Primary eng (and PM) emails
Summary
The use of SHA-1 within TLS certificates is no longer sufficiently secure. This is an intent to phase them out (in 2-3 years). In order to make such a phase-out execute smoothly, rather than be an Internet flag day, we will be degrading the experience when these certificates are used in the wild.
The following changes to Chromium's handling of SHA-1 are proposed:
- All SHA-1-using certificates that are valid AFTER 2017/1/1 are treated insecure, but without an interstitial. That is, they will receive a degraded UI indicator, but users will NOT be directed to click through an error page.
- Additionally, the mixed content blocker will be taught to treat these as mixed content, which WILL require a user action to interact with.
- All SHA-1-using certificates that are valid AFTER 2016/1/1 are treated as insecure, but without an interstitial. They will receive a degraded UI indicator, but will NOT be treated as mixed content.
Motivation
We need to execute the SHA-1 transition smoother than MD5.
MD5 was first shown weak in 1995 and was no longer recommended for new usages.
In 2004, it was near conclusively broken for most purposes, by showing it was not collision resistant.
In 2008, researchers were able to obtain a usable fraudulent certificate through MD5 manipulation from a CA.
Yet Chrome was not able to remove it until December 2011, due to it's widespread use on the Internet, and having to lead the way as one of the first browsers to do so (iOS mobile deprecated MD5 slightly earlier).
In doing so, Chrome users, particularly in enterprise scenarios, were surprised when a variety of so-called security products failed to work, often due to the security products insecure settings.
The lesson from this is that as long as it is supported, Certificate Authorities and software vendors will continue to use SHA-1. Discussions within the CA/Browser Forum have established that CAs do not view SHA-1 as a significant enough risk to begin active deprecation, in part, because any one CA that refuses to issue SHA-1 certificates is just giving customers to any other CA that will.
Despite the CA/Browser Forum's Baseline Requirements, published in 2011, recommending that SHA-1 only be used until the majority of browsers support SHA-256 (with Windows XP earlier than SP2 not supporting SHA-256 being the primary concern), CAs have still not transitioned.
Microsoft has been the first to announce hard dates - with CAs in their root program no longer being able to issue SHA-1 following 2016/1/1, and with Microsoft planning to disable SHA-1 in 2017/1/1. However, Microsoft has left enough room for alteration that CAs are not taking this plan seriously, and thus not beginning to transition away.
Without action, there is great risk that CAs will continue to issue SHA-1 certificates up until 2015/12/31, the maximum lifetime of which can be 39 months, meaning these certificates will be valid until 2019. However, before 2015/4/1, CA's may issue up to 60 months - meaning valid until 2021.
Using SHA-1 in 2020 is unacceptable. Using SHA-1 in 2015 is not desirable.
By degrading the UI, we wish to provide negative reinforcement that SHA-1 is no longer secure enough, and positive encouragement for CA's that adopt modern algorithms.
Compatibility Risk
Chromium will be the first browser to make this transition, and thus will bear the brunt of compatibility issues. However, this is precisely to avoid having significant portions of the Internet break in 2017 if CAs continue (and, based on evidence, are accelerating) the currently insecure practice.
CAs have been aware of this desire by the Chromium networking and security teams to deprecate since February 2014, and have had half a year to prepare their infrastructure and issuance pipelines. This followed Microsoft's announcement in November of 2013.
Alternative implementation suggestion for web developers
Site operators that are affected by this have several options:
Each of these "transition" options SHOULD, if using a respected CA, generally be a free option available to their users. Many CAs will offer users both SHA-1 and SHA-256 certificates (simultaneously), to allow the customer to transition and experiment with transitioning as necessary.
The largest risk is for users who are using certificates that have other undesirable security properties, such as unvalidated information or weaker keys (RSA keys less than 2048 bits). Because CAs MUST ensure that all new certificates conform to the Baseline Requirements, customers who purchased certificates before 2012 that were valid for extended period of times (e.g. up until 2022, as some CAs sold 10 year certs) will find they will need to be issued a new certificate, which may require additional and necessary security checks, and it will not be able to exceed the 60 month maximum validity.
