Hubert Kario <hka...@redhat.com> wrote:
> Brian Smith wrote:
>> It depends on your definition of "help." I assume the goal is to
>> encourage websites to migrate from 1024-bit signatures to RSA-2048-bit
>> or ECDSA-P-256 signatures. If so, then including the intermediates in
>> NSS so that all NSS-based applications can use them will be
>> counterproductive to the goal, because when the system administrator
>> is testing his server using those other NSS-based tools, he will not
>> notice that he is depending on 1024-bit certificates (cross-signed or
>> root) because everything will work fine.
>
> The point is not to ship a 1024 bit cert, the point is to ship a 2048 bit 
> cert.
>
> So for sites that present a chain like this:
>
> 2048 bit host cert <- 2048 bit old sub CA <- 1024 bit root CA
>
> we can find a certificate chain like this:
>
> 2048 bit host cert <- 2048 bit new cross-signed sub CA <- 2048 bit root CA
>
> where the cross-signed sub CA is shipped by NSS

Sure. I have no objection to including cross-signing certificates
where both the subject public key and the issuer public key are 2048
bits (or more). I am objecting only to including any cross-signing
certificates of the 1024-bit-subject-signed-by-2048-bit-issuer
variety. It has been a long time since we had the initial
conversation, but IIRC both types of cross-signing certificates exist.

Cheers,
Brian
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to