On 03/16/16 17:48, [email protected] wrote:
> On Wednesday, March 16, 2016 at 6:03:26 AM UTC-7, Jakob Bohm wrote:
>> On 16/03/2016 00:27, Charles Reiss wrote:
>>> On 03/15/16 22:43, kwilson wrote:
>>>> ACTION #1a: As previously communicated, CAs should no longer
>>>> be issuing SHA-1 certificates chaining up to root certificates
>>>> included in Mozilla's CA Certificate Program. This includes
>>>> TLS/SSL and S/MIME certificates, as well as any intermediate
>>>> certificates that they chain up to. Check your systems and
>>>> those of your subordinate CAs to ensure that SHA-1 based
>>>> TLS/SSL and S/MIME certificates chaining up to your included
>>>> root certificates are no longer being issued. Please enter the
>>>> last date that a SHA-1 based TLS/SSL certificate was issued 
>>>> that chained up to your root certificates included in
>>>> Mozilla's program. (Required)
>>> 
>>> For reasons discussed in thread on BR scope here (that
>>> restrictions from certificate contents won't be effective against
>>> a chosen-prefix collision attack), I was hoping that Mozilla
>>> would ask whether CAs would continue issuing any SHA-1
>>> certificates, regardless of suitability for TLS or S/MIME (except
>>> those that chain through technically constrained subCAs issued
>>> before 2016). But perhaps that needs to be done in context of
>>> more expansive improvements to Mozilla's policies.
>>> 
> 
> 
> Should we add a question to the survey about each CA's plans for
> issuance of SHA-1 based certificates other than TLS/SSL and S/MIME
> certificates that chain up to their included root certs?

If Mozilla intends to use the survey to inform its decision about
whether to distrust all SHA-1 certificates earlier than the current Jan
2017 date, yes.

>> 
>> I would suggest that in order to make themselves compliant, CAs
>> should be allowed to internally generate and issue a very limited
>> number of new technically constrained SHA-1 subCAs, where extreme
>> precautions are taken to ensure the internal data to be signed does
>> not facilitate SHA-1 collisions.   The major CAs probably did that
>> before the 1/1/2016 deadline, but some of the smaller CAs may have
>> not gotten that done yet.
>> 
> 
> 
> Are you saying that CAs should be able to issue SHA-1 intermediate
> certificates that are capable of issuing TLS/SSL certificates but are
> technically constrained via name constraints to certain domains?

I assume the idea is that the intermediates are technically constrained
from signing TLS or S/MIME certificates at all; for example, with an
extendedKeyUsage extension containing only code signing.

> 
> Thanks, Kathleen
> 

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to