On Wednesday, March 16, 2016 at 6:03:26 AM UTC-7, Jakob Bohm wrote:
> On 16/03/2016 00:27, Charles Reiss wrote:
> > On 03/15/16 22:43, kwilson wrote:
> >> ACTION #1a: As previously communicated, CAs should no longer be
> >> issuing SHA-1 certificates chaining up to root certificates included
> >> in Mozilla's CA Certificate Program. This includes TLS/SSL and S/MIME
> >> certificates, as well as any intermediate certificates that they
> >> chain up to. Check your systems and those of your subordinate CAs to
> >> ensure that SHA-1 based TLS/SSL and S/MIME certificates chaining up
> >> to your included root certificates are no longer being issued. Please
> >> enter the last date that a SHA-1 based TLS/SSL certificate was issued
> >> that chained up to your root certificates included in Mozilla's
> >> program. (Required)
> >
> > For reasons discussed in thread on BR scope here (that restrictions from
> > certificate contents won't be effective against a chosen-prefix
> > collision attack), I was hoping that Mozilla would ask whether CAs would
> > continue issuing any SHA-1 certificates, regardless of suitability for
> > TLS or S/MIME (except those that chain through technically constrained
> > subCAs issued before 2016). But perhaps that needs to be done in context
> > of more expansive improvements to Mozilla's policies.
> >


Should we add a question to the survey about each CA's plans for issuance of 
SHA-1 based certificates other than TLS/SSL and S/MIME certificates that chain 
up to their included root certs?


> 
> I would suggest that in order to make themselves compliant, CAs should
> be allowed to internally generate and issue a very limited number of
> new technically constrained SHA-1 subCAs, where extreme precautions are
> taken to ensure the internal data to be signed does not facilitate
> SHA-1 collisions.   The major CAs probably did that before the 1/1/2016
> deadline, but some of the smaller CAs may have not gotten that done yet.
> 


Are you saying that CAs should be able to issue SHA-1 intermediate certificates 
that are capable of issuing TLS/SSL certificates but are technically 
constrained via name constraints to certain domains?

Thanks,
Kathleen
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to