X.509 has supported key continuity for quite a long time, by doing
self-issued rekeyed certificates for at least root CAs (which is why
subjectKeyIdentifier and authorityKeyIdentifier had to become a
thing).

What they're saying is that the applications that currently consume
the PKI (why is it just web browsers right now? Oh yeah, because the
name of the CABF literally says that "browsers" are the only consuming
entities with any kind of seat at the table) have decided to mandate
that root key material will have a maximum lifetime. This means that
those consuming applications won't implement X.509's key continuity
mechanism, even if the CAs themselves do self-issued certificates from
older/continuity key material.

(Mozilla has allowed root certificates which have been signed by
different keys to be embedded in their store before.)

I present no opinion as to whether this is an appropriate policy
decision. I honestly have no faith in Mozilla, Google, or Apple to
effectively manage their root processes in any useful way that doesn't
reinforce the browsers' stranglehold on PKIX issuers, and so I have
recused my voice from the discussion.

-Kyle H

On Tue, Dec 5, 2023 at 8:56 PM Peter Gutmann <[email protected]> wrote:
>
> 'Aaron Gable' via [email protected] 
> <[email protected]> writes:
>
> >This is contrary to the current industry consensus.
>
> Just doing a sanity check here, key continuity has been a core feature of SSH
> security for close to thirty years, and was finally adopted for PKI use as
> well after a string of highly-public CA failures.  Are you saying that the
> consensus among all? most? CAs is that actively breaking key continuity/
> pinning is a good idea, or is this just a Let's Encrypt thing?  Just trying to
> get an idea of how widespread this is.
>
> Peter.
>
> --
> You received this message because you are subscribed to the Google Groups 
> "[email protected]" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to [email protected].
> To view this discussion on the web visit 
> https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/SY4PR01MB62516AF55C8D8D82EC8A7083EE84A%40SY4PR01MB6251.ausprd01.prod.outlook.com.

-- 
You received this message because you are subscribed to the Google Groups 
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CADgtLZ5y8s-DEUc_Wei4_Diy8_h3gXFC21hVFattaTQffk0y5g%40mail.gmail.com.

Reply via email to