Frank, Nelson, just in case it's useful...
I recall that GlobalSign recently refreshed their "GlobalSign Root CA":
https://bugzilla.mozilla.org/show_bug.cgi?id=406794

When the new GlobalSign Root CA certificate (which expires in 2028) was added 
to NSS, the old certificate (which expires in 2014) was *removed*:
https://bug449883.bugzilla.mozilla.org/attachment.cgi?id=333011

I presume that GlobalSign have not encountered any problems following the 
removal of their old certificate from NSS.

On Friday 22 May 2009 15:24:47 Frank Hecker wrote:
> Nelson Bolyard wrote:
> > On 2009-05-20 13:58, Kathleen Wilson wrote:
> >> When processing a cert chain, does Mozilla use a specified algorithm/
> >> order for determining which root to use when there are two roots
> >> included that are identical except for signature algorithm and serial
> >> number?
> >
> > The algorithm for choosing from among multiple certs with the same
> > subject name and key ID generally involves picking the "newest" one.
> > When multiple certs have the same exact notBefore and notAfter dates,
> > the order is determined by the certs' relative positions in the cert
> > cache, which is effectively unpredictable.  So, for purposes of this
> > discussion, the short answer to your question is: no.
>
> So, just to clarify: I *think* you're proposing that we do the following
> in cases where CAs issue new root certificates with stronger signature
> algorithms (e.g., upgrading MD2 or MD5 roots to use SHA-1):
>
> 1. We should keep the old root certificates in the root list, at least
> for now. Rationale: It does no harm to keep the old roots, since we do
> not check signatures on roots, and it may prevent possible errors when
> Firefox, Thunderbird, etc., receive a full cert chain that includes the
> old root.
>
> 2. We should encourage CAs to issue the new replacement roots with
> notBefore and notAfter dates that are later than the corresponding dates
> for the old roots. Rationale: This ensures that NSS will
> deterministically select the newer root in cases where there is a choice
> to be made. (Does this include the case when Firefox, etc., receive a
> full cert chain that includes the old root?)
>
> Is the above a correct reading of your comments?
>
> Frank
>
> --
> Frank Hecker
> hec...@mozillafoundation.org



-- 
Rob Stradling
Senior Research & Development Scientist
Comodo - Creating Trust Online
Office Tel: +44.(0)1274.730505
Fax Europe: +44.(0)1274.730909
www.comodo.com

Comodo CA Limited, Registered in England No. 04058690
Registered Office:
  3rd Floor, 26 Office Village, Exchange Quay,
  Trafford Road, Salford, Manchester M5 3EQ

This e-mail and any files transmitted with it are confidential and intended
solely for the use of the individual or entity to whom they are addressed.
If you have received this email in error please notify the sender by replying
to the e-mail containing this attachment. Replies to this email may be
monitored by Comodo for operational or business reasons. Whilst every
endeavour is taken to ensure that e-mails are free from viruses, no liability
can be accepted and the recipient is requested to use their own virus checking
software.
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to