On Friday, November 6, 2015 at 7:15:31 PM UTC-5, Rick Andrews wrote: > > - We are re-evaluating when we should start rejecting all SHA-1 SSL > > certificates (regardless of when they were issued). As we said before, > > the current plan is to make this change on January 1, 2017. However, in > > light of recent attacks on SHA-1, we are also considering the > > feasibility of having a cut-off date as early as July 1, 2016. > > I think that pulling in this date will create chaos for some large > enterprises who are already scrambling to phase out SHA-1 by the end of 2016. > They had been counting on using all of 2016 to complete their migration. It > wouldn't just be an inconvenience - it would make an already-difficult > situation nearly impossible. > > And I'll point out that Microsoft is considering the same thing but with a > different date - June 1, 2016. Would you at least consider collaborating with > other browser vendors to agree on the same date?
I agree with Rick that I don't think the date should change. Currently the CAs will stop issuing SHA-1 as of 1 January 2016. This will largely mitigate the collision attack similar to the previous MD5 attack. The input from SHAppening, makes it arguable that mitigating collision on 1 January 2016 was probably too late, but there is not much we can do about that decision. >From what I understand we are not yet concerned about preimage or >second-preimage attacks on SHA-1, so this would not be a reason to change the >date. It would be great to understand what vulnerability we are trying to mitigate before changing the date when SHA-1 will be rejected. Thanks, Bruce. _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

