On Wed, May 28, 2014 at 4:42 PM, Ryan Sleevi <
[email protected]> wrote:

> Whether it's version 1 or 3 has no effect on path building. If the policy
> does require this, it's largely for cosmetic reasons than any strong
> technical reasons.
>
> That said, cutting a new v3 root may involve bringing the root signing key
> out of storage, hoisting a signing ceremony, etc. It may not be worth the
> cost. NSS could, if it wanted, create dummy certs (with invalid
> signatures) that looked just like the real thing, and things 'should' just
> work (mod, you know, the inevitable avalanche of bugs that crop up when I
> make statements like this).
>

mozilla::pkix will not trust a v1 certificate as an intermediate CA, but it
does accept v1 root certificates for backward compatibility with NSS and
for the reasons Ryan mentioned.

v1 TLS end-entity certificates do not comply with our policy because a v1
certificate cannot (according to the spec) contain a subjectAltName
extension and we require all TLS end-entity certificates to contain
subjectAltName. Similarly, v1 certificates cannot legally contain an OCSP
responder URI which is also required (practically).

Cheers,
Brian
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to