I'm all for modern crypto, but to be honest, these are a little far away.  The 
OIDs for Ed25519 aren't final yet, and I'm not aware of any work on putting 
SHA-3 in X.509 yet.

I think the right approach here is to delegate this to the BRs.

--Richard

On Thursday, November 5, 2015 at 3:03:05 PM UTC-5, [email protected] wrote:
> I would like to see SHA-3 signatures and Ed25519/curve25519 ASAP.
> The later one is not that far away [1].
> Maybe it's the right time to consider them?
> 
> [1] https://bugzilla.mozilla.org/show_bug.cgi?id=957105
> 
> 
> Am 05.11.2015 um 19:46 schrieb Kathleen Wilson:
> > The next two topics to discuss [1] have to do with section 8 of
> > Mozilla’s CA Certificate Maintenance Policy.
> >
> > The proposals are:
> > - (D15) Deprecate SHA-1 Hash Algorithms in certs.
> > and
> > - (D4) In item #8 of the Maintenance Policy recommend that CAs avoid
> > SHA-512 and P-521, especially in their CA certificates. This is to
> > ensure interoperability, as SHA-512 and (especially) P-521 are less
> > well-supported than the other algorithms. (Note: On the page you
> > linked to, P-521 is incorrectly spelled "P-512".)
> > -- Not sure if we should make this change...
> >
> > Bug https://bugzilla.mozilla.org/show_bug.cgi?id=1129083 was filed to
> > remove support for certs signed using SHA-512-based signatures, but it
> > was closed as invalid, and SHA-512 support was fixed via
> > https://bugzilla.mozilla.org/show_bug.cgi?id=1155932
> >
> > Bug https://bugzilla.mozilla.org/show_bug.cgi?id=1129077 was filed to
> > remove support for certs that use the P-521 curve. But this is still
> > up for discussion.
> >
> > So, do we really want to add a comment to Mozilla's policy about
> > limited support for SHA-512 and P-521?
> >
> > Here's what Mozilla's policy currently says:
> > https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/maintenance/
> >
> > ~~
> > 8. We consider the following algorithms and key sizes to be acceptable
> > and supported in Mozilla products:
> > - SHA-1 (until a practical collision attack against SHA-1 certificates
> > is imminent);
> > - SHA-256, SHA-384, SHA-512;
> > - Elliptic Curve Digital Signature Algorithm (using ANSI X9.62) over
> > SECG and NIST named curves P-256, P-384, and P-512;
> > - RSA 2048 bits or higher; and
> > - RSA 1024 bits (only until December 31, 2013).
> > ~~
> >
> > I recommend that we change it to the following:
> > ~~
> > 8. We consider the following algorithms and key sizes to be acceptable
> > and supported in Mozilla products:
> > - SHA-256, SHA-384, SHA-512;
> > - Elliptic Curve Digital Signature Algorithm (using ANSI X9.62) over
> > SECG and NIST named curves P-256, P-384, and P-521; and
> > - RSA 2048 bits or higher.
> > ~~
> >
> > Another option is to delete this section from Mozilla's policy,
> > because it is covered by the Baseline Requirements. However, the
> > Baseline Requirements allows for DSA, which Mozilla does not support.
> > The “Key Sizes” section of the Baseline Requirements allows for:
> > SHA‐256, SHA‐384 or SHA‐512
> > NIST P‐256, P‐384, or P‐521
> > DSA L= 2048, N= 224 or L= 2048, N= 256
> >
> >
> > As always, I will appreciate your thoughtful and constructive input
> > into this discussion.
> >
> > Kathleen
> >
> > [1]
> > https://wiki.mozilla.org/CA:CertificatePolicyV2.3#Proposed_Changes_That_Need_To_Be_Discussed
> > _______________________________________________
> > dev-security-policy mailing list
> > [email protected]
> > https://lists.mozilla.org/listinfo/dev-security-policy

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to