My gut reaction is 0+1, maybe 2.

- The CAB Forum should specify the overall envelope of what is acceptable
in the Web PKI
- Firefox will enforce restrictions that are mores strict than the BRs
requirements

If we do (2), then this will just be a three level hierarchy, with BRs <
Mozilla Policy < Firefox.


On Tue, Jan 24, 2017 at 10:30 AM, Gervase Markham <[email protected]> wrote:

> A discussion inspired by
> https://github.com/mozilla/pkipolicy/issues/5
>
> Should Mozilla's root store policy contain any list of approved and/or
> disapproved algorithms/key sizes, or not? Possible positions include at
> least:
>
> 0) No; what algorithms and/or key sizes are supported by Firefox and/or
> NSS is a decision for the hackers on those projects. There's no need for
> a separate policy about it.
>
> 1) No; the Baseline Requirements, section 6.1.5, specify a set of
> algorithms and key sizes:
> https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.4.2.pdf .
> If Mozilla's list is the same, there is no point; if it's different, you
> just end up with the intersection.
>
> 2) Yes; we should have a list of banned algorithms and/or key sizes
> which are weak and therefore dangerous for the web PKI, so we can use
> the power of the policy to force them out of the system. But if an
> algorithm or key size is not actively dangerous, anything else should be
> permitted.
>
> 3) Yes; there are advantages such as interoperability (what else?) to
> Mozilla using the power of the policy to define what algorithms and/or
> key sizes are acceptable in the Web PKI; as long as we keep the list
> under review, this is a good thing.
>
> Thoughts?
>
> Gerv
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to