Trying to put everything in one big reply, hope I don't miss anything...
I'm aware, and trust me, I don't like it either. But every set of just two letters will run into this problem eventually. If we jump to the beginning of the alphabet, "AR" is the common name of a mass murder weapon. I think it's more important that we simply pick a scheme which makes sense, and stick with it. Everyone who is serious will understand; anyone who truly believes the name is a reference or an endorsement is unserious.
We already have precedent for indicating algorithm with a single "E" or "R", as do many other CAs. And as we expand into more algorithms in a post-quantum world, numbers will be confusing and hard to interpret. Fundamentally: numbers should be used for things in a sequence, and different algorithms are not sequenced. The name "ISRG Root X2" was, in hindsight, arguably a mistake.
While I like this idea, it makes it harder to clearly indicate which intermediates are of the same "generation" as their issuing roots. When we issue another batch of intermediates in 2028, would those be "25E4" or "28E4"? (And imo having two different numbers in there is also confusing.)
Yes. This is an unavoidable consequence of the fact that ISRG Root X1 and ISRG Root X2 will be removed from the Chrome trust store as soon as the last cert issued from the old hierarchy expires. Any website which serves a chain which includes only Root YR will be untrusted by old clients; any website which serves a chain which includes only ISRG Root X1 will be untrusted by new clients. We must provide a chain that includes both of those roots for compatibility with both updated and un-updated chrome instances.
Yes, unfortunately. See the above for why cross-signing the intermediates themselves will prove insufficient, since updated Chrome trust stores will not trust those chains. We will offer shorter and longer alternate chains, but the default chains will include signatures from both generations of roots.
This is a good question, and I think you're right to point out that the current language seems overly restrictive. However, it is definitively acceptable to issue Root and Subordinate CA certificates with these values in their Common Name field, as documented in Section 7.1.2.10.2 of the Baseline Requirements, "CA Certificate Naming".
There's a shortage of mental space, both amongst subscribers and amongst CA operators (i.e. me). I don't want to have to remember whether "R36" was generated in the most recent ceremony, or the one before that, or actually hasn't been generated yet...
Memorable and meaningful are very different things. "Kai" is a memorable name, but provides zero indication of algorithm or generation date.
Because it's too late to make a difference. I understand the urge to use P-256, to support the tiny subset of clients that only implement a subset of ECDSA validation algorithms. However, I think the population of clients which can't validate P-384 but do have trust stores recent enough to include ISRG Root X2 is vanishingly small, if it exists at all (given that ISRG Root X2 is P-384 itself). So imagine a scenario where Root YE and YE1 are both P-256. A system which can't validate P-384 is still going to fail to trust an ECDSA certificate: they'll validate the signature from YE1, then validate the signature from Root YE, and then... fail to validate the cross-sign from ISRG Root X2. So changing algorithms to support that subset of clients will be ineffective.
The P-384 keys and sigs are so much smaller than RSA 2048 and 4096 that the full EE <- YE1 <- Root YE <- ISRG Root X2 <- ISRG Root X1 chain is still smaller than the shorter EE <- YR1 <- Root YR <- ISRG Root X1 chain.
Yep. We still plan to switch to E7/E8/R12/R13 later this year. But thanks to the rotations we've already done, and the rotation we'll be doing this year, we no longer feel the urgency to continue rotating intermediates every year like clockwork. So this time around we plan to issue 3 intermediates of each type, rotate randomly between two of them, hold the third as backup, and simply conduct another intermediate ceremony in about two years' time.