I'd prefer a requirement for long serial numbers over a total ban on SHA-1 Sub 
CAs. The BRs state 112 bits of entropy, so I'd recommend using that for non BR 
certificates (assuming client applications don't have issues with that).

Doug

-----Original Message-----
From: dev-security-policy 
[mailto:dev-security-policy-bounces+doug.beattie=globalsign....@lists.mozilla.org]
 On Behalf Of Gervase Markham
Sent: Monday, November 7, 2016 8:53 AM
To: Nick Lamb; [email protected]
Subject: Re: Implementing a SHA-1 ban via Mozilla policy

> Another economic tactic would be to require CAs to use long random
> serial numbers even in non-BR certificates. 

How long would you say is long enough?

Gerv

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to