----- Original Message -----
> From: "Chris Palmer" <pal...@google.com>
> To: "Chris Egeland" <ch...@chrisegeland.com>
> Cc: "mozilla-dev-security-pol...@lists.mozilla.org" 
> <dev-security-policy@lists.mozilla.org>
> Sent: Wednesday, 24 September, 2014 11:53:58 PM
> Subject: Re: Security Blog about SHA-1
> 
> Also, there's no problem (from a Chrome UX perspective) because
> Mozilla's certificate expires on 7 December 2015 — well before that
> bad 1 Jan 2017 date, and even before the dodgy 1 Jan 2016 date.
> 
> http://googleonlinesecurity.blogspot.com/2014/09/gradually-sunsetting-sha-1.html
> 
> SHA-1 signature algorithms are not per se bad right now; what's bad is
> certificate chains using SHA-1 that will/would be valid too far in the
> future. Between now and 1 Jan 2016, and between then and 1 Jan 2017,
> there is plenty of time to get a new certificate, signed with a
> SHA-256-based signature function.

It's debatable if the 2016 date is good. NIST doesn't agree....

but yes, as far as Internet certs go, mozilla one is not so bad

-- 
Regards,
Hubert Kario
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to