Usage information from UseCounter
Based on the Certificate Transparency logs operated by Google, which records all certificates Google has seen or has had submitted to it (e.g. it includes certificates that have been revoked or discontinued, in addition to active certificates), this means the following:
SHA-1 and valid longer than 2016/1/1 - Approximately 14% of all certificates seen between 2012 and 2014 (previously, from 2012 - 2013, this was only 9.6% )
SHA-1 and valid longer than 2017/1/1 - Approximately 6.2% of all certificates seen between 2012 and 2014 (previously, from 2012 - 2013, this was only 4.13% )
Approximately 17 CAs (actual organizations, counting for acquisitions, is about 12) are responsible for 92% of the 2016 certs.
Approximately 11 CAs (closer to 7 actual organizations) are responsible for 92% of the 2017 certs.
Entry on chromestatus.com, crbug.com, or MDN
https://code.google.com/p/chromium/issues/detail?id=401365
Requesting approval to remove too?
No
Barring cryptographic advances, the plan will be to synchronize with Microsoft, and hopefully other user agents, in fully removing this in 2017. This deprecation is in alignment with those goals, with the hope that SHA-1 will be virtually unused in certificates by 2016, ensuring a smooth removal.
--
You received this message because you are subscribed to the Google Groups "net-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to net-dev+u...@chromium.org.
To post to this group, send email to net...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/net-dev/CACvaWvY69QubTnWTan62QkJjW%3D5gGbixHB9Cp8GGbq_RoMv1Og%40mail.gmail.com.
No one has responded, so I'm just chiming in to say that this sounds awesome to me. Carry on.
Hi Ryan, some input.
There are 3 SHA-1 attacks that need to be considered: collision, second-preimage and preimage. SHA-1 is weak when considering a collision attack, but is not considered weak for either preimage attacks.
A collision attack can happen at the time of certificate issuance. The policy to stop issuing SHA-1 signed certificates as of January 1, 2016 mitigates the collision attack. At that time the maximum validity period will be 39 months, so all SHA-1 signed certificates will have expired by April 1, 2019.
Since collision will be mitigated, then the next attack we need to consider is second-preimage. It is unlikely that SHA-1 will be susceptible for a second-preimage attack before April 1, 2019. As such, I do not see any value in providing a degraded UI indicator.
Also, since Microsoft has stated that Windows will not support SHA-1 as of January 1, 2017; it is likely that most users will have switched to SHA-2 by then.
Please note that Microsoft might change this date based on its evaluation of preimage. I would suggest that it would be of little value extending the date out past April 1, 2019 as most of the SHA-1 certificates will be expired by then.
Thanks, Bruce.
To unsubscribe from this group and stop receiving emails from it, send an email to security-dev...@chromium.org.
For those of us who are not involved with this, is there anywhere but bug reports where the policy/plans for certificate hashes are laid out, apart from this email?
In particular, It appears that this change would mean SHA-256 will remain the only valid hash algorithm for signatures. Is that correct?
(As far as I understand, the main known qualitative flaw of SHA-256 is that it is still subject to an extension attack. That's not directly applicable to certificate collisions, but still not desirable, I imagine.)
Are there current plans to support and/or encourage SHA-3 after it is "finalized"?
Bruce,
These certificates will stop working after 2017. The browser absolutely can and should provide warnings.
As I am sure you are well aware, nothing in the CA/Browser Forum's requirements require that a CA place the issuance date in the notBefore. While this is expected by common sense, we regularly see CAs fudge this number - for both legitimate (easing interoperability with machines with slightly-off clocks) and illegitimate (to avoid additional checks imposed by browsers) means.
I think where your idea is flawed is that it assumes the UA can reasonably and reliably detect 'when' a certificate is issued. This is not and has never been the case - for certificates that conform to the Baseline Requirements or for certificates issued by internal CAs and security software.
As shown by MD5, the ONLY way to get software and CAs to transition away from issuing SHA-1 certs is to actually disable it. This notice phase serves as a way of informing users and site operators of coming changes - changes 2-3 years away, and changes not just being made by Chromium, but other UAs as well.
