CA/Intermediate Certificates: Difference between revisions

< CA
(Added reports of intermediate certs in OneCRL and their revocation status per CCADB)
(Changed ccadb-public.secure.force.com to ccadb.my.salesforce-sites.com)
 
(4 intermediate revisions by the same user not shown)
Line 4: Line 4:


The following reports are '''generated once per day''' and include valid intermediate certificates and expired intermediate certificates but not revoked intermediate certificates:
The following reports are '''generated once per day''' and include valid intermediate certificates and expired intermediate certificates but not revoked intermediate certificates:
 
<br />
* [https://ccadb-public.secure.force.com/mozilla/PublicAllIntermediateCerts Intermediate CA Certificates] (HTML)
<big>[https://www.ccadb.org/rootstores/usage#ccadb-data-usage-terms CCADB Data Usage Terms]</big>
* [https://ccadb-public.secure.force.com/mozilla/PublicAllIntermediateCertsCSV Intermediate CA Certificates] (CSV)
* [https://ccadb.my.salesforce-sites.com/mozilla/PublicAllIntermediateCerts Intermediate CA Certificates] (HTML)
* [https://ccadb-public.secure.force.com/mozilla/PublicAllIntermediateCertsWithPEMCSV Intermediate CA Certificates] (CSV with PEM of raw certificate data)
* [https://ccadb.my.salesforce-sites.com/mozilla/PublicAllIntermediateCertsCSV Intermediate CA Certificates] (CSV)
* [https://ccadb-public.secure.force.com/mozilla/MozillaIntermediateCertsCSVReport Non-revoked, non-expired Intermediate CA Certificates chaining up to roots in Mozilla's program with the Websites trust bit set] (CSV with PEM of raw certificate data)
* [https://ccadb.my.salesforce-sites.com/mozilla/PublicAllIntermediateCertsWithPEMCSV Intermediate CA Certificates] (CSV with PEM of raw certificate data)
* [https://ccadb-public.secure.force.com/mozilla/IntermediateCertsSeparateAudits Intermediate CA Certificates with their own audit statements] (HTML)
* [https://ccadb.my.salesforce-sites.com/mozilla/MozillaIntermediateCertsCSVReport Non-revoked, non-expired Intermediate CA Certificates chaining up to roots in Mozilla's program with the Websites trust bit set] (CSV with PEM of raw certificate data)
* [https://ccadb-public.secure.force.com/mozilla/IntermediateCertsSeparateAuditsCSV Intermediate CA Certificates with their own audit statements] (CSV)
* [https://ccadb.my.salesforce-sites.com/mozilla/IntermediateCertsSeparateAudits Intermediate CA Certificates with their own audit statements] (HTML)
* [https://ccadb.my.salesforce-sites.com/mozilla/IntermediateCertsSeparateAuditsCSV Intermediate CA Certificates with their own audit statements] (CSV)


The following reports list revoked intermediate certificates:
The following reports list revoked intermediate certificates:


* [https://ccadb-public.secure.force.com/mozilla/PublicIntermediateCertsRevoked Revoked Intermediate CA Certificates] (HTML)
* [https://ccadb.my.salesforce-sites.com/mozilla/PublicIntermediateCertsRevoked Revoked Intermediate CA Certificates] (HTML)
* [https://ccadb-public.secure.force.com/mozilla/PublicIntermediateCertsRevokedCSVFormat Revoked Intermediate CA Certificates] (CSV)
* [https://ccadb.my.salesforce-sites.com/mozilla/PublicIntermediateCertsRevokedCSVFormat Revoked Intermediate CA Certificates] (CSV)
* [https://ccadb-public.secure.force.com/mozilla/PublicIntermediateCertsRevokedWithPEMCSV Revoked Intermediate CA Certificates] (CSV with PEM of raw certificate data)
* [https://ccadb.my.salesforce-sites.com/mozilla/PublicIntermediateCertsRevokedWithPEMCSV Revoked Intermediate CA Certificates] (CSV with PEM of raw certificate data)


The following reports list the intermediate certificates that are ready to be added to OneCRL. Some non-revoked intermediate certificates are added to OneCRL because they are not intended to be used for SSL/TLS.
The following reports list the intermediate certificates that are ready to be added to OneCRL. Some non-revoked intermediate certificates are added to OneCRL because they are not intended to be used for SSL/TLS.
* [https://ccadb-public.secure.force.com/mozilla/PublicInterCertsReadyToAddToOneCRL Intermediate CA Certificates Ready to Add to OneCRL] (HTML)
* [https://ccadb.my.salesforce-sites.com/mozilla/PublicInterCertsReadyToAddToOneCRL Intermediate CA Certificates Ready to Add to OneCRL] (HTML)
* [https://ccadb-public.secure.force.com/mozilla/PublicInterCertsReadyToAddToOneCRLPEMCSV Intermediate CA Certificates Ready to Add to OneCRL] (CSV with PEM  of raw certificate data)
* [https://ccadb.my.salesforce-sites.com/mozilla/PublicInterCertsReadyToAddToOneCRLPEMCSV Intermediate CA Certificates Ready to Add to OneCRL] (CSV with PEM  of raw certificate data)


The following reports list the intermediate certificates that have been added to OneCRL, and their revocation status as indicated by the CA in the CCADB.
The following reports list the intermediate certificates that have been added to OneCRL, and their revocation status as indicated by the CA in the CCADB.
* [http://ccadb-public.force.com/mozilla/IntermediateCertsInOneCRLReport Intermediate CA Certificates in OneCRL] (HTML)
* [https://ccadb.my.salesforce-sites.com/mozilla/IntermediateCertsInOneCRLReport Intermediate CA Certificates in OneCRL] (HTML)
* [http://ccadb-public.force.com/mozilla/IntermediateCertsInOneCRLReportCSV Intermediate CA Certificates in OneCRL] (CSV)
* [https://ccadb.my.salesforce-sites.com/mozilla/IntermediateCertsInOneCRLReportCSV Intermediate CA Certificates in OneCRL] (CSV)


Firefox (version 37 and later) uses the [https://blog.mozilla.org/security/2015/03/03/revoking-intermediate-certificates-introducing-onecrl/ OneCRL] system, which pushes a list of revoked certificates to the browser. It includes (or should include) all the intermediate certificates in the above report.
Firefox (version 37 and later) uses the [https://blog.mozilla.org/security/2015/03/03/revoking-intermediate-certificates-introducing-onecrl/ OneCRL] system, which pushes a list of revoked certificates to the browser. It includes (or should include) all the intermediate certificates in the above report.

Latest revision as of 23:47, 22 May 2023

Intermediate Certificates

CAs are required to provide the data for all of their publicly disclosed and audited intermediate certificates which chain up to root certificates in Mozilla's program. They do this using the CCADB.

The following reports are generated once per day and include valid intermediate certificates and expired intermediate certificates but not revoked intermediate certificates:
CCADB Data Usage Terms

The following reports list revoked intermediate certificates:

The following reports list the intermediate certificates that are ready to be added to OneCRL. Some non-revoked intermediate certificates are added to OneCRL because they are not intended to be used for SSL/TLS.

The following reports list the intermediate certificates that have been added to OneCRL, and their revocation status as indicated by the CA in the CCADB.

Firefox (version 37 and later) uses the OneCRL system, which pushes a list of revoked certificates to the browser. It includes (or should include) all the intermediate certificates in the above report.