilla doesn't add the new CA from IPSCA.

Revision history for this message
In , Abraham-46 (abraham-46) wrote :

Several sites at Ohio State University are also affected by this.

Revision history for this message
In , Ndr-v (ndr-v) wrote :

Is there any way someone at Mozilla can update us on the status of this issue? Is it likely this will be resolved and released in a Firefox update soon? Thank you very much!

Revision history for this message
In , Eddy-nigg (eddy-nigg) wrote :

The request to have a new root enabled was made at the 2009-11-17 by ipsCA at this bug, Kathleen follow up the day after. There were some additional issues which were discussed at the mozilla.dev.security.policy newsgroup. Don't expect this to be solved very soon.

Revision history for this message
In , Ballard (ballard) wrote :

RE: Eddy Nigg (StartCom) @ 2009-12-22 10:16:08 PST

Do you happen to have a pointer to the issues in the mozilla.dev.security.policy group?

-Jeff

Revision history for this message
In , Eddy-nigg (eddy-nigg) wrote :
Revision history for this message
In , Robinsom (robinsom) wrote :

Actually, the conversations you linked to are discussing this bug:

https://bugzilla.mozilla.org/show_bug.cgi?id=523652

Which has been marked as fixed since late November.

As far as I can tell, the only action items for the inclusion of the new root are in this bug.

Revision history for this message
In , Eddy-nigg (eddy-nigg) wrote :

(In reply to comment #12)
> As far as I can tell, the only action items for the inclusion of the new root
> are in this bug.

Correct. I'm just saying that from experience and knowledge about the inclusion process, this will take a while. The previous issues might influence the discussions a bit as well. See also https://wiki.mozilla.org/CA:How_to_apply#Timeline

Revision history for this message
In , Ndr-v (ndr-v) wrote :

Thank you for the feedback and link to that time line. I guess what most of us end users are wondering is, can Mozilla provide an estimate on the date the updated CA will be added to Firefox? Us non-profits are looking at spending thousands of dollars in a hurry to replace certs. If we had an idea when it might be included, it would save a lot of headache. It kind of sucks when we push our users so hard to switch to Firefox from IE and now we're going to have to tell them, use IE for a while. Besides, replacing certs that quickly isn't possible. There is no doubt that most users will see the "untrusted site" error come Jan 1.

Revision history for this message
In , Eckardpp (eckardpp) wrote :

I verified that the "untrusted site" error does not show in Internet Explorer 8. That will work for all our PC users, but we still have around 500 Mac users (the error also shows in Apple's Safari browser as well) and running IE is not an option for them.

Revision history for this message
In , Eddy-nigg (eddy-nigg) wrote :

(In reply to comment #15)
> I verified that the "untrusted site" error does not show in Internet Explorer
> 8. That will work for all our PC users, but we still have around 500 Mac users
> (the error also shows in Apple's Safari browser as well) and running IE is not
> an option for them.

This might be an incomplete installation - does the server send the complete CA certificates chain as required?

Revision history for this message
In , Robinsom (robinsom) wrote :

So, because ipsCA regenerated their root back in September to fix some of the problems in the previous bug, the ~1 year process starts over again?

Revision history for this message
In , Eddy-nigg (eddy-nigg) wrote :

Mike, this isn't a good place for discussions, the mozilla.dev.security.policy should be used for that. However, ipsCA's root expires at the 31st of December 2009 and certificates have been issued beyond the life-time of this root. This isn't a problem of Mozilla, more so that the request to include a new root has been made barely a month ago. Please don't blame the wrong party for the shortcomings. The inclusion processes of Mozilla are known to CAs and publicly displayed for everyone to read. This may take up to a year.

Revision history for this message
In , Eckardpp (eckardpp) wrote :

(In reply to comment #16)
> (In reply to comment #15)
> > I verified that the "untrusted site" error does not show in Internet Explorer
> > 8. That will work for all our PC users, but we still have around 500 Mac users
> > (the error also shows in Apple's Safari browser as well) and running IE is not
> > an option for them.
> This might be an incomplete installation - does the server send the complete CA
> certificates chain as required?

Yes.

