The following changes are proposed to Mozilla’s Root Store Policy.
Addition to: Section 7.1 Inclusions
CA key material MUST be generated within the three (3) years that precede the submission of a CA inclusion request. The date of CA key material generation shall be determined by reference to the auditor’s key generation ceremony report.
New Section 7.4 “Root CA Life Cycles”
Mozilla MAY limit the useful life of a CA certificate included in Mozilla’s root store to 10 years in order to encourage cryptographic agility, address advancements in computing, and facilitate the transition to better algorithms. Limiting the useful life of CA certificates is also warranted because older CA certificates generally subsist with non-conformities, having been created with (and sometimes maintained with) older technologies, policies, and practices that were overlooked as pre-existing when new requirements were introduced by this Policy or the CA/Browser Forum Baseline Requirements.
7.4.1 TLS
CA operators SHOULD anticipate that a root CA certificate included in the Mozilla root store with the websites trust bit enabled will be distrusted for TLS when its CA key material is over 15 years old.
For transition purposes, CA certificates in the Mozilla root store will be distrusted for TLS according to the following schedule:
(In the absence of an auditor’s key generation ceremony report, Mozilla may assume that the key material was generated prior to the “Valid From” date in the root CA certificate.)
CA operators MUST apply to Mozilla for inclusion of their next generation root certificate with the websites trust bit enabled at least 2 years before the “Distrust for TLS After Date” above.
7.4.2 S/MIME
CA operators SHOULD anticipate that a root CA certificate included in the Mozilla root store with the email trust bit enabled will be distrusted for S/MIME when its CA key material is over 20 years old.
For transition purposes, CA certificates in the Mozilla root store will be distrusted for email according to the following schedule:
CA operators MUST apply to Mozilla for inclusion of their next generation root certificate with the email trust bit enabled at least 2 years before the “Distrust for Email After Date” above.
It typically takes 2 to 3 years for a root certificate to get included into the major root stores. Time is also needed to complete the transition from an older hierarchy to the newer hierarchy before a CA can be distrusted for TLS. Therefore, a 15-year term allows for approximately 10 years of root CA use within the Mozilla root store.
Cryptographic Agility
Over the past decade, there have been multiple warnings that cryptographic algorithms currently in use will be vulnerable to attack by the year 2030, or sooner. Some experts believe that there is a 15% chance that RSA and ECC will be broken by 2026. While these are only predictions, by the time they’re proven, it will be too late. We need to prepare now, but the current problem is that many root CA certificates in the Mozilla root store will still be valid in 2030, and some even until 2046. When RSA and ECC root certificates are long-lived and then relied upon globally, they make it difficult to transition to something else. If one considers the historical advances we’ve made in computer processing speed over the past fifty years, the next several years will be a critically short time in which to transition. There is also the threat of practical quantum computing, which is predicted to break the security of nearly all modern public-key cryptographic systems, including the Web PKI. Even without quantum computing, cryptographic weaknesses will be discovered or there will be advances in technology supporting cryptanalysis, and it will be necessary to replace cryptographic algorithms.
Currently-used algorithms like RSA and ECC will be susceptible to cracking by quantum brute force based on Shor’s algorithm, which uses a quantum computer. Global investment in quantum computing is currently in the tens of billions of dollars, and it is expected to grow by the billions over the next several years. Also, over the next several years, our widely-used public key algorithms will need to be replaced with quantum-resistant alternatives. This will be a tremendous change management effort. We need to make significant changes to the Web PKI’s infrastructure. Members of the Mozilla Community know from experience that making infrastructural changes like we’re faced with here can take time to implement. If transition from the current cryptographic solutions to quantum-resistant algorithms takes too long, then until that happens, everyone will be exposed to privacy and security risks. We all need to be proactive instead of reactive. There is too much risk not to take some action now.
