SecurityEngineering/mozpkix-testing: Difference between revisions

m
Line 55: Line 55:
= Things for CAs to Fix =
= Things for CAs to Fix =


Workarounds were implemented to allow mozilla::pkix to handle the following situations. However, we will be asking CAs to immediately stop issuing new certificates with these issues, and we will identify dates for removing these workarounds.
Workarounds were implemented to allow mozilla::pkix to handle the following situations. We will be asking CAs to immediately stop issuing new certificates with these issues, and we will identify dates for removing these workarounds.


# Stop using the "Netscape Server Gated Crypto (2.16.840.1.113730.4.1)" (SGC) EKU.  For all new certificate issuance, use the "TLS Web Server Authentication (1.3.6.1.5.5.7.3.1)" EKU instead of the SGC EKU.
# Stop using the "Netscape Server Gated Crypto (2.16.840.1.113730.4.1)" (SGC) EKU.  For all new certificate issuance, use the "TLS Web Server Authentication (1.3.6.1.5.5.7.3.1)" EKU instead of the SGC EKU.
Confirmed users, Administrators
5,526

edits