----- Original Message -----
> From: "Kathleen Wilson" <[email protected]>
> To: [email protected]
> Sent: Saturday, 26 July, 2014 12:11:11 AM
> Subject: Re: Removal of 1024 bit CA roots - interoperability
> 
> On 7/4/14, 6:27 AM, Hubert Kario wrote:
> > The newly released NSS 3.16.3 doesn't include 1024 bit CA certificates
> > any more[1]. This will of course impact users of servers that still use
> > it.
> <snip>
> > That's why I think that we should ship the intermediate CA certificates
> > to make Firefox continue to interoperate with such sites.
> 
> == Possible Solution ==
> One possible way to help mitigate the pain of migration from an old root
> is to directly include the cross-signed intermediate certificate that
> chains up to the new root in NSS for 1 or 2 years.
<snip>
> This does not mean that we would begin including intermediate certs upon
> request. We would only consider using this approach as a way to provide
> a smoother transition when we remove a root certificate. Mozilla would
> determine when it is necessary to include an intermediate certificate
> for the purpose of removing a root certificate.

Thank you for looking into this

> == For this batch of root changes ==
> 
> We are still investigating if we should use this possible solution for
> this batch of root changes. Please stay tuned and continue to share data
> and test results that should be considered.

I did perform a scan of the Alexa Top 1 million the week before this,
unfortunately I didn't have the time to write a script to perform analysis
of this data yet. I'll try to do this this week.

-- 
Regards,
Hubert Kario
Quality Engineer, QE BaseOS Security team
Email: [email protected]
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to