Cryptographic agility is the ability to replace cryptographic primitives, algorithms, and protocols efficiently at reasonable costs and with limited impact on operations. Mozilla is committed to the agile management of the root store and the timely replacement of root certificates to make the Web PKI more cryptographically agile so that we can make rapid transitions to new cryptographic primitives and algorithms. Practicing cryptographic agility now is necessary for the transition that CA operators will need to make in the future as quantum computing becomes more prevalent and as they need to implement post-quantum algorithms and other related solutions.
Old Roots and CA Hierarchies may not comply with New Requirements
It cannot be said that root key pairs and certificates created between 1998-2012 meet the CA/Browser Forum requirements and Mozilla standards that now exist. For instance, auditor-witnessed key generation on cryptographic hardware was only established unambiguously when the CA/Browser Forum adopted version 1 of the Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates. https://cabforum.org/wp-content/uploads/Baseline_Requirements_V1.pdf , effective July 1, 2012.
Root CAs created in the late 1990s and early 2000s are too old. Many are 2048-bit RSA. Some root CAs have been sold and transferred numerous times, and they cannot provide full auditor-provided attestations concerning key generation, secure transportation, cradle-to-grave continuous key protection, and ongoing policy adherence.
Back in 1998 and 1999 when some roots were created, there were very minimal requirements to be included as trust anchors in browser software. At the time, some root key pairs were even generated and stored in software. Soon, Microsoft began requiring that root keys be generated and held in hardware, and that “the CA follow appropriate technical security controls for the generation and delivery of public keys and the protection of private keys.” Specifically, “hardware crypto modules rated at FIPS 140-1 Level 2, ITSEC E3 or Common Criteria EAL4 (or higher) for CA signing key generation, storage and signing operations”.
In October 2006, the CA/Browser Forum adopted the Extended Validation Guidelines, which contained requirements for root certificates that would be trusted for EV treatment in browsers, including that auditors witness root key generation (attend the key ceremony) and provide a key generation report.
In 2008, version 1.1 of Microsoft’s Technical Requirements stated that 2048-bit roots had to expire before 2030, but “longer expiration may be afforded to larger root key sizes.” https://social.technet.microsoft.com/wiki/contents/articles/20899.windows-root-certificate-program-technical-requirements-version-1-1.aspx
In November 2011, the CA/Browser Forum adopted version 1.0 of the Baseline Requirements for the Issuance and Management of SSL Certificates (BRs) with an effective date of July 1, 2012. Section 17.7 of the BRs required key generation within cryptographic modules meeting applicable technical and business requirements and that auditors witness root key generation (or examine a video-recording of the key ceremony) and provide a key generation report. While some CAs may have been doing these practices before the adoption of the BRs, there is no publicly maintained evidentiary documentation or other assurance that such is the case.
Hi Ben,
The proposed update to 7.4.1 includes a table that outlines the distrust/”notBefore” dates of root certificates. For those certificates issued before 2006, there is a proposed distrust date of April 15, 2024 (less than 20 months from now).
However, the document then states:
" It typically takes 2 to 3 years for a root certificate to get included into the major root stores. Time is also needed to complete the transition from an older hierarchy to the newer hierarchy before a CA can be distrusted for TLS.”
This section acknowledges that it takes several years to gain root ubiquity and seemingly indicates that 20 months is not sufficient time to transition. To remain consistent with this guidance, I believe the distrust table needs to be updated to provide a more generous window so CAs have time to transition.
Thanks,
Corey
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaaGstSy2VGG7R63FBVxXm0rjWRBbVQDR_zHwv8RfeGDeQ%40mail.gmail.com.
"This root still supports 2 TLS subordinate CAs. One certificate expires in October 2024, and the other expires in July 2029. However, we can move off this root for TLS issuance."
"We would like to wait until after the expiration of our issuing CA in September 2023."
"Our root expires in May 2023. We started issuing TLS server certificates from our new root certificate in July 2019. All TLS server certificates issued by old root certificate have expired already."
"We have already transitioned away issuance of TLS Server Certificates from this older root CA."
"Mozilla may turn off the TLS trust bit for this root."
"Our G2 root, which we use for TLS issuance since 2020, has been cross-signed by our G1 root."
