On 7/4/14, 6:27 AM, Hubert Kario wrote:
The newly released NSS 3.16.3 doesn't include 1024 bit CA certificates
any more[1]. This will of course impact users of servers that still use
it.
<snip>
That's why I think that we should ship the intermediate CA certificates
to make Firefox continue to interoperate with such sites.


Hubert and all,

I apologize for my delay in responding to this. I was on a 3-week family vacation, and am still trying to catch up.

Thank you for your consideration and input on this topic. I don't yet have an answer, but I wanted to let you all know that we have been looking into this.


== Background ==
We have begun removal of 1024-bit roots with the following 2 bugs:
https://bugzilla.mozilla.org/show_bug.cgi?id=936304
-- Remove Entrust.net, GTE CyberTrust, and ValiCert 1024-bit root certificates from NSS
https://bugzilla.mozilla.org/show_bug.cgi?id=986005
 -- Turn off SSL and Code Signing trust bits for VeriSign 1024-bit roots

There are two more sets of 1024-bit root changes that will need to follow:
https://bugzilla.mozilla.org/show_bug.cgi?id=986014
 -- Remove Thawte 1024-bit roots
https://bugzilla.mozilla.org/show_bug.cgi?id=986019
-- Turn off SSL and Code Signing trust bits for Equifax 1024-bit roots

Note that in the future we may have to take similar action for SHA1 roots, or for other old roots that are being replaced with new and more compliant roots (e.g. baseline requirements). So, there will be an ongoing need to transition servers from using old cert chains to new cert chains.


== Problem ==
Some web server administrators have not updated their web servers to provide a new intermediate certificate signed by a newer root, even though the CA has implored them to do so. For those websites, users may get the Untrusted Connection error when the old root is removed.


== Possible Solution ==
One possible way to help mitigate the pain of migration from an old root is to directly include the cross-signed intermediate certificate that chains up to the new root in NSS for 1 or 2 years. With classic NSS path building, the path with the newer issuer is taken, so path validation will go through the (newer) cross-signed intermediate certificate. With mozilla::pkix all paths are considered until path validation succeeds. Therefore, directly including the cross-signed intermediate certificate for a while could provide a smoother transition. Presumably over that time, the SSL certs will expire and the web server operators will upgrade to the new cert chains.

This does not mean that we would begin including intermediate certs upon request. We would only consider using this approach as a way to provide a smoother transition when we remove a root certificate. Mozilla would determine when it is necessary to include an intermediate certificate for the purpose of removing a root certificate.


== For this batch of root changes ==

We are still investigating if we should use this possible solution for this batch of root changes. Please stay tuned and continue to share data and test results that should be considered.


== Side note ==

  3 - https://www.ssllabs.com/ssltest/analyze.html?d=groupon.my

The SSL cert for https://www.groupon.my/ is a 2-year cert that was created on July 23, 2012, and expires on October 22, 2014, so hopefully they plan to update their SSL cert and chain soon.

The intermediate cert on this site (USERTrust Legacy Secure Server CA) expires on November 1, 2015, so I expect that the new SSL cert will not be issued by this intermediate cert. So the website operator will have to update the entire cert chain -- which they should do whenever they update their SSL cert.


Thanks,
Kathleen

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to