Revision history for this message
In , David-rossde (david-rossde) wrote :

To all those who are impatient for this certificate to be approved and implemented for Gecko-based products:

The presence of a root certificate in the NSS database used by Gecko-based products indicates that users can place some degree of trust in the use of that certificate for secure Web browsing. For that trust to be valid, the certificate authority owning the root certificate must undergo some scrutiny, which takes time.

The timeline for such scrutiny is described at <https://wiki.mozilla.org/CA:Schedule>, which also shows the current queue for the public discussion that is part of the process. As noted in comment #2, some required information is missing. That information must be provided by the certificate authority before this request can enter the queue.

Thus, the problem lies in the hands of ipsCA and not Mozilla. As pointed out in comment #18, the very late recognition by ipsCA that they had to replace a root certificate that was about to expire compounded the problem.

Further expressions of the need for haste will not speed the process. Any shortcuts or other measures to hasten the process can only weaken the trust users have in the overall certificate database.

Revision history for this message
In , David-rossde (david-rossde) wrote :

I almost forgot. Those who are anxious for these root certificates, who already trust them, and who have no patience with the Mozilla process for scrutinizing certificate authorities can download and install the root certificates themselves. The links are at <http://www.mozilla.org/projects/security/certs/pending/#ipsCA>.

When downloaded, open the Certificate Manager at the "Authorities" tab and select the Import button. On SeaMonkey, the Certificate Manager is reached from the menu bar via [Edit > Preferences > Privacy & Security > Certificates]. Since I don't use Firefox, I don't know the path.

Revision history for this message
In , Abraham-46 (abraham-46) wrote :

At OSU, we will be undertaking other alternatives to the ipSCA certs for the time being. We believe this process is necessary and worth the time consumed.

Revision history for this message
In , Kwilson-r (kwilson-r) wrote :

*** Bug 536406 has been marked as a duplicate of this bug. ***

Revision history for this message
In , Maxxer (lorenzo-milesi) wrote :

Hi, sorry for the "annoying" questions, but is still there any missing information from IPSCA?
Is it possible to know an estimate date when the cert will be considered trusted?

I'm not putting pressure, it's just to know if we are more likely talking about weeks, months or year, as stated before.
Thanks!

Revision history for this message
In , Eddy-nigg (eddy-nigg) wrote :

See my comment 13 and comment 16. Realistically this process has always taken something between 9 - 12 month. If there are problems it might take even longer than that and according to attachment 413219 , a new audit statement will have to be provided by ipsCA first. Hope this helps!

Revision history for this message
In , Jbecerra-mozilla (jbecerra-mozilla) wrote :

*** Bug 542392 has been marked as a duplicate of this bug. ***

Revision history for this message
In , Gervase Markham (gerv-mozilla) wrote :

As far as I can tell, this bug is still waiting (after 3 months) for ipsCA's response to Kathleen's Initial Information Gathering Document. As Eddy notes, they have had other issues to deal with meanwhile. But any delay here is not the responsibility of Mozilla.

If anyone has been sold an ipsCA certificate on the expectation that it would work in all popular browsers, they need to take that up with ipsCA.

Gerv

Revision history for this message
In , Benoit-n (benoit-n) wrote :

I just emailed IPS to ask when this would be taken care of. Their response was:

Dear customer

Our technicians are gathering all the information required by Mozilla. Everything will be sent soon.

Best Regards
ipsCA support

Revision history for this message
In , Nick (morrownr) wrote :

I am an instructor at a US educational institution that uses ipsCA certificates. The failure to resolve this issue is driving students away from Firefox. Out here in userland, most people don't care if ipsCA is at fault or if Mozilla is at fault. They simply want a product that works.

Getting this fixed in a release of Firefox that is available for download before fall semester starts is something that really needs to happen.

Nick (morrownr)
visibility: private → public
Revision history for this message
Chris Coulson (chrisccoulson) wrote :

This isn't a security vulnerability

I'm not sure why you reported this here. The upstream bug report makes it perfectly clear about the process of including new certificates, and that process takes some time. We aren't going to be bypassing that process just because it takes a long time, so the certificate will appear in Ubuntu when Mozilla have added it, and not before

security vulnerability: yes → no
Changed in firefox (Ubuntu):
importance: Undecided → Wishlist
status: New → Triaged
Revision history for this message
Nick (morrownr) wrote :

I reported this here because it is an issue that affects your product. This "it is to upstream to fix this" attitude is one reason that Linux has about 1% market share on the desktop. How can administrators go to a product that they can't count on? They can't as they will get fired.

