On Sat, Feb 9, 2019 at 8:55 PM Corey Bonnell via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> Hello,
> Section 5.1 of the Mozilla Root Store Policy (
> https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/)
> specifies the allowed set of key and signature algorithms for roots and
> certificates that chain to roots in the Mozilla Root Store. Specifically,
> the following hash algorithms and ECDSA hash/curve pairs are allowed:
>
> • Digest algorithms: SHA-1 (see below), SHA-256, SHA-384, or SHA-512.
> • P‐256 with SHA-256
> • P‐384 with SHA-384


>
> Given this, if an End-Entity certificate were signed using a subordinate
> CA’s P-384 key with ecdsa-with-SHA512 as the signature algorithm (which
> would be reflected in the End-Entity certificate's signatureAlgorithm
> field), would this violate Mozilla policy? As I understand it, an ECDSA
> signing operation with a P-384 key using SHA-512 would be equivalent to
> using SHA-384 (due to the truncation that occurs), so I am unsure if this
> would violate the specification above (although the signatureAlgorithm
> field value would be misleading). I believe the same situation exists if a
> P-256 key is used for a signing operation with SHA-384.
>
> Any insight into whether this is allowed or prohibited would be
> appreciated.
>
> Thanks,
> Corey


I don’t think you can read that policy, as written, and legitimately
interpret it as allowed. It’s literally not listed.


> _______________________________________________
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to