On Aug 22, 2014 9:55 AM, <b...@digicert.com> wrote:
>
> If the downgraded UI is the https with the red slash through it, doesn't that go too far in providing a warning? In other words, if I saw it, I would think that there was something more severely wrong with the website's SSL certificate or the encryption behind it, etc.
That's not the case for most users, but it sounds like you're agreeing that its bad, just disagreeing on the UX.
Chromium has a UI for 'origins that attempt to be secure (HTTPS) but are not secure'. Its a red lock with strike through. This is a UX issue for Chromium.
> So far, SHA1 has not been broken, at least publicly.
There are graduations of broken. It's not binary.
What we do see is that SHA-1 is showing the same set of weaknesses at MD5, and multiple rounds of weakening that allow an attacker to create colliding blocks.
It's not YET as computationally easy as MD5, at least from the public research, but that's irrelevant with respect to whether we need to transition. This is especially true based on the fact that the Flame malware (2012), which also exploited MD5 collisions, used methods that were entirely unknown to the public as being weak.
> My understanding is that we're just trying to accelerate migration away from SHA1. So I would think a less severe UI downgrade would be better than the red slash.
> Thanks,
> Ben Wilson
>
Given how easy it is for sites and CAs to mitigate this issue with zero compatibility issues, I think this is unnecessary.
The fundamental question is whether we (Chromium) view SHA-1 as secure enough to be worthy of a secure indicator.
That answer from everyone involved on the Chromium side is no, although its clear for some CAs on this thread they think the answer should be 'yes'. This is not surprising, as its the cause of the impasse in the CA/Browser Forum.
We had hoped to see this practice stop in 2012, as the Baseline Requirements so strongly encouraged, so it's not that we have not made repeated attempts to work with CAs on timelines.
The evaluation is described in the linked bug.
Only the leaf certificates notAfter is considered (and independent of leaf signature algorithm), but if it matches the criteria, then all the validated signatures in the chain (i.e. excluding the root) are considered.
No new intermediates are required, unless you are issuing long-lived SHA-256 certs that chain to a SHA-1 intermediate.
Is there a web page where someone can take a look at all of Chrome's address-bar security-related traffic signs (i.e. small image files)?
Thanks,
Ben
--
You received this message because you are subscribed to the Google Groups "net-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to net-dev+u...@chromium.org.
To post to this group, send email to net...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/net-dev/c73f30b1-2c3e-4e85-9a81-5a90026b4c5e%40chromium.org.
Nick,
We've been communicating this to CAs for some time. I'm sorry that GlobalSign hasn't been passing that on.
As mentioned, if you set your expiration for these CloudFlare hosted certs to be 2015/12/31, you will receive no warnings.
After 2016/1/1, no CA is allowed to issue SHA-1 certificates. As such, all sites SHOULD be prepared to switch (e.g. for emergency purposes such as Heartbleed or CA compromise).
That still gives you more than a year to test and help migrate.
I do take issue with the definition of 'a large percentage'. Evidence suggests this is a quite small percent (<= 1%), and large sites have already transitioned (Twitter) or are in the process of transitioning.
Sure.
This was discussed for around an hour/hour and a half during the CA/Browser Forum's February 2014 meeting, hosted by Google in Mountain View.
The minutes are available at cabforum.org and were sent to the CA/B Forum's place.
Given that all CAs are expected to adhere to the Baseline Requirements, which are developed in the CA/B Forum, it is reasonably expected that CAs are following the discussion, even when they are not directly contributing.
Those links don't show disclosure of a new 2016 deadline. In fact, they support the CA's understanding of Jan 1 2017 as the deprecation date:
"Chrome's plan continues to remain aggressive - disallowing certain algorithms/key sizes if their issuance date is after their sunset-grace period, outright rejecting them if their validity period exceeds the sunset-fail period, and eventually outright removing support entirely. As such, a CA that (continues) to issue such certs would not (ultimately) be causing outright risk to *current* versions of Chrome users"
[JR] The sunset-fail period is 2017, not 2016.
