Also, there's no problem (from a Chrome UX perspective) because
Mozilla's certificate expires on 7 December 2015 — well before that
bad 1 Jan 2017 date, and even before the dodgy 1 Jan 2016 date.

http://googleonlinesecurity.blogspot.com/2014/09/gradually-sunsetting-sha-1.html

SHA-1 signature algorithms are not per se bad right now; what's bad is
certificate chains using SHA-1 that will/would be valid too far in the
future. Between now and 1 Jan 2016, and between then and 1 Jan 2017,
there is plenty of time to get a new certificate, signed with a
SHA-256-based signature function.

That's the whole point...

On Wed, Sep 24, 2014 at 1:54 PM, Chris Egeland <[email protected]> wrote:
> Rick,
>
> Long story short, upgrading the www.mozilla.org certificate to SHA-2 was
> costing them about 145,000 Firefox downloads per week.
>
> Details on the mozilla.org SHA-2 cert can be found here:
>
> https://bugzilla.mozilla.org/show_bug.cgi?id=1064387
>
> Chris
>
> On 9/24/2014 4:23 PM, Rick Andrews wrote:
>> Kathleen, why is mozilla.org still using a SHA-1 cert?
>> _______________________________________________
>> dev-security-policy mailing list
>> [email protected]
>> https://lists.mozilla.org/listinfo/dev-security-policy
>
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to