Re: Roots that are identical except for signature algorithm and serial number

2009-06-04 Thread Rick Andrews
> How about the subject key ID?  Did it change? No, it didn't. The key and SKI stayed the same. ... > New Mozilla browsers released after this date do not and will not have the > problem you described above.  So, it should not be necessary to retain the > MD2 certs in the root list for these new

Re: Roots that are identical except for signature algorithm and serial number

2009-06-04 Thread Rick Andrews
> How about the subject key ID?  Did it change? No, it didn't. The key and SKI stayed the same. ... > New Mozilla browsers released after this date do not and will not have the > problem you described above.  So, it should not be necessary to retain the > MD2 certs in the root list for these new

Re: Roots that are identical except for signature algorithm and serial number

2009-06-04 Thread Rick Andrews
> How about the subject key ID?  Did it change? No, it didn't. The key and SKI stayed the same. ... > New Mozilla browsers released after this date do not and will not have the > problem you described above.  So, it should not be necessary to retain the > MD2 certs in the root list for these new

Re: Roots that are identical except for signature algorithm and serial number

2009-05-29 Thread Nelson B Bolyard
On 2009-05-29 09:22 PDT, Rick Andrews wrote: > On May 28, 3:12 pm, Nelson B Bolyard wrote: >> On 2009-05-28 10:52 PDT, Kathleen Wilson wrote: >> >>> Just to make sure I understand… >>> In the VeriSign case the MD2 roots expire on 2028-08-01, and the SHA1 >>> roots expire on 2028-08-02, so the SHA1

Re: Roots that are identical except for signature algorithm and serial number

2009-05-29 Thread Rick Andrews
On May 28, 3:12 pm, Nelson B Bolyard wrote: > On 2009-05-28 10:52 PDT, Kathleen Wilson wrote: > > > Just to make sure I understand… > > > In the VeriSign case the MD2 roots expire on 2028-08-01, and the SHA1 > > roots expire on 2028-08-02, so the SHA1 roots would take precedence in > > NSS.  There

Re: Roots that are identical except for signature algorithm and serial number

2009-05-29 Thread Nelson B Bolyard
On 2009-05-28 13:09 PDT, Frank Hecker wrote: > Nelson B Bolyard wrote: >> An SSL server that sends out a full chain with a SHA256 root could >> conceivably cause a problem for a remote SSL client that does not understand >> SHA256 signatures and that chooses to check the signature on the received >

Re: Roots that are identical except for signature algorithm and serial number

2009-05-28 Thread Robert Relyea
Frank Hecker wrote: Nelson B Bolyard wrote: However, Izenpe may want to consider only including the SHA1 root because many of their customers may be using operating systems that don’t yet support SHA256. I think that covers all the considerations that would go into a decision of whether to in

Re: Roots that are identical except for signature algorithm and serial number

2009-05-28 Thread Frank Hecker
Nelson B Bolyard wrote: However, Izenpe may want to consider only including the SHA1 root because many of their customers may be using operating systems that don’t yet support SHA256. I think that covers all the considerations that would go into a decision of whether to include only a SHA1-bas

Re: Roots that are identical except for signature algorithm and serial number

2009-05-28 Thread Frank Hecker
Nelson B Bolyard wrote: An SSL server that sends out a full chain with a SHA256 root could conceivably cause a problem for a remote SSL client that does not understand SHA256 signatures and that chooses to check the signature on the received root cert rather than, or in addition to, relying on it

Re: Roots that are identical except for signature algorithm and serial number

2009-05-28 Thread Nelson B Bolyard
On 2009-05-28 10:52 PDT, Kathleen Wilson wrote: > Just to make sure I understand… > > In the VeriSign case the MD2 roots expire on 2028-08-01, and the SHA1 > roots expire on 2028-08-02, so the SHA1 roots would take precedence in > NSS. Therefore, there is no benefit in keeping the MD2 roots, and