"We submitted a newer root certificate several years ago to another root program, and it’s still not in their distributed root store. If the root programs want to start motivating CAs to be more nimble and to rotate our roots, we need the root programs to do the same."
Hi Ben,
> Given your concerns, and as an alternative to what we previously proposed, what if we modified the deprecation schedule and required CAs to not issue new TLS certificates after the given date (unless reissuance were necessary under a given set of limited circumstances - TBD) and that we remove the websites trust bit a year later? In other words, the CA would stop issuing new certificates, except e.g., emergency re-issuance, etc.; we would change the column heading from "Distrust After Date" to "Stop Issuance"; and a new column would indicate that Mozilla would submit an NSS Bug to Remove the <Websites / Email> Trust Bit, which would be effective approximately one year after the Stop-Issuance column.
If I’m understanding this proposal correctly, then any issuance after the “Stop Issuance” date is a violation of Mozilla Policy. This differs from the previous proposal where any certificates issued after the “Stop Issuance” date are merely not trusted by Firefox. In other words, it’s a technical control without any corresponding policy restriction.
I think prohibiting TLS issuance via policy vs. implementing technical controls (i.e., removal of the Websites bit) may pose interoperability issues with other trust stores/platforms, as their plans for legacy root transition may not be as mature as Mozilla’s. The response that you quoted above is especially relevant here: “We submitted a newer root certificate several years ago to another root program, and it’s still not in their distributed root store. If the root programs want to start motivating CAs to be more nimble and to rotate our roots, we need the root programs to do the same.”
Additionally, a prohibition on issuance will prevent CAs from issuing Test Website certificates as required by BR section 2.2.
For these reasons, I’d advocate for complete removal of the Websites trust bit 398 days after the proposed “Stop Issuance” date and no restriction on issuance. A complete removal of the Websites trust bit will protect Firefox users from CA Private Keys whose provenance and protection has been called into question while also providing sufficient time for CAs and Subscribers to migrate to newer hierarchies.
Thanks,
Corey
Hi Ben,
I agree with Corey. The proposed TLS timeline will remove a number of root certificates in less than 20 months.
While I don’t see any real issue with removing trust in CA certificates after 15 years going forward, we should raise the initial date in the proposal for this to go into effect so CAs have time to deal with it as well as a hard target date.
Given that it can take 2 to 3 years (sometimes more!) for roots to get included, we should be adding time for processes at the CA to start up and get their internal approval, key ceremony and signings completed and set a bar at around 4 years.
On the other hand, I’m struggling to see why S/MIME should keep a longer usability life. If cryptographic agility is the main driver of this change, then we should keep lifetimes for TLS and S/MIME the same. This would also keep the target rollover dates for new hierarchies the same, potentially lowering the number of inclusion request cases.
Maybe there’s a path forward of combining the distrust dates of TLS and S/MIME, moving both initial distrust dates to somewhere in between, the end of 2026 or early 2027 instead.
Regards,Addition to: Section 7.1 Inclusions
CA key material MUST be generated within the three (3) years that precede the submission of a CA inclusion request. The date of CA key material generation shall be determined by reference to the auditor’s key generation ceremony report.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaaneQvrQyuAG35xvdiJXdZFpvR99hpXPj0_1AWaBZ22TA%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaaneQvrQyuAG35xvdiJXdZFpvR99hpXPj0_1AWaBZ22TA%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/02123a13-e89f-4aa8-8ba4-9656e2b6af17%40www.fastmail.com.
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/7583f738-82f3-cd1b-3793-5254e4d83095%40it.auth.gr.
Thanks. As noted in your comments, the majority of affected root CAs have indicated that they do not believe that they will have a problem with the proposed deprecation schedule, but I am still considering modifying the wording/timeframes for the four or so CAs who might be affected. For example, one CA operator has since noted that their key is 4096-bit RSA, that they can provide audit documentation of their key generation, and that the transition to another root may be difficult for users of Android and Apple devices.
