On Wed, May 28, 2014 3:19 pm, Kathleen Wilson wrote:
>  On 5/25/14, 9:53 AM, Kurt Roeckx wrote:
> > On Tue, May 20, 2014 at 11:23:54AM -0700, Kathleen Wilson wrote:
> >> Maybe we should re-visit the idea of a "wall of shame", and publicly
> >> list
> >> the CAs who are still issuing certificates with the following problems.
> > [...]
> >> * Certificate not version 3
> >
> > I've only seen 1 such subscriber certificate, but I see 14 such
> > certificates in the CA root list.
> >...
> > Do we also want all the root CAs to change to v3?
> >
>
>  I've been checking the cert version for roots during the
>  inclusion/approval process, so those version 1 root certs must be old --
>  issued before the Baseline Requirements initial Effective Date of 1 July
>  2012.
>
>  So really the question is: Should we have a project to proactively
>  remove those old version 1 roots?
>
>  Kathleen
>

For roots, it really doesn't matter. A root certificate is, at least as
implemented in NSS, nothing more than a container format for a set of
user-visible strings (the cert metadata) and a (public key, subject name)
tuple of a trust anchor.

Whether it's version 1 or 3 has no effect on path building. If the policy
does require this, it's largely for cosmetic reasons than any strong
technical reasons.

That said, cutting a new v3 root may involve bringing the root signing key
out of storage, hoisting a signing ceremony, etc. It may not be worth the
cost. NSS could, if it wanted, create dummy certs (with invalid
signatures) that looked just like the real thing, and things 'should' just
work (mod, you know, the inevitable avalanche of bugs that crop up when I
make statements like this).


_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to