I think you may have buried the lede a little bit here, Rick :-)

The questions are:

* Does NSS correctly handle the case where a SHA-1 root signs a SHA-2
  CRL or OCSP response?

* Which version of Firefox first supported SHA-2?

I believe the answer to the first question is Yes; NSS doesn't care what
the signature algorithm used on the root is. Ever.

The answer to the second question is: in NSS before April 2003.
https://bugzilla.mozilla.org/show_bug.cgi?id=167605
http://www-archive.mozilla.org/projects/security/pki/nss/nss-3.8/nss-3.8-release-notes.html
Firefox 1.0 was released 10 years ago on Sunday, on 9th November 2004.
So it almost certainly had SHA-256 support.

Although I'm not sure how this bug plays in; perhaps Brian or someone
else can say:
https://bugzilla.mozilla.org/show_bug.cgi?id=663315

Gerv
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to