The newly released NSS 3.16.3 doesn't include 1024 bit CA certificates
any more[1]. This will of course impact users of servers that still use
it.

Interestingly, some intermediate CA certificates that were originally
signed by those 1024 bit CA certificates got cross signed using
different roots that will remain trusted[2]. In particular I mean the 
"USERTrust Legacy Secure Server CA" certificate.

Problem is, that some administrators haven't updated their servers
to provide the new intermediate certificate for 3 years. As such,
I don't think we can realistically expect all of them to update their
configuration now.

While testing found just 217 sites as of 2014-05-30 that are
impacted by this change[2], it did test only top 200 000
SSL enabled servers. I'd estimate the total number in Alexa top 1M
alone at over 373k. Moreover, some of those sites include sites that
are in the top 10000 sites, like groupon.my[3]. So loss of connectivity
to them may have bigger impact than the above quoted 217 could lead
us to believe.

That's why I think that we should ship the intermediate CA certificates
to make Firefox continue to interoperate with such sites.
I don't mean only the USERTrust certificate, but others too, if they
exist.

 1 - https://bugzilla.mozilla.org/show_bug.cgi?id=1021967
 2 - https://bugzilla.mozilla.org/show_bug.cgi?id=936304
 3 - https://www.ssllabs.com/ssltest/analyze.html?d=groupon.my
-- 
Regards,
Hubert Kario
Quality Engineer, QE BaseOS Security team
Email: hka...@redhat.com
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to