This is a problem that has existed since the 4th quarter of 2009 and it is now the 3rd quarter of 2010. The progress on this issue is not acceptable. Would it be reasonable for someone at Canonical to contact Mozilla to discuss this issue? It certainly seems so to me.

This is an issue that is making the acceptance of Ubuntu at many educational institutions difficult. I will NOT be recommending Ubuntu until this issue is resolved.

Revision history for this message
Chris Coulson (chrisccoulson) wrote :

Making threats such as "I will NOT be recommending Ubuntu until this issue is resolved" isn't going to make the issue be resolved any faster. As I pointed out, Mozilla have a well defined process for accepting and scrutinizing new certificates, which can take a long time (and rightly so. There would be no web of trust if we just accepted certificates on a whim because of a single users threats).

It's quite clear from the upstream bug report that the process of accepting the certificate is already under way (it's actually waiting on information from ipsCA, and has already been delayed because ipsCA had to replace a certificate which was close to expiring). You seem to be expecting us to just bypass Mozilla's process and add the certificate, and this will not be happening under any circumstances.

Revision history for this message
Nick (morrownr) wrote :

What I expected was additional questions about the type of problems this is causing and how widespread the problem is. It is very difficult to convince people to try Linux on the desktop. When there are additional road-blocks such as this issue it becomes almost impossible.

I am very disappointed in the reception that this report received.

Revision history for this message
In , David-rossde (david-rossde) wrote :

Regarding comment #29, you are free to download and install the root certificates yourself as cited in comment #21. Note that central maintenance of work stations in LANs and WANs -- such as might be practiced at your institution -- might allow for a central installation of the ipsCA root certificates in the workstations there without requiring each user to do it individually. If you don't trust ipsCA sufficiently for you to install its certificates now, then why would you think the Mozilla organization has more trust in ipsCA?

Revision history for this message
In , Nick (morrownr) wrote :

Regarding comment #30. I think there is a fundamental misunderstanding of the message in comment #29.

If product market share does not matter then disregard rest.

My story is far from unique as I have found out while researching the issue: The tech support department at the university where I am an instructor has been a heavy recommender of Firefox to students who have had problems accessing university online resources (including online classes.) This changed in January of this year as the difficulties associated with Firefox due to the lack of ipsCA support made it more work than alternatives. University tech support folks generally go for the low hanging fruit. They could care less about the issues behind the scenes.

In researching this issue I have found ipsCA offers certificates to educational institutions for free. Further research seems to indicate they have a sizable market share with educational institutions. As I found evidence that educational institutions were using ipsCA, I wrote down the size of the student bodies. I stopped when the number went over one million. ipsCA appears to be a major player in an area where Firefox likely gains significant market share...or looses market share given bad decisions.

Further research and testing shows that Chrome does support the new ipsCA certificates and it appears to have matured enough for me to switch which browser I recommend to my students. I'll be working on my syllabi for fall over the next couple of weeks. Which browser will I recommend? It is really up to whether this issue is fixed.

Over the years I've been a big fan and supporter of Firefox. I'm at a decision point. Help me to help you.

Is the point now clear?

Revision history for this message
In , Lemworld (lemworld) wrote :

I also agree with Nicky. We are at a crucial decision point where we are deploying computer images to classrooms and labs and we need to know whether or not our web-based applications will be supported when the Fall semester begins. We also have trumpeted Firefox and open source software, but we are at a point where we cannot continue to recommend Firefox to our faculty, staff, and students when they will not support the technologies on which we rely. Must we really spend untold amounts of money on Verisign certificates just so that the browser will not throw a confusing error, or shall we make a seamless transition to Chrome that fully supports our deployed environments?

