Mozilla is warning Firefox users to update their browsers to the latest version to avoid facing disruption and security risks caused by the upcoming expiration of one of the company’s root certificates. […] Users need to update their browsers to Firefox 128 (released in July 2024) or later and ESR 115.13 or later for ‘Extended Support Release’ (ESR) users.
What’s do you mean “properly”? Certs are supposed to expire, so that in the case of compromise the use is still limited.
Signing certs should be expected to expire. Already-installed browser extensions signed by them should not, when the user doesn’t want them to.
Doing it the right way would prevent, for one thing, any possible repeat of the problem they had a couple years ago when they simply forgot to renew the cert and one day everyone’s browsers unexpectedly stopped working with no way to fix them short of making a new build. The debate was had then, you can go back and read what was said. A thorough review was promised. Presumably Mozilla came came to the wrong conclusion and decided it would be best not to publicise it much.
What is “the right way”, exactly?
There are many slightly different options I suppose, but personally I’d start with the simple and obvious approach suggested by the principle of least surprise: Check the expiry date on the extension signing cert only when an extension is installed. On subsequent startups, attempt to check for revocations.
Software should not self-destruct if it can’t reach the mothership.
Is it possible for an extension to be present without it triggering Firefox’s “installation” flow?