Re: Roots that are identical except for signature algorithm and serial number

2009-05-28 Thread Kathleen Wilson
Just to make sure I understand… In the VeriSign case the MD2 roots expire on 2028-08-01, and the SHA1 roots expire on 2028-08-02, so the SHA1 roots would take precedence in NSS. Therefore, there is no benefit in keeping the MD2 roots, and the MD2 roots should be removed when the SHA1 roots are ad

Re: Roots that are identical except for signature algorithm and serial number

2009-05-28 Thread Frank Hecker
Nelson B Bolyard wrote re retaining copies of old roots after their replacement by new roots: I recommend that for CAs whose newer root certs bear exactly the same notBefore and notAfter dates as the older certs. In that case, it may be necessary to retain all the relevant root certs, all marked

Re: Roots that are identical except for signature algorithm and serial number

2009-05-27 Thread Nelson B Bolyard
Rob Stradling wrote, On 2009-05-27 01:35: > Frank, Nelson, just in case it's useful... > I recall that GlobalSign recently refreshed their "GlobalSign Root CA": > https://bugzilla.mozilla.org/show_bug.cgi?id=406794 > > When the new GlobalSign Root CA certificate (which expires in 2028) was added

Re: Roots that are identical except for signature algorithm and serial number

2009-05-27 Thread Nelson B Bolyard
(Sorry for the apparent tardiness of this reply. I wrote it the day that I read Frank's message, and thought I sent it, but evidently did not send it until today.) Frank Hecker wrote, On 2009-05-22 07:24 PDT: > So, just to clarify: I *think* you're proposing that we do the following > in cases w

Re: Roots that are identical except for signature algorithm and serial number

2009-05-27 Thread Rob Stradling
Frank, Nelson, just in case it's useful... I recall that GlobalSign recently refreshed their "GlobalSign Root CA": https://bugzilla.mozilla.org/show_bug.cgi?id=406794 When the new GlobalSign Root CA certificate (which expires in 2028) was added to NSS, the old certificate (which expires in 2014)

Re: Roots that are identical except for signature algorithm and serial number

2009-05-22 Thread Frank Hecker
Nelson Bolyard wrote: On 2009-05-20 13:58, Kathleen Wilson wrote: When processing a cert chain, does Mozilla use a specified algorithm/ order for determining which root to use when there are two roots included that are identical except for signature algorithm and serial number? The algorithm f

Re: Roots that are identical except for signature algorithm and serial number

2009-05-21 Thread Nelson Bolyard
Eddy Nigg wrote, On 2009-05-21 15:15: > On 05/21/2009 03:46 AM, Nelson Bolyard: >>> Also related, in bug #490895 VeriSign has requested inclusion of the >>> SHA-1 version of their roots to replace the corresponding old MD5 >>> version of their roots. At the time of inclusion of the SHA-1 version >>

Re: Roots that are identical except for signature algorithm and serial number

2009-05-21 Thread Eddy Nigg
On 05/21/2009 03:46 AM, Nelson Bolyard: Also related, in bug #490895 VeriSign has requested inclusion of the SHA-1 version of their roots to replace the corresponding old MD5 version of their roots. At the time of inclusion of the SHA-1 version of the roots, is there any reason to keep the old

Re: Roots that are identical except for signature algorithm and serial number

2009-05-20 Thread Nelson Bolyard
On 2009-05-20 13:58, Kathleen Wilson wrote: When processing a cert chain, does Mozilla use a specified algorithm/ order for determining which root to use when there are two roots included that are identical except for signature algorithm and serial number? The algorithm for choosing from among

Re: Roots that are identical except for signature algorithm and serial number

2009-05-20 Thread Arshad Noor
Certificate-chain validation, primarily, works based on the Subject Key Identifier and the Authority Key Identifier extensions. When validation code is presented with multiple certificates that have the same AKIs in the chain, a good programmer will attempt to use the stronger certificate if it c