[cabfpub] To revoke or not to revoke 1024
Kathleen Wilson
kwilson at mozilla.com
Tue Jun 25 02:47:52 UTC 2013
It was pointed out to me that my response regarding code signing certs
was not clear.
I think it's fine for 1024-bit code signing certs to expire, and not be
revoked based on some transition date. I think that 1024-bit code
signing certs should not be used to sign new code after this year.
Kathleen
On 6/24/13 3:31 PM, Kathleen Wilson wrote:
> Rick,
>
>> Please comment, especially browser vendors.
>
> Mozilla's wiki page about this
> (https://wiki.mozilla.org/CA:MD5and1024) was created in April 2010,
> and email about it was also sent to CAs
> (https://wiki.mozilla.org/CA:Communications#October_11.2C_2010)
>
> The wiki page allows for use of 1024-bit certs when needed for
> interoperability reasons:
> "- This means that CAs should only consider issuing a 1024-bit
> certificate if it is requested and justified by the subscriber for a
> specific reason, such as interoperability with devices that do not yet
> support certificates with larger key sizes.
> - The CA must assess the risk involved in issuing such a certificate
> for legacy use/interoperability, and determine if they are willing to
> accept the risk, as well as any possible liability. The subject and
> relying parties also need to determine if they will accept any risks
> and liabilities."
>
> The wiki page also makes it clear that CAs should not expect continued
> support of 1024-bit certs in Mozilla products:
> "Under no circumstances should any party expect continued support for
> RSA key size smaller than 2048 bits past December 31, 2013."
>
>
>> Do CAs need to revoke 1024-bit end-entity certs by the end of 2013?
>
> I think that depends on the type of cert and when it expires.
>
> I am fine with S/MIME certs being transitioned whenever they expire,
> even if it is a couple of years out. Though, I won't guarantee support
> of those certs in Mozilla products.
>
> I would like to see the transition from 1024-bit SSL and code signing
> certs happen soon. However, it really doesn't matter to me what the
> exact date is, as long as the transition is completed before it
> becomes an emergency.
>
> Also on the wiki page: "December 31, 2013 -- Mozilla will disable the
> SSL and Code Signing trust bits for root certificates with RSA key
> sizes smaller than 2048 bits. If those root certificates are no longer
> needed for S/MIME, then Mozilla will remove them from NSS."
>
> In hindsight, I should have said "after December 31...". My goal is Q1
> 2014, and I am working on this in Mozilla Bugzilla #881553.
>
>> Since the BRs effectively cover only certs issued after "the
>> effective date", does that mean that certs issued before "the
>> effective date" don't need to be revoked?
>
> That was my interpretation of the BRs, but Mozilla's communication
> about phasing out 1024-bit certs started in 2010. In 2010 I also
> exchanged direct email with representatives of the CAs that had
> 1024-bit root certs included in Mozilla products at that time, so all
> impacted CAs were well aware of Mozilla's requirements.
>
>> What about code signing certs?
>
> What I said above applies to both SSL and code signing certs.
>
>
> Kathleen
>
>
>
> On 6/23/13 12:32 PM, Rick Andrews wrote:
>> We discussed this a bit in our face-to-face meeting in Munich, but
>> did not reach consensus. I'd like to continue the conversation with
>> all via the list.
>> Putting aside the question of "web pki" vs. "non-web pki", Symantec
>> and other CAs would like to see if we can achieve consensus on these
>> questions:
>>
>> 1. Do CAs need to revoke 1024-bit end-entity certs by the end of 2013?
>>
>> 1. I believe that some CAs believed that revoking such certs was
>> mandatory. However, I see no hard evidence of that.
>> 2. The BRs say that 1024-bit can be issued as long as the end date
>> is before December 31, 2013. Others have said that a CA that was
>> compliant with the BRs would not have issued a 1024-bit end
>> entity cert after the effective date if its end date was 2014 or
>> later. However, we've seen that not all CAs became compliant on
>> July 1, 2012. Given what we now know about audits and effective
>> dates, it seems to me that there is a lot of uncertainty here.
>> 3. Apart from the BRs, CAs have to consider browser policy which may
>> go above and beyond the BRs. In a private conversation with Tom
>> Albertson of Microsoft, he told me that "Our policy doesn't
>> contemplate CAs revoking EE certs issued before 1 Jan 2014,
>> unless or until an RSA factoring attack is imminent, and we all
>> go into response mode." Mozilla's policy seems to be similar --
>> it says that such certs must expire by January 1, 2014, but it
>> does not mandate that CAs revoke any such certs that would live
>> beyond that date.
>> 4. If there is no clear direction here, I propose that CAs simply
>> let all 1024-bit end entity certs expire naturally, as long as
>> the CA has stopped issuing 1024-bit end entity certs, and made an
>> honest effort to comply with the BRs (hard to define, but at the
>> very least would mean that the CA wasn't still issuing multi-year
>> 1024-bit certs in 2013).
>>
>> 2. Since the BRs effectively cover only certs issued after "the
>> effective date", does that mean that certs issued before "the
>> effective date" don't need to be revoked?
>>
>> 5. That is my interpretation. Given what I said in 1) above, even
>> those certs issued after the effective date don't need to be
>> revoked, unless some browser's policy mandates that action.
>>
>> 3. What about code signing certs?
>>
>> 6. The BRs don't cover non-EV code signing certs, so again this goes
>> back to browser policy. And unless some browser comes forth with
>> unambiguous policy on code signing certs, I would suggest they
>> are also off the table (do not need to be revoked).
>>
>> Please comment, especially browser vendors. Thanks,
>> -Rick
>>
>>
>> _______________________________________________
>> Public mailing list
>> Public at cabforum.org
>> https://cabforum.org/mailman/listinfo/public
>
>
>
> _______________________________________________
> Public mailing list
> Public at cabforum.org
> https://cabforum.org/mailman/listinfo/public
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/public/attachments/20130624/afcdae95/attachment-0003.html>
More information about the Public
mailing list