Hi Dimitris,Thanks. I don't know why Chrome chose five years because I can't think of a scenario where a CA operator would take 4-5 years to submit their root CA for inclusion in the trust store. Whereas, three years seemed more reasonable and manageable.
Hi all,
TL;DR: We’re willing to consider moving the key freshness requirement from 5 years to 3 in a future policy update. Reducing the key-freshness requirement was always part of our long-term strategy.
Dimitris’ use-case description is what we were hoping to accommodate. We’ve seen key generation audit reports where over 50 keys were generated at once, with the specific acknowledgment that the keys were created for future use (i.e., “parked”). Even a year after generation, we do not observe the corresponding public key included in publicly-available certificates (or, by extension, public root program application queues). We’ve even observed an audit report that included over 150 keys. To be clear, this is not a commentary on this practice; I’m simply highlighting the existence of the use case described by Dimitris.
In any event, our long-term plan before Ben’s post was to reduce the “key-freshness” requirement introduced in our V1.1 policy update. One of the reasons we did not initially require a shorter key-freshness period was because we recognize the effort, cost, and time commitment required by CAs to apply to root programs - and ultimately become “publicly trusted.” Imposing a more strict key-freshness requirement when one did not previously exist in any public root program policy would have resulted in additional churn by CA owners observed in other public root program application queues without guaranteed security value. So, ultimately, we chose five years to balance practical security goals (described below) and the planned launch of our program, with a longer-term goal of eventually reducing this period after better understanding the impact on applicants.
We value the use of “fresh” key material because:
When coupled with our future proposed CA term limit, it establishes a ceiling for the maximum time a key that has been unknowingly compromised could impact the security of Chrome’s users.
The Baseline Requirements and audit schemes permitted therein have been continuously improving since their inception. Aligning with modern requirements, practices, and audit frameworks is the only way of benefiting from that improvement. For example, WebTrust’s lifecycle management audit as we know it today wasn’t established until 2019.
Similar to the Baseline Requirements and corresponding audit schemes, the same continuous improvement is true for the software libraries and systems that generate and protect key material.
As above, it allows the ecosystem to realize the benefits of continuous improvement efforts made by CAs regarding the ongoing management of key generation scripts and ceremonies.
It promotes agility.
Being well-versed and well-rehearsed in performing key generation ceremonies will prepare us better for the future (i.e., preparing for a “post-quantum” world where we may quickly need to instantiate new CAs).
Related to this issue, in a future policy update, we may clarify our expectations regarding how “parked keys” must be audited and represented in audit statements, similar to the structured reporting format required for CA certificates (see Section 8.6 of the BRs).
Thanks, and please let me know if there are any questions!
- Ryan
[on behalf of the Chrome Root Program]
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/5dbe5339-b106-cc73-4c58-22c76dd39486%40it.auth.gr.
Hi, Fillppo,
About the details of the Android client compatibility and your comment "why is cross-signing not an option". You could see Hongkong Post CA's case in mdsp as https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/a2vWmLIKZy4 and Hongkong Post CA's announcement in https://www.ecert.gov.hk/news/press/95.html. Please also search "Android Fragmentation" key word in internet.
I quoat some information from Hongkong Post CA as below :
“Our several major subscribers’ of public services have recently completed research among mobile device users in Hong Kong. It revealed that usage of the old Android devices version 10 or below (not yet pre-loaded with Root CA3) could only drop to below 5% for the Hong Kong mobile users at least after 6 years, taking into account that low-income families would slowly replace their old mobile devices.”
Note that " Root CA3 ("Hongkong Post Root CA 3" ) has been included in Mozilla and Microsoft in May 2019, Google in September 2020, and Apple in October 2021. Therefore, subscribers are no longer required to install the cross-certificate to applications such as web servers for being trusted by common web browsers, when the web browser users use any of the following web browsers on supported platforms ("Supported Web Browser"): -
Google Chrome and other supported web browsers on Android 11 or above
Microsoft Edge and other supported web browsers on Windows 10 or above
Apple Safari and other supported web browsers on iOS 15 or above, iPadOS 15 or above, macOS 12 or above.