On Tue, Aug 19, 2014 at 9:52 PM, Ryan Sleevi <rsl...@chromium.org> wrote:[snip]
> The following changes to Chromium's handling of SHA-1 are proposed:
I think this is a very cool proposal.
It seems like the proposal only deals with SHA-1 signatures used in
certificates' signatures, but it doesn't say anything about SHA-1 use
in the signatures of the TLS ServerKeyExchange message. It may be
useful to say what, if anything, you are planning to do change
regarding SHA-1- or SHA-1+MD5- signed ServerKeyExchange messages, and
on what timeline.
Similarly, it would be interesting to here your
plans, if any, regarding changing the values delivered in the TLS
signature_algorithms extension to advertise that SHA-1 is no longer
supported. Note, in particular, that SHA-1(+MD5) signatures MUST be
used in TLS 1.1 and earlier, so potentially there could be
version-specific policies regarding this. And, also note that even TLS
1.2 (weakly) encourages SHA-1 to be used for signatures when the
server certificate's keypair is a DSA keypair.
Yeah, luckily the number of (valid) DSA certificates is extremely low. If I recall the data from 2013 correctly, it was on the order of 'several hundred', although this could easily be confirmed by the CT logs.
Ryan,
We all agree with firm dates for deprecating SHA-1 and moving to SHA-2, but the logic and dates Google has specified give web site operators little time to react.
On Thursday, August 21, 2014 5:09:13 PM UTC-4, Ryan Sleevi wrote:
This UI policy has the effect of encouraging site operators and CAs to work towards a migration sooner (by 2016/1/1), rather than waiting until the last possible second (2017/1/1). For those that do choose to wait until the last possible second, they're at least consciously aware that they're doing so, and prepared for the 2017/1/1 shutdown date.
The net-effective of this deprecation policy is:Site operators MUST *be prepared and aware* of the need to transition to SHA-256 by 2017/1/1
Site operators SHOULD *be prepared and aware* of the need to transition to SHA-256 by 2016/1/1. This is important, because in the event of a need to reissue a certificate (e.g. for another Heartbleed-like event, as hopefully unlikely as that may be), that is the ONLY type of the certificate they can legitimately acquire.
Our end goal with this is to ensure that no user's browsing experience is disrupted in 2016 or 2017, because the Internet will have transitioned away.
On Aug 25, 2014 7:03 AM, "Doug Beattie" <douglas...@gmail.com> wrote:
>
> Ryan,
>
> We all agree with firm dates for deprecating SHA-1 and moving to SHA-2, but the logic and dates Google has specified give web site operators little time to react.
>
Doug,
It seems extremely misleading to suggest 9 months is insufficient time.
Let's be clear: we both know that there are CAs that actively campaigned for 2017 as unrealistic, and instead have (and in some cases, continue to) argue for 2020 or later.
This is such a common occurrence that it continues to delay or prevent any meaningful improvements to online security.
Regarding proposals for examining notBefore as an issuance date - as you know, this fails to meaningfully address any of the security concerns. We have discussed in the CA/Browser Forum why it doesn't work, and it's been discussed above why it doesn't work - in particular, CAs are not required to be honest in them, and in the vast majority of cases, are not honest in them. Using information like this for security decisions fails to consider that reality.
While I appreciate your alternative proposal, for reasons that were explained six months ago, and reasons explained earlier on this thread, that timeline doesn't align with the goal, and just serves to kick this exact same conversation of "not enough time / not enough warning" down the road.
What I haven't seen is any dispute to the following:
- By 2016/1/1, CAs may no longer issue SHA-1 certificates. Sites which rely on these certificates (e.g. for XP SP2) WILL NOT be able to obtain any new certificates, WILL NOT be able to respond to security incidents, and WILL NOT be able to make any changes or correct any information.
- By 2017/1/1, these sites WILL NOT work.
If we did as you'd propose, the 2016 users will have zero warning, and the 2017 users will have less than a year, and we would be having this exact same conversation about not enough time and proposing delays. What's worse, it would have the exact effect we are trying to avoid, of having 2017 be a flag day.
To be clear, in 2017/1/1, these certificates will not work. It is not a degraded UI (as you proposed), but an indistinguishable from untrusted certificate. This is significant enough to merit advance communication - which this deprecation notice is.