Revision history for this message
In , Bpkroth (bpkroth) wrote :

Really your choice should not be about which browser to use for your applications, but rather which certificates to use. ipsCA has shown that the trust you should place in them isn't much better than self signed certs. I mean they continued to issue certs after their CA was expired. If that's all the more trust you need for your applications then I wouldn't bother to worry about the annoyance you're giving your users. Might as well set up your own CA, distribute the cert to your lab machines, and deal with it that way.

If you need something more, then you should go out and get some real certs. digicert [1] has wildcard certs for ~$500. That's quite reasonable, they're well trusted, work in just about every client app I've tried (minus eudora :P), and can be managed fairly easily since typically one will work for a number of services.

I for one am much happier in the mozilla folks taking their time to diligently check the purported security that a particular CA offers before my browser magically trusts them.

[1] http://www.digicert.com/wildcard-ssl-certificates.htm

Revision history for this message
In , Wyang (wyang) wrote :

As far as I can tell, there is no reason ipsCA should not be considered trustworthy. All I see is that they made a mistake in delaying when they notified browser vendors of a new root CA. I'm nearly certain that all new certs issued after their old CA expired were issued using their new CA cert. However, I also think you've missed the point here. If an edu uses their own CA, they need to dedicate staff and resources to do that, and still deal with the fact that the cert exists in no browser right now. A number of people have pointed out central deployment of root CAs in browsers, but are you going to manage every student's personal computer as well? There are even some universities dropping computer labs, so the vast majority of computers are student-owned and not university-managed. If an edu uses ipsCA, the CA is already installed in at least IE and Chrome, but not Mozilla. The latter remains more convenient for helpdesks and users.

And lest we forget, ipsCA never did this: http://www.theregister.co.uk/2008/12/29/ca_mozzilla_cert_snaf/. But did Comodo get removed from Mozilla? Despite the fact that the incident specifically involved Mozilla? Did the vetting process prevent that from happening?

No offense, but sometimes I think people need to act less like computers and more like humans that are capable of more than just following precisely written directions and processes. There are times when an established process no longer fulfills its purpose and does more harm than good, and as far as I can tell this is one of them. But of course everyone is entitled to their own opinion and choice of browser.

Revision history for this message
In , Ballard (ballard) wrote :

Re 34:

"I'm nearly certain that all new certs issued after their old CA expired were issued using their new CA cert."

I was issued certificates approximately two weeks before IPS SERVERDORES expired. To say the least, these "free" certificates cost me quite a bit.

The pressure here needs to be put on ipsCA, not Mozilla. There are costs of doing business as a CA. It is only due to their negligence that they are not in the Mozilla browser.

Changed in firefox:
status: Unknown → In Progress
Revision history for this message
In , Eddy-nigg (eddy-nigg) wrote :

(In reply to comment #34)
> And lest we forget, ipsCA never did this:
> http://www.theregister.co.uk/2008/12/29/ca_mozzilla_cert_snaf/. But did Comodo
> get removed from Mozilla? Despite the fact that the incident specifically
> involved Mozilla?

Just for your knowledge, neither was ipsCA removed because of this: http://it.slashdot.org/story/09/10/06/2118211/Null-Prefix-SSL-Certificate-For-PayPal-Released (with consequences probably worse than the above)

Revision history for this message
In , Wyang (wyang) wrote :

Re: comment #35: I'm not saying ipsCA isn't at fault, but ultimately between ipsCA and Mozilla, users (and IT staff dealing with the consequences) are the ones that are suffering. I suppose you could also say that it is due to Microsoft's lack of due diligence that ipsCA _is_ in there. Unfortunately, at least in our case, time is something that can be spent on the ipsCA problem, but hard cash to buy certs from elsewhere isn't available. I'm curious though, are we still actually waiting for ipsCA to send their information to Mozilla or is Mozilla in the review process now? No one from Mozilla or ipsCA seems to have posted an update here in awhile.

Re: comment #36: Thanks for the info, I admit I didn't know about that. I do feel like the scope is different though; while potentially more serious, it also involves a flaw in browsers (which Mozilla fixed but MS hadn't), while the first can't really be fixed in code.

Revision history for this message
In , Eddy-nigg (eddy-nigg) wrote :

(In reply to comment #37)
> I'm curious though,
> are we still actually waiting for ipsCA to send their information to Mozilla or
> is Mozilla in the review process now? No one from Mozilla or ipsCA seems to
> have posted an update here in awhile.

