My gut reaction is 0+1, maybe 2. - The CAB Forum should specify the overall envelope of what is acceptable in the Web PKI - Firefox will enforce restrictions that are mores strict than the BRs requirements
If we do (2), then this will just be a three level hierarchy, with BRs < Mozilla Policy < Firefox. On Tue, Jan 24, 2017 at 10:30 AM, Gervase Markham <[email protected]> wrote: > A discussion inspired by > https://github.com/mozilla/pkipolicy/issues/5 > > Should Mozilla's root store policy contain any list of approved and/or > disapproved algorithms/key sizes, or not? Possible positions include at > least: > > 0) No; what algorithms and/or key sizes are supported by Firefox and/or > NSS is a decision for the hackers on those projects. There's no need for > a separate policy about it. > > 1) No; the Baseline Requirements, section 6.1.5, specify a set of > algorithms and key sizes: > https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.4.2.pdf . > If Mozilla's list is the same, there is no point; if it's different, you > just end up with the intersection. > > 2) Yes; we should have a list of banned algorithms and/or key sizes > which are weak and therefore dangerous for the web PKI, so we can use > the power of the policy to force them out of the system. But if an > algorithm or key size is not actively dangerous, anything else should be > permitted. > > 3) Yes; there are advantages such as interoperability (what else?) to > Mozilla using the power of the policy to define what algorithms and/or > key sizes are acceptable in the Web PKI; as long as we keep the list > under review, this is a good thing. > > Thoughts? > > Gerv > _______________________________________________ > dev-security-policy mailing list > [email protected] > https://lists.mozilla.org/listinfo/dev-security-policy > _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

