Mozilla and other browsers have been approached by Worldpay, a large payment processor, via Symantec, their CA. They have been transitioning to SHA-2 but due to an oversight have failed to do so in time for a portion of their infrastructure, and failed to renew some SHA-1 server certificates before the issuance deadline of 31st December 2015.
They now need 9 SHA-1 certificates issued before 28th February 2015, or approximately 10,000+ payment terminals around the world will stop working. This equipment was created some time ago, and unfortunately only supports publicly-trusted roots. Using roots removed from browser root programs is also not a complete solution to the program; these 10,000 do not trust any of those roots. This equipment does not support SHA-256 and cannot be replaced in time. The data travels over the public internet but the servers are not accessed by browsers. Due to the short timelines involved, a change in the BRs by the CAB Forum is also not possible. Therefore, they are seeking to get browser acknowledgement that a qualified audit, qualified by the existence of these certs, will be acceptable. The payment industry is moving towards SHA-256 but their timeline does not line up with the CAB Forum one. Our understanding is that Worldpay is not the only payment processor in this position. (We are not sure how to match this information with Worldpay's assertion that this was an oversight on their part, unless such oversights are unusually common at payment processors.) Our proposal, which we have sent to Symantec, Worldpay and the other browsers, is as follows: Symantec may issue certificates to Worldpay if the following things are true: 1. You immediately give copies to Mozilla (and other vendors who desire them) for us to immediately add them to OneCRL, as if they had been mis-issued. 2. Symantec's OCSP server MUST present a response of Revoked to any request for these certificates from, at a minimum, Firefox (based on User-Agent). Other browsers may wish to be added to this list. Sending Revoked to everyone would be easiest, but that depends on your testing as to whether it will break the intended clients. 3. Certificates issued under this exception MUST be logged to CT, and Symantec MUST disclose which logs they will be published in. 4. On issuance of any such certificate(s), the issuer MUST send mail to cabfpub announcing the event, including references to the CT entries. 5. The auditor's qualification MUST actively attest that the extent of SHA-1 issuance is no greater than that disclosed in CT. (Otherwise the qualification will be deemed unacceptable.) 6. The lifetime of the issued SHA-1 certificates MUST be no more than 90 days. Reissuance is permitted, but Mozilla reserves the right to decide in the future that the conditions for further issuance of such certificates may vary, including deeming them unacceptable under any circumstances. Mozilla is very likely to not permit validity to extend beyond the SHA-1 deadline of 31st December 2016. 7. This exception applies to Worldpay only; you need to come back and ask, presenting the circumstances, for other cases. If the impact is similar, similar terms may be extended. Mozilla is very keen to see SHA-1 eliminated, but understands that for historical reasons poor decisions were made in private PKIs about which roots to trust, and such decisions are not easily remedied. Please comment on whether this proposal seems reasonable, being aware of the short timelines involved. Gerv _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

