To be clear, we have not decided on any hard cutoff date for SHA-1, much
less made it July 1.

January 1, 2017 and July 1, 2016 are both options under consideration.  I
expect that we will try to come to a final decision some time in early
2016, once we have more data about how quickly people seem to be retiring
SHA-1. Right now, it's still used in around 10% of Firefox certificate
verifications in release, but the trend line is downward.  The beta
population went from ~10.7% usage to ~8.2% usage over the course of October.

On Tue, Nov 10, 2015 at 2:28 PM, Bruce <[email protected]> wrote:

> On Friday, November 6, 2015 at 7:15:31 PM UTC-5, Rick Andrews wrote:
> > > - We are re-evaluating when we should start rejecting all SHA-1 SSL
> > > certificates (regardless of when they were issued).  As we said before,
> > > the current plan is to make this change on January 1, 2017.  However,
> in
> > > light of recent attacks on SHA-1, we are also considering the
> > > feasibility of having a cut-off date as early as July 1, 2016.
> >
> > I think that pulling in this date will create chaos for some large
> enterprises who are already scrambling to phase out SHA-1 by the end of
> 2016. They had been counting on using all of 2016 to complete their
> migration. It wouldn't just be an inconvenience - it would make an
> already-difficult situation nearly impossible.
> >
> > And I'll point out that Microsoft is considering the same thing but with
> a different date - June 1, 2016. Would you at least consider collaborating
> with other browser vendors to agree on the same date?
>
> I agree with Rick that I don't think the date should change. Currently the
> CAs will stop issuing SHA-1 as of 1 January 2016. This will largely
> mitigate the collision attack similar to the previous MD5 attack. The input
> from SHAppening, makes it arguable that mitigating collision on 1 January
> 2016 was probably too late, but there is not much we can do about that
> decision.
>
> From what I understand we are not yet concerned about preimage or
> second-preimage attacks on SHA-1, so this would not be a reason to change
> the date.
>
> It would be great to understand what vulnerability we are trying to
> mitigate before changing the date when SHA-1 will be rejected.
>
> Thanks, Bruce.
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to