Mozilla Firefox version 68 or above on all supported platforms."
"Since 2019, all TLS server certificates have been rolled-over to a new Hongkong Post Root CA3 Certificate ("Root CA3") to replace the old Root CA1 which is due for expiry in May 2023. We have also implemented a cross-certificate signed by the old Root CA1, valid from Aug 2017 to May 2023 in enabling end-users of Hong Kong who are using old version of desktop/mobile devices pre-loaded with the old Root CA1 only to access local websites using TLS server certificates issued under Root CA3. "
“A substantial number of Hong Kong residents using Android version 10 or below, not yet pre-loaded with Root CA3. Therefore, we plan to model the previous practice of "Let's Encrypt" in managing similar expiry of its Root Certificate in 2021 in order to minimize the impact of accessibility of local websites governed under Root CA3 by old Android device users arising from the expiry of Root CA1. “
"In order to minimize the impact of accessibility of local websites using our TLS server certificates by Hong Kong mobile device users to a manageable level, we consider issuing the new cross-certificate signed by Root CA1 extended by a longer transition period of 6 years or more (instead of 3 years to May 2026). Taking into account that during the transition period, the security strength would not be affected along our existing certificate chain of trust. We have re-confirmed with our auditor to ensure our revised plan with no compliance concerns."
Note that Hong Kong Post CA's Root CA1 is RSA 2048 with SHA-1. Their new cross-sign certificate RSA 4096 with SHA-256 i:https://crt.sh/?id=7224214828.
Thanks to Mr. Man Ho of Hongkong Post Certification Authority, Certizen .
Sincerely Yours,
Li-Chun Chen
Section 7.4 “Root CA Life Cycles”
Root CA certificates included in the Mozilla root store will be distrusted when their CA key material is over 15 years old. The date of CA key material generation SHALL be determined by reference to the auditor’s key generation ceremony report. For key material generated before July 1, 2012, Mozilla will assume that the key material was generated on the “Valid From” date in the root CA certificate. For transition purposes, root CA certificates in the Mozilla root store will be distrusted according to the following schedule:
This schedule is subject to change if the underlying algorithms become more susceptible to cryptanalytic attack.
CA operators MUST apply to Mozilla for inclusion of their next generation root certificate at least 2 years before the Distrust Date above.
Thoughts?
Ben
Hi Ben,
I like this approach and timeline as it completely removes the old CA key material in question from the ecosystem while providing sufficient runway (2-3 years) for the transition to newer hierarchies.
Thanks,
Corey
From: dev-secur...@mozilla.org <dev-secur...@mozilla.org> On Behalf Of Ben Wilson
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaZdguv3J-uBNatmg7csENQWvk%2BHNRrn41xKTzpw2JGWBQ%40mail.gmail.com.
Hey Ben,
s/MIME certificates are issued for 3 years and often put on hardware. This means that s/MIME certificates issued today will be distrusted before their expiration if signed by one of the impacted roots. The logic behind applying the removal to sMIME is also weird as the BRs for s/MIME don’t exist (yet). This means the concern over s/MIME older roots and their operation under the standards is quite different than TLS. I think we should either: 1) extend the timeline for s/MIME so its 3 years from whenever the last issuance date is or 2) apply a notBefore distrust to sMIME on the dates listed below. There’s also some confusion on what distrust means because Mozilla has two different ways to distrust a root – removal or notBefore. How about something like this:
Root CA certificates included in the Mozilla root store will be distrusted when their CA key material is over 15 years old. The date of CA key material generation SHALL be determined by reference to the
auditor’s key generation ceremony report. For key material generated before July 1, 2012, Mozilla will assume that the key material was generated on the “Valid From” date in the root CA certificate.
Under this section and on the date listed in this section, Mozilla will remove the root’s TLS bit and set a notBefore rule for s/MIME certs. Mozilla will remove the roots completely from the root store 3 years after the notBefore date.
