Show Untrusted Connection Error when cert in chain uses less than RSA 2048 signatures
Categories
(Core :: Security: PSM, enhancement, P1)
Tracking
()
| Tracking | Status | |
|---|---|---|
| firefox150 | --- | fixed |
People
(Reporter: keeler, Assigned: keeler)
References
Details
(Whiteboard: [psm-assigned])
Attachments
(1 file)
Comment 1•10 years ago
|
||
| Assignee | ||
Updated•9 years ago
|
Comment 2•8 years ago
|
||
| Assignee | ||
Updated•8 years ago
|
Updated•3 years ago
|
| Assignee | ||
Updated•5 days ago
|
| Assignee | ||
Comment 3•5 days ago
|
||
Comment 6•3 days ago
|
||
This seems like something we might want to call out in the release notes. Please nominate if you agree.
Comment 7•3 days ago
|
||
This seems like quite a jump from an 8 year comment to a fix :).
What does the telemetry look like?
What happened to cause this to happen now?
| Assignee | ||
Comment 8•3 days ago
|
||
I don't know that we need to include this in the release notes. Folks already shouldn't have been able to get <2048-bit RSA certificates from publicly-trusted CAs, and private CAs are unaffected.
(In reply to Mike Kaply [:mkaply] from comment #7)
What does the telemetry look like?
A maximum of ~0.05% of connections may be affected (https://sql.telemetry.mozilla.org/queries/95643#237252) (compare to ~1.5% of connections that already fail for other reasons), but again, publicly-trusted CAs shouldn't be issuing these certificates, so the actual number of affected connections should be 0.
What happened to cause this to happen now?
We should have done this a long time ago. The baseline requirements forbade this more than a decade ago, and we've had intermediate preloading to bridge any intermediate issues for a few years now.
Description
•