<div dir="ltr"><div>Hi Kurt,</div><div><br></div><div>This requirement was pulled into the BRs via ballot SC31 "Browser Alignment" from the Mozilla Root Store Policy. You can find the origin of Mozilla's requirement in discussions on the mozilla.dev.security.policy list archives. This one is most relevant: <a href="https://groups.google.com/g/mozilla.dev.security.policy/c/t3d1KrovIn4/m/CawabpAWBAAJ">https://groups.google.com/g/mozilla.dev.security.policy/c/t3d1KrovIn4/m/CawabpAWBAAJ</a></div><div><br></div><div>- Wayne<br></div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Sat, Jan 9, 2021 at 2:53 PM Kurt Roeckx via Servercert-wg <<a href="mailto:servercert-wg@cabforum.org">servercert-wg@cabforum.org</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Hi,<br>
<br>
The current document has this text:<br>
7.1.3.1 SubjectPublicKeyInfo<br>
[...]<br>
7.1.3.1.1 RSA<br>
The CA SHALL indicate an RSA key using the rsaEncryption (OID: 1.2.840.113549.1.1.1) algorithm identifier. The parameters MUST be present, and MUST be an explicit NULL. The CA SHALL NOT use a different algorithm, such as the id-RSASSA-PSS (OID: 1.2.840.113549.1.1.10) algorithm identifier, to indicate an RSA key.<br>
<br>
Why is id-RSASSA-PSS or id-RSAES-OAEP not allowed? RFC4055<br>
specifies the use of those OIDs to restrict the use of the RSA<br>
key. At least id-RSAES-OAEP is being used. Having the key<br>
type being id-RSASSA-PSS looks useful to me.<br>
<br>
<br>
Kurt<br>
<br>
_______________________________________________<br>
Servercert-wg mailing list<br>
<a href="mailto:Servercert-wg@cabforum.org" target="_blank">Servercert-wg@cabforum.org</a><br>
<a href="https://lists.cabforum.org/mailman/listinfo/servercert-wg" rel="noreferrer" target="_blank">https://lists.cabforum.org/mailman/listinfo/servercert-wg</a><br>
</blockquote></div>