For transition purposes, root CA certificates in the Mozilla root store will be distrusted according to the following schedule:
This schedule is subject to change if the underlying algorithms become more susceptible to cryptanalytic attack.
CA operators MUST apply to Mozilla for inclusion of their next generation root certificate at least 2 years before the Distrust Date above.
Jeremy
From: dev-secur...@mozilla.org <dev-secur...@mozilla.org>
On Behalf Of Ben Wilson
Sent: Monday, September 19, 2022 11:44 AM
To: Li-Chun CHEN <lcchen...@gmail.com>
Cc: dev-secur...@mozilla.org; Filippo Valsorda <fil...@ml.filippo.io>; jespe...@gmail.com <jespe...@gmail.com>
--
You received this message because you are subscribed to the Google Groups "dev-secur...@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
dev-security-po...@mozilla.org.
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaZdguv3J-uBNatmg7csENQWvk%2BHNRrn41xKTzpw2JGWBQ%40mail.gmail.com.
Dear Ben,
SwissSign supports Jeremy’s suggestion. Due to the longer life-time of S/MIME certificates, we would welcome a later distrust for S/MIME than for TLS.
Kind regards
Roman
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/BYAPR14MB260034616DFEAF039A7988238E4F9%40BYAPR14MB2600.namprd14.prod.outlook.com.
Dear Ben,
1. Would you mind looking at https://www.gizchina.com/2022/04/12/android-12-has-only-2-6-of-users-while-android-11-is-far-ahead/?
ANDROID 12 HAS ONLY 2.6% OF USERS WHILE ANDROID 11 IS FAR AHEAD in April of 2022 by Uptodown. There is a figure in above link from a survey conducted by Uptodown, a 130 million user strong alternative store to Google Play. In fact, the operating system ranks fifth among the most popular OSs. Unsurprisingly, Android 11 takes first place with 29.5% of users. The latter is followed by Android 10 (25.2%), then by Android 9 (11.5%), then by Oreo, version 8.1 of Android (11%). As mentioned above, these results are not unusual. It is now customary that versions prior to the most recent remain more popular than this one. This was particularly the case with Android 11 in 2021, which remained behind Android 10 for a long time even though a quarter of users had already adopted it.
2. Please see https://9to5google.com/2022/08/12/android-12-distribution-numbers/ the news in August. Android 12 is running on 13.3% of all devices ahead of Android 13 launch. Android 11 is now at 27% from 23.8% in May. It remains the most-used version of Android today, with Android 10 following at 22.3%. Android 9 Pie is still at 14.5% and four years later still beats the latest stable release. So the "Android Fragmentation" is a big problem.
.
3. Please also see https://www.gizchina.com/2022/08/15/android-12-is-installed-only-on-13-of-smartphones/
" At the beginning of August, therefore, Android 12 was installed on 13.3% of compatible devices. Currently, Android 11 is available on 27% of compatible devices.”
“The truth is that even earlier versions are more popular than Android 12. So, Android 10 peaks at 22.3% installs, while Android 9 is also above it with 14.5% installs. However, this is not really surprising. Indeed, the latest versions of the operating system traditionally lag behind their predecessors."
“Thus, last April, Android 12 was running only on 2.6% of devices. Even though it had already been several months since its official launch had passed. These figures are due to two things. First, if the latest Android updates are available directly on Pixels, this is not necessarily the case on smartphones from other manufacturers, which sometimes have to wait several months before being able to offer them to their users with their own overlay.”
“Added to this is the reluctance of many users, many of whom keep their smartphone for several years, for fear of experiencing bugs or slowdowns in their device by installing the latest version. Thus, the delay of Android 12 compared to its predecessors was predictable, and its rise in just a few months is on the contrary very encouraging for the future, especially at the dawn of the arrival of Android 13.”
Note that my colleagues who have Android 12 and 10 do not receive any upgrading message from manufacturers of their mobile phones. It is because Android's CA Trust List is distributed by smart phone's manufacturers via firmware upgrading. But my colleagues don’t use Google pixel phone to get newer Android 13.
