On Tue, Apr 19, 2016 at 12:08:21PM -0700, [email protected] wrote:
> On Friday, 15 April 2016 20:26:39 UTC+3, Richard Barnes  wrote:
> > Do you mean SHA-1 for client certificates?  For those, the browser isn't
> > the relying party; it would be up to the website to decide whether a SHA-1
> > client certificate is acceptable.
> 
> But the browser still needs to "support" the certificates.

All a browser needs to do to "support" a client certificate is send it to
the relying party, and use the corresponding private key to do some
cryptographic operations.  I'm not certain, but I'd be *extremely* surprised
if all the cryptographic-level code for "weak" algorithms and key strengths
had been forcibly removed from NSS.

> Given the somewhat fragile state of client certificate authentication
> (keygen removal, "x509 UX is ugly" etc), maybe it might be useful to have
> a baseline profile for client certificates as well?

I don't see how your conclusion follows from your axiom.  Could you expand
somewhat on that?

> What if I used 512 bit RSA keys?  MD5?  Shall a browser or some other
> client side system intervene?  Drawing a reasonable line with reasonable
> dates might be helpful to the community as a whole.

How would it be helpful?

- Matt

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to