I would like to see SHA-3 signatures and Ed25519/curve25519 ASAP.
The later one is not that far away [1].
Maybe it's the right time to consider them?

[1] https://bugzilla.mozilla.org/show_bug.cgi?id=957105


Am 05.11.2015 um 19:46 schrieb Kathleen Wilson:
> The next two topics to discuss [1] have to do with section 8 of
> Mozilla’s CA Certificate Maintenance Policy.
>
> The proposals are:
> - (D15) Deprecate SHA-1 Hash Algorithms in certs.
> and
> - (D4) In item #8 of the Maintenance Policy recommend that CAs avoid
> SHA-512 and P-521, especially in their CA certificates. This is to
> ensure interoperability, as SHA-512 and (especially) P-521 are less
> well-supported than the other algorithms. (Note: On the page you
> linked to, P-521 is incorrectly spelled "P-512".)
> -- Not sure if we should make this change...
>
> Bug https://bugzilla.mozilla.org/show_bug.cgi?id=1129083 was filed to
> remove support for certs signed using SHA-512-based signatures, but it
> was closed as invalid, and SHA-512 support was fixed via
> https://bugzilla.mozilla.org/show_bug.cgi?id=1155932
>
> Bug https://bugzilla.mozilla.org/show_bug.cgi?id=1129077 was filed to
> remove support for certs that use the P-521 curve. But this is still
> up for discussion.
>
> So, do we really want to add a comment to Mozilla's policy about
> limited support for SHA-512 and P-521?
>
> Here's what Mozilla's policy currently says:
> https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/maintenance/
>
> ~~
> 8. We consider the following algorithms and key sizes to be acceptable
> and supported in Mozilla products:
> - SHA-1 (until a practical collision attack against SHA-1 certificates
> is imminent);
> - SHA-256, SHA-384, SHA-512;
> - Elliptic Curve Digital Signature Algorithm (using ANSI X9.62) over
> SECG and NIST named curves P-256, P-384, and P-512;
> - RSA 2048 bits or higher; and
> - RSA 1024 bits (only until December 31, 2013).
> ~~
>
> I recommend that we change it to the following:
> ~~
> 8. We consider the following algorithms and key sizes to be acceptable
> and supported in Mozilla products:
> - SHA-256, SHA-384, SHA-512;
> - Elliptic Curve Digital Signature Algorithm (using ANSI X9.62) over
> SECG and NIST named curves P-256, P-384, and P-521; and
> - RSA 2048 bits or higher.
> ~~
>
> Another option is to delete this section from Mozilla's policy,
> because it is covered by the Baseline Requirements. However, the
> Baseline Requirements allows for DSA, which Mozilla does not support.
> The “Key Sizes” section of the Baseline Requirements allows for:
> SHA‐256, SHA‐384 or SHA‐512
> NIST P‐256, P‐384, or P‐521
> DSA L= 2048, N= 224 or L= 2048, N= 256
>
>
> As always, I will appreciate your thoughtful and constructive input
> into this discussion.
>
> Kathleen
>
> [1]
> https://wiki.mozilla.org/CA:CertificatePolicyV2.3#Proposed_Changes_That_Need_To_Be_Discussed
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy


Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to