Thanks for raising this, Wayne.

As mentioned on the issue, this heavily overlaps with the RSA combinations
- and, of course, Mozilla policy being more strict than the BRs in
forbidding DSA.

Given that CAs have struggled with the relevant encodings, both for the
signatureAlgorithm and the subjectPublicKeyInfo field, I’m curious if you’d
be open to instead enumerating the allowed (canonical) encodings for both.
This would address open Mozilla Problematic Practices as well - namely, the
encoding of NULL parameters with respect to certain signature algorithms.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to