On Thu, 3 Mar 2016 08:25:52 -0800
Richard Barnes <[email protected]> wrote:

> Perhaps this is something we should clarify in the BRs or Mozilla
> policy.  While I'm glad an actual cert was not issued in this case, it
> is important to maintain consistency between precertificates and
> certificates, if only for the CT logs tell a consistent story.

There's a more important reason, which is that if you can get a CA to
sign a pre-cert using a weak hash algorithm, and that signature is
conveniently published in a CT log, you can potentially exploit a
collision to forge a valid, trusted certificate (the forgery need not
contain the poison extension)[1].  Because of this, issuing a SHA-1
pre-cert is _just as bad_ as issuing a SHA-1 cert - there is no silver
lining that the actual cert was not issued.

It's also troubling that a CA may be allowed to continue issuing
non-serverAuth certs with SHA-1 from an issuer that is also used for
serverAuth certs.  Again, a collision attack could be used to forge a
trusted serverAuth cert.

I urge that this hole be fixed in both Mozilla policy and the BRs, not
just by clarifying the cert/pre-cert equivalence, but also by forbidding
an issuer that is trusted for serverAuth from signing _anything_ with
SHA-1.

Regards,
Andrew

[1] Unless the precert was signed by a dedicated precert signing
certificate, which was not the case here.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to