I believe the last comment with relevance was comment 3. According to https://wiki.mozilla.org/CA:How_to_apply#Timeline there is still some work to do.

Revision history for this message
In , Joe-moore (joe-moore) wrote :

The way I understand the issue, Firefox needs to trust the CA before they can pass that trust on. Err on the side of making sure the trust is well placed.

The bigger 'problem' is the nature of cert use. There are really 2 reasons to use a cert. One is to truly trust the source page, the other is to encrypt traffic on the wire. In a perfect world, the customer would know the difference--but we don't live in a perfect world. If I tell a casual user they can do their banking as long as the padlock in the browser is OK and the url says https--I'd better know *not just hope* that the browser did its homework in putting the cert in the trust path. Am I ready to suggest banking over chrome? Probably not. Firefox? Yes. IE--that's an entirely different set of questions :-)

If I'm running a bank with a few dozen certs, $500/cert is nothing. If I'm running a small computer science dept with a dozen production servers and 2 dozen test servers that all need certs I have a different business case. I may need to tell my users to go past an extra page of verification or (ugh!) use a browser that I don't trust to go to the bank with. Nothing against chrome--it just lives in a different world (assuming the statement made about chrome was correct--I didn't check it out myself).

Revision history for this message
In , Kwilson-r (kwilson-r) wrote :

In order to proceed with this request as per
https://wiki.mozilla.org/CA:How_to_apply
a representative of ipsCA must respond to the attached Initial Information Gathering Document as per Comment 2 and Comment 3.

This request is still in the "Information Gathering and Verification" phase.
See https://wiki.mozilla.org/CA:How_to_apply#Timeline

Revision history for this message
In , Nick (morrownr) wrote :

Firefox, it has been good knowing you, but comment 40 makes it clear that I must move on. I've been testing Chrome since the initial reply to my initial comment on this thread. Chrome has matured to the point that it meets my needs. I'll also be changing the browser I recommend to my students.

All major browsers, including IE8, Chrome, and Safari, have current ipsCA support, with the exception of Firefox. If Firefox was in a monopoly position in the market, it might be a situation where this attitude could work. This isn't the case. Most market share data I have looked at shows Firefox market share peaking late last year. I'll forecast that the second half of 2010 is not good to the market share of Firefox. However, I'm moving on to Chrome I no longer care. Hasta la vista.

Revision history for this message
In , Eddy-nigg (eddy-nigg) wrote :

Some interesting observations:

Microsoft is currently the only software vendor supporting these roots. Chrome, Safari and IE work on Windows platforms because they make use of the native certificates store. No other platform or browser works besides that at the moment.

Safari and Chrome use native libraries on the respective platforms for the moment. E.g. Mozilla NSS on Linux and Apple Keychain on MAC OSX. Firefox and Opera use their own certificate store.

As to market share, competition is great! But CA roots are a matter of declared policies and not a drive for market share. So long...

Revision history for this message
In , Chengw (chengw) wrote :

Just to add some clarification to comment 42: Safari and Chrome only accept ipsCA certificates when running in Windows because they use the native certificate store in Windows that IE8 uses. Don't expect them to work on Safari or Chrome for Mac OS X or Linux because it won't! By way if you are teaching in higher ed and your school is somewhat typical like ours, your students will be overwhelmingly coming with Macs to the classroom this fall semester.

You truly get what you pay for (free in .edu's case): it is IMHO extremely unethical that ipsCA issued certificates that expire AFTER their root CA's expiration! Mind you they've had 11 YEARS to avoid this problem and instead waited until 9/7/2009 to just begin to solve it! We are now half a year into Mozilla's vetting process and they still have not responded to the INITIAL information gathering! Is it really worth keeping them as your SSL certificate issuer when you can get a wild card certificate for just over $200 and it will cover an *unlimited* number of websites and not student will have an issue?

For a more permanent solution, ask your school's IT department to seriously consider setting up a trusted root signed CA internally or use a 3rd party SSL managed service so you can issue your own certificates that are accepted everywhere. If you have large numbers of certificates it is a lot more cost effective and easier to manage in the long run.

