Le mercredi 29 janvier 2014 01:25:28 UTC+1, Kathleen Wilson a écrit :
> DigiCert has applied to include 5 new root certificates that will 
> eventually replace the 3 DigiCert root certificates that were included 
> in NSS via bug #364568. The request is to turn on all 3 trust bits and 
> enable EV for all of the new root certs.
> 
> 1) DigiCert Assured ID Root G2 -- This SHA-256 root will eventually 
> replace the SHA-1 "DigiCert Assured ID Root CA" certificate.
> 
> 2) DigiCert Assured ID Root G3 -- The ECC version of the Assured ID root.
> 
> 3) DigiCert Global Root G2 -- This SHA-256 root will eventually replace 
> the SHA-1 "DigiCert Global Root CA" certificate.
> 
> 4) DigiCert Global Root G3 -- The ECC version of the Global root.
> 
> 5) DigiCert Trusted Root G4 -- This SHA-384 root will eventually replace 
> the SHA-1 "DigiCert High Assurance EV Root CA" certificate.

There's some minor points:
 - the CRLs include a revoked certificate with a reason "unspecified", RFC5280 
states that it SHOULD be absent (instead of using this reason code); SHOULD 
isn't a MUST
 - the OCSP responders, when asked about the only revoked certificate so far 
(serial 01000000000000000000000000000001), reply as if it was non existent 
(unauthorized); this is strange, as this certificate should exist, if it's 
revoked
 - the ECC certificates have a keyUsage set to digitalSignature and 
keyAgreement; keyAgreement is correct wrt the public key (id-ecPublicKey covers 
both ECDSA and ECDH keys), but is useless in TLS (not a security problem at all)

The first and third points are only remarks and can be ignored, but could you 
reply on the second point, Jeremy?

Other than that, everything's clean.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to