On Mon, Jan 18, 2016 at 11:07 AM, Jakob Bohm <[email protected]> wrote:

> On 18/01/2016 16:19, Richard Barnes wrote:
>
>> "Failed" might be a bit strong  :)  We had a temporary setback.
>>
>> Like the blog post says, we're working on more precisely characterizing
>> how
>> widespread and how broken these middleboxes are, before taking steps to
>> re-enable the SHA-1 restrictions.  I still think we're on track for
>> turning
>> off SHA-1 entirely (together with the other browsers) sometime around EOY,
>> but obviously there's a bit more uncertainty now.
>>
>> One thing that has been proposed is to have an exception for local roots,
>> i.e., to let non-default trust anchors continue to use SHA-1 for some more
>> time.  What do folks here think about that idea?
>>
>>
>>
> How about letting certs that chain to roots that are self-signed with
> SHA-1 use SHA-1, assuming no such roots remain in the default trust
> list.
>

I don't think that assumption is true, unfortunately.  And even if it were,
it seems like this strategy would result in some hard-to-debug errors
without much benefit.

--Richard


> However this would not work if the default root list contains roots
> that are self-signed (historically) using SHA-1, but which no longer
> issue certificates signed with SHA-1 (this is possible for non-DSA
> roots only).
>
> Enjoy
>
> Jakob
> --
> Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
> Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
> This public discussion message is non-binding and may contain errors.
> WiseMo - Remote Service Management for PCs, Phones and Embedded
>
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to