On 27/01/2017 19:53, Ryan Sleevi wrote:
> On Fri, Jan 27, 2017 at 3:47 AM, Gervase Markham <g...@mozilla.org> wrote:
>>
>> * RSA keys with a minimum modulus size of 2048 bits
>>
> 
> Nits and niggles: Perhaps 2048, 3072, 4096?
> 
> - 8K RSA keys cause Web PKI interop problems
> - RSA keys that aren't modulo 8 create interop problems

It looks like a number of CAs currently accept RSA keys with modulus
sizes != (2048, 3072, 4096). Censys currently finds 21,150 EE certs[1].
Does it make more sense to explicitly add the mod 8 requirement to the
policy in this case, while allowing anything >= 2048 <= 4096?

[1]:
https://censys.io/certificates?q=current_valid_nss%3A+true+and+parsed.subject_key_info.key_algorithm.name%3A+RSA+not+parsed.subject_key_info.rsa_public_key.length%3A+%282048+or+3092+or+4096%29&page=1

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to