Hi Harshal,
Yes, we took the option of pre-generating some OCSP signing certificates in 2016 for use in 2017 and 2018 vs. creating long validity OCSP signing certificates or moving to SHA-256. Since the not-before dates are in 2017 when this would have been prohibited, so we posted them to CT logs in 2016 so there was no confusion about when they were created.
Regarding your statement that they don’t appear to be revoked: OCSP signing certificates can’t be revoked, thus they will never show up as revoked.
While browsers don't trust SHA-1, there are some legacy applications that do, and they probably don’t support SHA-256 OCSP signed certificates. When the validation rate of these SHA-1 SSL certificates falls acceptably low, we'll revoke the SHA-1 CA and turn off all of the related OCSP services, but until then we have a few OCSP signing certificates we can use to provide revocation services.
Doug
> _______________________________________________
> dev-security-policy mailing list
>
dev-secur...@lists.mozilla.org
>
https://lists.mozilla.org/listinfo/dev-security-policy