Hi I have few questions about Mozilla Root Store Policy 5.1 Mozilla Root Store Policy 5.1 only permits following algorithms for ECC.
> 5.1 Algorithms > > Root certificates in our root program, and __any certificate__ which > chains up to them, __MUST__ use __only__ algorithms and key sizes from the > following set: > > RSA keys whose modulus size in bits is divisible by 8, and is at least > 2048. > Digest algorithms: SHA-1 (see below), SHA-256, SHA-384, or SHA-512. > ECDSA keys using one of the following curve-hash pairs: > P-256 with SHA-256 > P-384 with SHA-384 I am wondering the above is for validation path only, or also for usage of EE certificate. #I thought it might be also for EE cert, since RFC5480 does not require anything on key usage(I descrive detail at the bottom of this text). As far as I understand, ECDSA public key just show a point on elliptic curve. that point can also be used (plain)ECDH or ECIES. So, if 5.1's description is also for end entity cert, EE cert's key-usage must contain digitalSignature, can contain nonRepudiation, and must not contain key agreement, key encipherment, etc. to comply 5.1. (question.1) So far I guess, that statement of 5.1 include requirement for key-usage of any EE certs, not limit to server certificates. is it correct? (question.2) In addition, if CA issue ECC certificate without appropriate key-usage, reason to revoke can be non-compliance with Mozilla's root program? RFC 5480 does not seems to require anything for key-usage #since, RFC 2119 state MAY is "truely optional" > RFC 5480 ECC SubjectPublicKeyInfo Format March 2009 > > If the keyUsage extension is present in an End Entity (EE) > certificate that indicates id-ecPublicKey in SubjectPublicKeyInfo, > then any combination of the following values MAY be present: > > digitalSignature; > nonRepudiation; and > keyAgreement. Regards Tadahiko Ito _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