I don't mean this as a hypothetical - we very much saw this play out for 5 years with MD5, as CAs continued to suggest SHA-1 wasn't needed, and mitigations like entropy in the serial was sufficient.
In this proposal, no penalties are being taken against the CA. No CA is being found in violation of our root or EV policies, and no CA is risking removal wholesale. This is merely a UI update, one which doesn't require user action, that reflects the security views and best practices, which, again, CAs agreed upon and recognized this view as far back as 2011.
This is fundamentally no different than Chrome using UI to communicate other insecure CA practices that, despite every effort, continue to be used well beyond when it is safe. For example, the insecure inclusion of unverifiable domain names (also called internal server names), which has caused significant risk to the CA's users - and the Internet at large - as ICANN delegates new TLDs. Indeed, many of these same discussions were had, and worse, the timelines continually attempted to be pushed back or altogether dismissed.
It is important that Chrome, for which security has been a foundational pillar of the design, accurately and honestly reflect the security status of the page. The exact details are generally left to our security and UX teams, which have seen this as a reasonable balance between requiring the user to take direct action (via a security interstitial) and the misleading and downright status quo - of doing nothing.
On Aug 25, 2014 7:03 AM, "Doug Beattie" <douglas...@gmail.com> wrote:
>
> Ryan,
>
> We all agree with firm dates for deprecating SHA-1 and moving to SHA-2, but the logic and dates Google has specified give web site operators little time to react.
>Doug,
It seems extremely misleading to suggest 9 months is insufficient time.
Let's be clear: we both know that there are CAs that actively campaigned for 2017 as unrealistic, and instead have (and in some cases, continue to) argue for 2020 or later.
This is such a common occurrence that it continues to delay or prevent any meaningful improvements to online security.
Regarding proposals for examining notBefore as an issuance date - as you know, this fails to meaningfully address any of the security concerns. We have discussed in the CA/Browser Forum why it doesn't work, and it's been discussed above why it doesn't work - in particular, CAs are not required to be honest in them, and in the vast majority of cases, are not honest in them. Using information like this for security decisions fails to consider that reality.
While I appreciate your alternative proposal, for reasons that were explained six months ago, and reasons explained earlier on this thread, that timeline doesn't align with the goal, and just serves to kick this exact same conversation of "not enough time / not enough warning" down the road.
What I haven't seen is any dispute to the following:
- By 2016/1/1, CAs may no longer issue SHA-1 certificates. Sites which rely on these certificates (e.g. for XP SP2) WILL NOT be able to obtain any new certificates, WILL NOT be able to respond to security incidents, and WILL NOT be able to make any changes or correct any information.
- By 2017/1/1, these sites WILL NOT work.
If we did as you'd propose, the 2016 users will have zero warning, and the 2017 users will have less than a year, and we would be having this exact same conversation about not enough time and proposing delays. What's worse, it would have the exact effect we are trying to avoid, of having 2017 be a flag day.
To be clear, in 2017/1/1, these certificates will not work. It is not a degraded UI (as you proposed), but an indistinguishable from untrusted certificate. This is significant enough to merit advance communication - which this deprecation notice is.
I don't mean this as a hypothetical - we very much saw this play out for 5 years with MD5, as CAs continued to suggest SHA-1 wasn't needed, and mitigations like entropy in the serial was sufficient.
In this proposal, no penalties are being taken against the CA. No CA is being found in violation of our root or EV policies, and no CA is risking removal wholesale. This is merely a UI update, one which doesn't require user action, that reflects the security views and best practices, which, again, CAs agreed upon and recognized this view as far back as 2011.
This is fundamentally no different than Chrome using UI to communicate other insecure CA practices that, despite every effort, continue to be used well beyond when it is safe. For example, the insecure inclusion of unverifiable domain names (also called internal server names), which has caused significant risk to the CA's users - and the Internet at large - as ICANN delegates new TLDs. Indeed, many of these same discussions were had, and worse, the timelines continually attempted to be pushed back or altogether dismissed.
