----- Original Message -----
> From: "Kurt Roeckx" <[email protected]>
> To: [email protected]
> Sent: Monday, July 7, 2014 1:46:18 PM
> Subject: Re: Removal of 1024 bit CA roots - interoperability
> 
> On 2014-07-07 13:29, Hubert Kario wrote:
> > ----- Original Message -----
> >> From: "David E. Ross" <[email protected]>
> >> Why should Mozilla provide cover for server administrators who fail to
> >> update their servers and for certification authorities who fail to
> >> communicate clearly with their customers?  I believe such action will
> >> only encourage further such failures.
> >
> > Because it is Mozilla that distrusts 1024 bit RSA CA keys ahead of
> > CA/Browser forum schedule:
> >
> > " Root CA Certificate issued prior to 31 Dec. 2010 with an RSA
> > key size less than 2048 bits MAY still serve as
> > a trust anchor for Subscriber Certificates issued in accordance
> > with these Requirements."
> >
> > There is no date as to when 1024 bit RSA roots are to be untrusted,
> > unlike the intermediate certificates which all *do* have a hard date:
> > 31st December 2014.
> 
> That's 31st December 2013.

yes, 2013, miss-pressed a key

-- 
Regards,
Hubert Kario
Quality Engineer, QE BaseOS Security team
Email: [email protected]
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to