X.509 has supported key continuity for quite a long time, by doing self-issued rekeyed certificates for at least root CAs (which is why subjectKeyIdentifier and authorityKeyIdentifier had to become a thing).
What they're saying is that the applications that currently consume the PKI (why is it just web browsers right now? Oh yeah, because the name of the CABF literally says that "browsers" are the only consuming entities with any kind of seat at the table) have decided to mandate that root key material will have a maximum lifetime. This means that those consuming applications won't implement X.509's key continuity mechanism, even if the CAs themselves do self-issued certificates from older/continuity key material. (Mozilla has allowed root certificates which have been signed by different keys to be embedded in their store before.) I present no opinion as to whether this is an appropriate policy decision. I honestly have no faith in Mozilla, Google, or Apple to effectively manage their root processes in any useful way that doesn't reinforce the browsers' stranglehold on PKIX issuers, and so I have recused my voice from the discussion. -Kyle H On Tue, Dec 5, 2023 at 8:56 PM Peter Gutmann <[email protected]> wrote: > > 'Aaron Gable' via [email protected] > <[email protected]> writes: > > >This is contrary to the current industry consensus. > > Just doing a sanity check here, key continuity has been a core feature of SSH > security for close to thirty years, and was finally adopted for PKI use as > well after a string of highly-public CA failures. Are you saying that the > consensus among all? most? CAs is that actively breaking key continuity/ > pinning is a good idea, or is this just a Let's Encrypt thing? Just trying to > get an idea of how widespread this is. > > Peter. > > -- > You received this message because you are subscribed to the Google Groups > "[email protected]" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to [email protected]. > To view this discussion on the web visit > https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/SY4PR01MB62516AF55C8D8D82EC8A7083EE84A%40SY4PR01MB6251.ausprd01.prod.outlook.com. -- You received this message because you are subscribed to the Google Groups "[email protected]" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CADgtLZ5y8s-DEUc_Wei4_Diy8_h3gXFC21hVFattaTQffk0y5g%40mail.gmail.com.
