Closed cpu closed 4 months ago
I'm in favor of ditching it early (both before and after reading the discussion in the webpki issue).
If we want to go this route it would be prudent to try and cook up a Censys query to see how many unexpired EE certs chain to this root. I suspect it's not very many (?)
From Ctz on the other ticket:
According to https://crt.sh/cert-populations (they are listed as "e-commerce monitoring GmbH") this is 137 unexpired certificates.
Tooling changes are in-place, just waiting for CCADB data to reflect the distrust after date. I think that's waiting on NSS to land the change (phabricator PR).
I think that's waiting on NSS to land the change (phabricator PR).
The NSS change landed Friday. I pinged the CCADB folks and the distrust after date was updated this morning:
$> curl \
--location https://ccadb-public.secure.force.com/mozilla/IncludedCACertificateReportPEMCSV 2>/dev/null | \
csvtool namedcol "Common Name or Certificate Name,Distrust for TLS After Date" - |\
grep -v ",$"
Common Name or Certificate Name,Distrust for TLS After Date
GLOBALTRUST 2020,2024.06.30
Mozilla recently announced that they intend to implement an "active distrust" for a trust anchor in the Mozilla root program. In this enforcement model the trust anchor isn't removed entirely, but instead only considered trusted for certificates issued before a drop-dead date:
We'll need to think about whether we want to do anything special for this CA in this repo. We don't presently have the capability to implement a matching active distrust (see https://github.com/rustls/webpki/issues/259 for discussion of how to implement this). If we take that option off of the table what remains are:
$LONGEST_ALLOWED_EE_LIFETIME
- (presumably this is when mozilla will remove the root themselves, so may be equivalent to option 1)