On 22/6/09 22:23, Kyle Hamilton wrote:
Is there an updated request in the queue for O=ABC.ECOM, INC?  That
one expires 7/9/2009, which is less than a month from now.


Good question.


Are we going to enforce a 2048-bit root requirement after Dec 31, 2010
(per NIST non-classified recommendation)?  If so, we need to get the
Digital Signature Trust Co Global CAs to update.


I would vote against following NIST on this. But it would be a reasonable thing to send a message to the appropriate CAs and ask them to consider upgrading.


The DSTCA X1 and DSTCA X2 CAs (page 3, bottom) have already expired in
2008.  Are they going to be removed?


If there is no semantic difference, I guess they should be?


We've already had discussion why MD5 on the root isn't worrisome or
bothersome.  I'm assuming that there are no attributes of the
certificate which contains the trust anchor which are actually
checked, and that the trust-bits are effectively set on the key
included in the certificate itself?


The annoying thing is that with MD5 in the cert, NSS can't "get rid of MD5". But, maybe that isn't an issue anyway.

iang
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to