Revision history for this message
In , 2011pgodofsk (2011pgodofsk) wrote :

Overwhelming numbers of mac users? On what planet? What are you, a film school?

Furthermore, why can't firefox have an option to use the OS's built-in certificate store?

Revision history for this message
In , Chengw (chengw) wrote :

On planet earth actually, what planet do you hail from? I don't understand it either: we are a laptop university and we give our students a choice between several models of PC laptops and Mac laptops. Since we've started offering Macs as an option 3 years ago, students have opted for on more and more. This year well over 70% of the incoming class has chosen a Mac, and that's after the extra fee for choosing a more expensive Mac!

Using the built-in certificate store of the OS makes the browser less portable to different operating systems. Also the info. security officer in my also would like to point out that it also makes the browser more vulnerable to security issues that are specific to an operating system. I suppose that's why, from a design standpoint, Mozilla and Opera picked to do it this way. Probably one of the many reasons why you can easily port Firefox to just about any operating system whereas that process is not so easy with Chrome (both being open source). You can even get Firefox for AmigaOS now :-)!

Revision history for this message
In , Wyang (wyang) wrote :

Is that only considering students that buy from your program? I know that the large majority of students here (at JHU) do not buy from the university laptop purchase program and opt to purchase on their own, but it's possible that Mac buyers are more likely to use the program than PC buyers.

Revision history for this message
In , Johnath (johnath) wrote :

Folks, this stopped being bug-relevant a while ago.

Changed in firefox:
importance: Unknown → Wishlist
Revision history for this message
In , Padra1g (padra1g) wrote :

any chance this could be sorted ?? we use ff & ipsCA certificates - but most of our users have now opted for ie8 !! -

Revision history for this message
In , Robinsom (robinsom) wrote :

padraig,

This has already been discussed here and the problem lies with ipsCA. They still have not provided the required information to continue with the next step. So, the correct group to ask is ipsCA and not Mozilla.

Revision history for this message
In , Kwilson-r (kwilson-r) wrote :

Closing this bug because it has been over a year since the CA has provided input (see Comment #2 and Comment #40). If the CA wishes to proceed, they may create a new bug and provide all of the information listed here:
https://wiki.mozilla.org/CA:Information_checklist

Changed in firefox:
status: In Progress → Expired
Revision history for this message
In , Jpickerell (jpickerell) wrote :

I contacted ipsCA support today and thought I would post their response. It looks like there is not much hope of getting this resolved any time soon.

Submitted by RGU Tue 07 Feb 2012 - 17:31:36
Dear customer,

Currently, our root CA is recognized in Internet Explorer and all browsers which use Windows certificate store in Windows plattforms, i.e, Google Chrome or Apple Safari. Regarding Firefox, we are in process for being included within Firefox browser.

As a temp solution, you can add a code within your web page in order to enable your customer to install themselves our trust chain manually. We are including a code sample.

This is the link to install manually the CA root:
http://certs.ipsca.com/store/ipsCAGlobal.crt

Thanks for trusting ipsCA
ipsCA support

Where in the timeline is ipsCA in getting the ipsCA root certs included in Firefox? What steps still need to be completed?

Is it within a month, 6 months, 1 year? It seems this issue has existed since December 2009. I don't mean to be skeptical, but I am, as to if this issue will ever get resolved.

Thanks
Jared

Submitted by SAL Tue 07 Feb 2012 - 19:04:30
Dear Customer

We continue working in the process of inclusion. We do not have an exact time, but it will take several more months.

Best Regards and Thanks for Trusting ipsCA
ipsCA Support
http://certs.ipsca.com

Revision history for this message
In , Kwilson-r (kwilson-r) wrote :

> Where in the timeline is ipsCA in getting the ipsCA root certs included in
> Firefox? What steps still need to be completed?
>
> Is it within a month, 6 months, 1 year? It seems this issue has existed
> since December 2009. I don't mean to be skeptical, but I am, as to if this
> issue will ever get resolved.

A representative of the CA would need to either re-open this bug and provide the requested information, or create a new bug before this request would even get into the queue for public discussion (which in itself takes a long time).

https://wiki.mozilla.org/CA

Changed in firefox:
importance: Wishlist → Medium
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.