New issue
Advanced search Search tips

Issue 656515 link

Starred by 2 users

Issue metadata

Status: Archived
Owner: ----
Closed: Feb 2018
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: ----
Pri: 3
Type: Bug



Sign in to add a comment

Application for Extended Validation Root Certificates Recognition from SHECA

Reported by xiongyua...@sheca.com, Oct 17 2016

Issue description

1 CA Name:
Shanghai Electronic Certification Authority Co.,Ltd(SHECA).
2 The fingerprint of EV root:‎
a3 a1 b0 6f 24 61 23 4a e3 36 a5 c2 37 fc a6 ff dd f0 d7 3a
3 The OID using to issue EV certs:
(1) for SSL certificates
Policy Identifier=1.2.156.112570.1.1.3
Policy Identifier=2.23.140.1.1
(2)for CodeSigning certificates
Policy Identifier=1.2.156.112570.1.1.3
Policy Identifier=2.23.140.1.3
4 WebTrust Seal for EV audit:
https://cert.webtrust.org/ViewSeal?id=2048
5 Test URL:
https://ef-EV.sheca.com 
 
Hi,
This is Ruby from Shanghai Electronic Certification Authority Co., Ltd(SHECA). We want to apply for inclusion of our UCA Extended Validation Root in your program.
As a business entity based in Shanghai, which is one of the biggest commercial centres in China, our certificates are issued and used for providing very broad value to Chrome customers. What’s more ,we are one of the biggest Chinese certification authorities within law in mainland China and we have served more than two million customers with certificate service. We have been one of the WebTrust auditees of PricewaterhouseCoopers since 2008 and updating our WebTrust Seal annually. 
EV certificates issued by UCA Extended Validation Root are mainly used to verify identity. Clients who are in the need of high level security will benefit from using EV certificates. UCA Extended Validation Root has two subordinate certificates which are for the issuance of EV SSL certificates and EV Code Signing certificates respectively. EV SSL Certificates can be used to verify the identity of the domain name identified in the certificate, as well as the identity of the legal entity holding the domain name. EV Code signing certificate can be used to verify the identity that who is providing or publishing the software.  The information contained in EV certificates issued by SHECA is authentic, effective, and validated.
Cc: kkaluri@chromium.org
Labels: TE-NeedsTriageHelp
Components: Internals>Network>SSL>EV
Components: -Internals>Network>SSL>EV Internals>Network>EV
Project Member

Comment 5 by sheriffbot@chromium.org, Feb 13 2018

Status: Archived (was: Unconfirmed)
Issue has not been modified or commented on in the last 365 days, please re-open or file a new bug if this is still an issue.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Hello,

I am Toria Chen from SHECA who take over the root inclusion job from Ruby.
SHECA wonder if this bug can be re-open, as no comments made for this inclusion?
Or shall we submit an new bug?
Thanks.

Sign in to add a comment