It is important that Chrome, for which security has been a foundational pillar of the design, accurately and honestly reflect the security status of the page. The exact details are generally left to our security and UX teams, which have seen this as a reasonable balance between requiring the user to take direct action (via a security interstitial) and the misleading and downright status quo - of doing nothing.
On Aug 25, 2014 8:42 AM, "Doug Beattie" <douglas...@gmail.com> wrote:
>
> Ryan,
>
> I'm not sure where the 9 month date is coming from, my read is that in 12 weeks users will be impacted with a new UI raising some concern about the trust or security of their connection.
CAs were told about this 6 months ago.
> They've been tortured enough recently. I don't see any milestones in 9 months. While mixed content pages have serious security issues, it's not obvious to me why commercial CA SHA-1 certificates fall into this category (and, by the way, Google issued SHA-1 certificates do not). ALL SHA-1 certificates should be treated the same regardless of when they expire. Creating a loop-hole for Google issued SSL seems sneaky - even though you are publically disclosing the rules.
>
I think its best to let the original message, which laid out precisely what the motivations are, show how this statement is neither productive nor accurate.
> More responses below.
>
> On Monday, August 25, 2014 10:38:55 AM UTC-4, Ryan Sleevi wrote:
>>
>>
>> On Aug 25, 2014 7:03 AM, "Doug Beattie" <douglas...@gmail.com> wrote:
>> >
>> > Ryan,
>> >
>> > We all agree with firm dates for deprecating SHA-1 and moving to SHA-2, but the logic and dates Google has specified give web site operators little time to react.
>> >
>>
>> Doug,
>>
>> It seems extremely misleading to suggest 9 months is insufficient time.
>>
>> Let's be clear: we both know that there are CAs that actively campaigned for 2017 as unrealistic, and instead have (and in some cases, continue to) argue for 2020 or later.
>
> Microsoft specified 1/1/2017 as a critical date and I believe we're all working towards that date - CAs, Web site operators, browsers and OS vendors. I'm not aware of anyone asking for 2020 or later and agree with you that 2017 is a solid date.
You can find both in the minutes and then the Forum archives proposals to effect of what you've suggest here - that is, if any cert is valid on 2015/12/31 with SHA-1, that it be allowed to 'live out' its maximally issued life (of 39 months, or 60 months if issued before 2015/4/1)
>
>> This is such a common occurrence that it continues to delay or prevent any meaningful improvements to online security.
>>
>> Regarding proposals for examining notBefore as an issuance date - as you know, this fails to meaningfully address any of the security concerns. We have discussed in the CA/Browser Forum why it doesn't work, and it's been discussed above why it doesn't work - in particular, CAs are not required to be honest in them, and in the vast majority of cases, are not honest in them. Using information like this for security decisions fails to consider that reality.
>>
>> While I appreciate your alternative proposal, for reasons that were explained six months ago, and reasons explained earlier on this thread, that timeline doesn't align with the goal, and just serves to kick this exact same conversation of "not enough time / not enough warning" down the road.
>
> We have been working to the 1/1/2017 date and I don't advocate kicking that down the road. But, your proposal just kicked the can "up the road" over 2 years. If this had been proposed last year then there would have been more time to align issuance updates with these new requirements, but with only 12 weeks until the untrusted UI goes into affect there is very little time for the industry to react.
This was proposed and discussed 6 months ago, in a meeting you were recorded as present in ( https://cabforum.org/2014/02/19/2014-02-19-minutes-of-mountain-view-f2f/ ) and noted as participating in. I think it is worth noting the participation recorded was opposition towards requirements that would have had CAs communicating this sunset to their users, by forcing their expiration date be meaningfully set, rather than require UAs to do so.
> Web site operators have established certain processes to obtain and install certificates which are difficult to change. Those that cannot change stand to loose customers and money. As a CA, we're ready to issue replacement certificates, but not all customers are prepared to swap over to SHA-2.
And, as you read from my original message (and Brian Smith's excellent followup), your customers are not being required to immediately swap to SHA-256.
