Thanks for the timely information, Kathleen.  

We have two browser plans proposed so far, where Microsoft's will present an
unmodified UI until the two milestones, and Google's will soon introduce an
advisory trust icon guiding the end user that the site they are visiting is
not using the best possible certificate technology available.

Do you or FF product management have an instinct or decision on which way
Firefox may go in the time leading up to the first enforcement date of
1/1/16?

Would you demote EV UI for two year SHA-1 EV certs on 1/2/15 because
notAfter crosses the future deprecation target?  Given no exposure caused by
SHA-1 use until 1/1/16, would you plan for any UI warning that a site is
using a SHA-1 certificate prior to that end of issuance milestone?

Understood as a basic point that any change in SHA-1 integrity would warrant
an all new plan appropriate to the event.

Kind regards,
Steven Medin
Product Manager, Identity and Access Management
Verizon Enterprise Solutions
 

-----Original Message-----
From: dev-security-policy
[mailto:dev-security-policy-bounces+steve.medin=verizonbusiness....@lists.mo
zilla.org] On Behalf Of Kathleen Wilson
Sent: Thursday, August 28, 2014 12:53 PM
To: [email protected]
Subject: Re: Formalize a SHA-1 deprecation announcement?

Yep.

I recently added the following. Feedback welcome/appreciated.

https://wiki.mozilla.org/CA:Problematic_Practices#SHA-1_Certificates
==
SHA-1 certificates may be compromised when attackers can create a fake cert
that hashes to the same value as one with a legitimate signature, and is
hence trusted. Mozilla can mitigate this potential vulnerability by turning
off support for SHA-1 based signatures. The SHA-1 root certificates don’t
necessarily need to be removed from NSS, because the signatures of root
certificates are not validated (roots are self-signed). Disabling SHA-1 will
impact intermediate and end entity certificates, where the signatures are
validated.

There are still many end entity certificates that would be impacted if
support for SHA-1 based signatures was turned off. Therefore, we are hoping
to give CAs time to react, and are planning to turn off support for SHA-1
based signatures in 2017. Note that Mozilla will take this action earlier if
needed to keep our users safe.

CAs should not be issuing new SHA-1 certificates, and should be migrating
their customers off of SHA-1 intermediate and end-entity certificates.

If a CA still needs to issue SHA-1 certificates for compatibility reasons,
then those SHA-1 certificates should expired before 2017.
==


Also, this topic is on my list of things to included in the next CA 
Communication. I was hoping to not have to do another CA Communication 
until I have migrated the CA Program data into SalesForce.com and have a 
more automated way to handle CA Communications and responses. (this 
project has started, more info to come as we make progress)

I can make an announcement in Mozilla's Security Blog if you all think 
that is needed. (btw... I'm also drafting a security blog about 1024-bit 
certs.)

Thanks,
Kathleen



_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to