Above three points are the cases of “Android Fragmentation” problem.
4. HongkongPost CA’s post said “Our several major subscribers’ of public services have recently completed research among mobile device users in Hong Kong. It revealed that usage of the old Android devices version 10 or below (not yet pre-loaded with Root CA3) could only drop to below 5% for the Hong Kong mobile users at least after 6 years, taking into account that low-income families would slowly replace their old mobile devices.” Hongkong Post CA used Root CA1 RSA2048 with SHA-1 2003 to cross-sign Root CA3 and extended the expiration date to 2029 for Android device users on July 27, 2022. Chunghwa Telecom's new Root CA HiPKI RCA-G1 will be pre-load in Android 13 announced on August 15, 2022. I am afraid we will face a more serious situation than Hongkong Post CA. We will face a substantial number of Taiwan resident using Android 12 or below version around 2022-2025. They may not upgrade their Android.
To comply with Mozilla’s proposal, Chunghwa Telecom will begin transition the subscriber chained up to ePKI Root CA to HiPKI RCA-G1 (setup new subordinate CAs under HiPKI RCA-G1 first). To solve above Android’s compatibility problem, we had better suggest our PMA to allow us to use our old root CA-ePKI Root CA to cross-sign HiPKI RCA-G1. I see you extend the distrust date from April 15, 2024 to April 15, 2025. The schedule is still tight. Android’s CA trust list is the downstream of the Mozilla’s CAs’ inclusion. It means that a new Root CA will be in Android’s CA list after Mozilla’s approve of that new Root CA in Mozilla root store. What about the mechanism of removing an old Root CA by Android? Will Android remove the pre-2006 root CAs after April 15, 2025? I doubt maybe in the summer or autumn of 2025, Android will release their version to remove ePKI Root CA. But there are still lots of persons use Android 12 or below version. There will be a critical problem about the compatibility of Android.
In conclusion, I suggest Mozilla could extend the distrust date of affected pre-2006 Root CA dates on April 15, 2026 to solve the “Android Fragmentation” problem. Thank you.
Here is another option (deleting the other MRSP language previously proposed):Section 7.4 “Root CA Life Cycles”
Root CA certificates included in the Mozilla root store will be distrusted when their CA key material is over 15 years old. The date of CA key material generation SHALL be determined by reference to the auditor’s key generation ceremony report. For key material generated before July 1, 2012, Mozilla will assume that the key material was generated on the “Valid From” date in the root CA certificate. For transition purposes, root CA certificates in the Mozilla root store will be distrusted according to the following schedule:
This schedule is subject to change if the underlying algorithms become more susceptible to cryptanalytic attack.
CA operators MUST apply to Mozilla for inclusion of their next generation root certificate at least 2 years before the Distrust Date above.
Thoughts?
To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/ZRAP278MB056259B6D7DAEED5DCE9792BFA4E9%40ZRAP278MB0562.CHEP278.PROD.OUTLOOK.COM.
All,
Based on my understanding of Jeremy's email, here is another version.
New Section 7.4 “Root CA Life Cycles”
For a root CA certificate trusted for server authentication, Mozilla will remove the websites trust bit when the CA key material is more than 15 years old. For a root CA certificate trusted for secure email, Mozilla will set the "Distrust for S/MIME After Date" for the CA certificate to 18 years from the CA key material generation date. The CA key material generation date SHALL be determined by reference to the auditor-witnessed key generation ceremony report. If the CA operator cannot provide the key generation ceremony report for a root CA certificate created before July 1, 2012, then Mozilla will use the “Valid From” date in the root CA certificate to establish the key material generation date. For transition purposes, root CA certificates in the Mozilla root store will be distrusted according to the following schedule:
This schedule is subject to change if underlying algorithms become more susceptible to cryptanalytic attack or if other circumstances arise that make this schedule obsolete.
CA operators MUST apply to Mozilla for inclusion of their next generation root certificate at least 2 years before the applicable distrust date.
Thoughts?
Ben