Suggestion to end support for legacy 1024-bit RSA root CAs in Fedora stable

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



You may remember Mozilla's initiative from 2014 to remove those root CAs from
the CA trust store that use RSA keys of a weaker 1024-bit size.
The topic has been previously discussed on this list [1].

Because of past limitations with both OpenSSL [2] and GnuTLS, and to ensure
their compatibility with most security SSL/TLS sites until their limitations
could be removed, we had decided to delay the removal of the root CA trust from
Fedora. We called that legacy trust, the legacy trust was set to enabled as the
default configuration, and we had introduced the ca-legacy utility [3] to allow
an administrator to configure their preference between a "default" setting
(higher compatibility) and "disable" (less compatibility, strictly following
Mozilla's decisions), and we documented our changes over time to Mozilla's list
[4].

Mozilla upstream has completed the removal of SSL/TLS trust for all such root
CAs, the last removal had happened in late 2015.

(... although some of the root CAs are still trusted for email security
certificates, this is why the legacy tool doesn't simply add or remove CAs, but
it switches between two different sets of trust flags.)

As a result, operators of web sites had time to learn about broken sites, and
it's likely that most sites have been fixed.

Therefore it's time to follow up. In the meantime, both GnuTLS and OpenSSL have
been fixed, and the versions we ship in stable Fedora can handle the problematic
scenarios correctly.

I'm not aware of SSL/TLS sites that are trusted in a fresh Firefox profile, but
which aren't trusted by openssl s_client or gnutls-cli when the system is
configured with ca-legacy disable. (Thanks a lot to Hubert Kario for performing
web scans of a large set of major web sites, that provided helpful data.)

Therefore I suggest that we attempt to remove all legacy trust flags in an
update to the ca-certificates.rpm package very soon. (More specifically, I
suggest that the legacy list is changed to be empty, with the result that both
legacy configurations "default" and "disable" will have the identical state.)

An update to the ca-certificates set version 2016.2.9 (as of NSS 3.26) is
currently pending (which adds trust for the ISRG / Let's Encrypt root CA). I'd
like to push that one to stable updates first.

Immediately afterwards, I'd like to submit a follow-up release, that removes the
legacy trust flags, and push that to testing on all currently maintained Fedora
branches.

I'd like to disable auto-karma for the legacy CA removal, and allow a few weeks
to wait for feedback.

Unless we find good reasons not to do it, I suggest to push the legacy removals
to stable around 2016-09-21.

Please let me know if you any questions or concerns.

Kai

[1] https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx/thread/OCQ5LTMJFT4A366TBSPXWWROV7WCJV5J/
[2] https://rt.openssl.org/Ticket/Display.html?id=3621#txn-49999
[3] https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx/message/4NZLWGVXCGUROHT535R7PTRQJKHILSWW/
[4] https://fedoraproject.org/wiki/CA-Certificates
[5] https://bugzilla.mozilla.org/show_bug.cgi?id=1156844
--
devel mailing list
devel@xxxxxxxxxxxxxxxxxxxxxxx
https://lists.fedoraproject.org/admin/lists/devel@xxxxxxxxxxxxxxxxxxxxxxx




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux