To update everyone following this issue, a patch implementing the
strategy of only accepting certain whitelisted certificates issued by
CNNIC roots is on its way to landing in mozilla-central [0]. It will be
uplifted to other branches as appropriate. More details are in bug
1151512 [1].

Cheers,
David Keeler

[0] https://hg.mozilla.org/integration/mozilla-inbound/rev/c94a39913b47
[1] https://bugzilla.mozilla.org/show_bug.cgi?id=1151512

On 04/02/2015 10:24 AM, Richard Barnes wrote:
> Thanks for the feedback on this plan, everyone.  Gerv, Kathleen, and I have
> discussed it, and our judgement is that there's consensus here to move
> forward with the plan as proposed:
> 
> * Do not remove the CNNIC root, but
> * Reject certificates chaining to CNNIC with a notBefore date after a
> threshold date*.*
> * Request that CNNIC provide a list of currently valid certificates, and
> publish that list so that the community can recognize any back-dated certs
> * Allow CNNIC to re-apply for full inclusion, with some additional
> requirements (to be discussed on this list)
> * If CNNIC's re-application is unsuccessful, then their root certificates w
> ill be removed
> 
> We may also enforce a whitelist, as suggested on the list, if it turns out
> to be feasible.
> 
> We will need to have a follow-on discussion to work out some additional
> details, e.g., what conditions should be placed on CNNIC's re-inclusion.  I
> will send a message starting that thread later today.
> 
> There will shortly be a post on the Mozilla Security Blog outlining this
> decision, along with more background.
> https://blog.mozilla.org/security/
> 
> Thanks again to everyone for the robust discussion here.
> 
> --Richard

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to