FYI...

Mailing list post at
<https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/22GoYSOo7NY/m/xLqNxM2VCQAJ>.

---------- Forwarded message ---------
From: Andrew Ayer <a...@andrewayer.name>
Date: Fri, Jan 10, 2025 at 12:13 PM
Subject: Re: GLOBALTRUST 2020's reinclusion in Mozilla's trusted certificates
To: Mike Benza <mikebe...@gmail.com>
Cc: dev-security-pol...@mozilla.org <dev-security-pol...@mozilla.org>

Hi Mike,

GLOBALTRUST was never removed from the Mozilla root store.  Rather, it
was tagged with a "Distrust After" date which instructs Firefox to
distrust certificates whose Not Before date is after the root's
Distrust After date.  This is not a security measure (since backdating
certificates is trivial), but rather a mechanism to gracefully sunset
a root so it can be removed without causing problems 398 days later.

However, Curl's mk-ca-bundle.pl script was incorrectly interpreting
the Distrust After date <https://github.com/curl/curl/issues/15547>,
causing GLOBALTRUST to be incorrectly excluded.  Once that bug was
fixed, mk-ca-bundle.pl began emitting GLOBALTRUST again.

There are several reasons why this is unsatisfying.  To begin with,
Mozilla should not be trusting a CA like GLOBALTRUST _at all_, a point
that I and others raised last year
<https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/XpknYMPO8dI/m/j76_U_fMAAAJ>.
Second, root constraints like Distrust After would ideally be
propagated in the PEM bundle through to certificate validators instead
of being dropped by mk-ca-bundle.pl, but there is no widely-supported
mechanism for this at the moment.  For more background, see
https://sslmate.com/blog/post/entrust_distrust_more_disruptive_than_intended

Regards,
Andrew
-- 
Unsubscribe: https://lists.haxx.se/mailman/listinfo/curl-library
Etiquette:   https://curl.se/mail/etiquette.html

Reply via email to