>
>> What I haven't seen is any dispute to the following:
>> - By 2016/1/1, CAs may no longer issue SHA-1 certificates. Sites which rely on these certificates (e.g. for XP SP2) WILL NOT be able to obtain any new certificates, WILL NOT be able to respond to security incidents, and WILL NOT be able to make any changes or correct any information.
>
> If this is the MS set of requirements, I read "MAY" as optional (vs Shall or Must). There will be reasons to replace (issue) SHA-1 certificates during the last year of their support, but I expect most, or all, CAs will have removed SHA-1 ordering of new certificates before 2016.
The Microsoft language includes no such provision, nor has it.
http://blogs.technet.com/b/pki/archive/2013/11/12/sha1-deprecation-policy.aspx
"CAs must stop issuing new SHA1 SSL and Code Signing end-entity certificates by 1 January 2016."
Note the must.
>
>> - By 2017/1/1, these sites WILL NOT work.
>
> This is the date we've all been working towards, agree. SSL certificates that are issued under publically trusted roots will not work. Having a set of UI changes leading up to this is also highly desirable, I just disagree with starting this over 2 years ahead of time with rather confusing UI experience about the trustworthiness of the site.
>
And the Mozilla Root Program shows that 2 years is often insufficient time for CAs to be relied upon communicate with their users. Mozilla has been attempting to remove 1024-bit certs for FIVE YEARS now. If you read through https://bugzilla.mozilla.org/show_bug.cgi?id=881553 and related, you will see that there is, for a variety of CAs, a long tail of consumers they cannot reach, and for who the CA's inability (or, in some cases, unwillingness) to communicate with leaves a large majority of Internet users at risk.
>> If we did as you'd propose, the 2016 users will have zero warning, and the 2017 users will have less than a year, and we would be having this exact same conversation about not enough time and proposing delays. What's worse, it would have the exact effect we are trying to avoid, of having 2017 be a flag day.
>
> Perhaps you misread my suggestions. I recommend that the "untrusted UI" updates could be applied one year after you're current plan and only react to those certificates that were issued on or after 1/1/2016 (assuming there are no new advanced in the preimage attacks). Then, in mid-2016 you implement your checks you had scheduled for 1/1/2016 (5 months delay). I don't think this is an unreasonable request.
I hope the above discussion will highlight how it is.
As you have again confused the dates, there will NOT be any new certificates issued with SHA-1 after 2016/1/1. These will be hard errors AND a violation of the respective root policies, which may lead to action to protect the user from such CAs as a whole. I want to make sure this is unambiguous here, though its been repeated several times.
As you well know, this would encourage and permit SHA-1 certificates, issued at 39 months validity, being issued up until 2016/12/31. That would leave such users 5 months to transition. The discussion we are having right now is that three months isn't enough to transition (during a period where this transition can functionally last over a year), but you're proposing a five month transition with absolutely no ability to extend.
I'm sure and hope you can see the risk your proposal would leave users at, and the harm it would cause.
On Fri, Aug 22, 2014 at 8:43 PM, Ryan Sleevi <rsl...@chromium.org> wrote:
> On Fri, Aug 22, 2014 at 8:23 PM, Brian Smith <br...@briansmith.org> wrote:
>> It seems like the proposal only deals with SHA-1 signatures used inUnderstood. My understanding is that, at least one point in time,
>> certificates' signatures, but it doesn't say anything about SHA-1 use
>> in the signatures of the TLS ServerKeyExchange message. It may be
>> useful to say what, if anything, you are planning to do change
>> regarding SHA-1- or SHA-1+MD5- signed ServerKeyExchange messages, and
>> on what timeline.
>
> When we have something to say, we'll say it :)
>
> The biggest focus right now is on certificates.
Chrome on non-SP3 Windows XP would advertise that it supports SHA-2
signatures in the signature_algorithms extension, even though it
doesn't support SHA-2 signatures on certificates on non-SP3 Windows
XP. This is why I see all of these issues as being inter-related. In
particular, using the mechanism I described to support SHA-1
certificates for non-SHA-2-capable clients while giving SHA-2-capable
clients SHA-2 certificates doesn't work well when the
signature_algorithms extension overstates the client's capabilities.