On Wednesday, March 16, 2016 at 6:03:26 AM UTC-7, Jakob Bohm wrote: > On 16/03/2016 00:27, Charles Reiss wrote: > > On 03/15/16 22:43, kwilson wrote: > >> ACTION #1a: As previously communicated, CAs should no longer be > >> issuing SHA-1 certificates chaining up to root certificates included > >> in Mozilla's CA Certificate Program. This includes TLS/SSL and S/MIME > >> certificates, as well as any intermediate certificates that they > >> chain up to. Check your systems and those of your subordinate CAs to > >> ensure that SHA-1 based TLS/SSL and S/MIME certificates chaining up > >> to your included root certificates are no longer being issued. Please > >> enter the last date that a SHA-1 based TLS/SSL certificate was issued > >> that chained up to your root certificates included in Mozilla's > >> program. (Required) > > > > For reasons discussed in thread on BR scope here (that restrictions from > > certificate contents won't be effective against a chosen-prefix > > collision attack), I was hoping that Mozilla would ask whether CAs would > > continue issuing any SHA-1 certificates, regardless of suitability for > > TLS or S/MIME (except those that chain through technically constrained > > subCAs issued before 2016). But perhaps that needs to be done in context > > of more expansive improvements to Mozilla's policies. > >
Should we add a question to the survey about each CA's plans for issuance of SHA-1 based certificates other than TLS/SSL and S/MIME certificates that chain up to their included root certs? > > I would suggest that in order to make themselves compliant, CAs should > be allowed to internally generate and issue a very limited number of > new technically constrained SHA-1 subCAs, where extreme precautions are > taken to ensure the internal data to be signed does not facilitate > SHA-1 collisions. The major CAs probably did that before the 1/1/2016 > deadline, but some of the smaller CAs may have not gotten that done yet. > Are you saying that CAs should be able to issue SHA-1 intermediate certificates that are capable of issuing TLS/SSL certificates but are technically constrained via name constraints to certain domains? Thanks, Kathleen _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

