Would this be enough? 
http://www.cac.gov.cn/2016-09/19/c_1119583763.htm

On Thursday, October 13, 2016 at 10:58:34 AM UTC+8, 谭晓生 wrote:
> Yuwei, 
> I don’t know who you are, but I can tell you and the community, Qihoo 360 
> never been involved in ***** Fire Wall project, if you did some investigation 
> to the message that accused Qihoo 360 joined the project “Search Engine 
> Content Security Management System”, you should know the project had been 
> done on Feb 2005, before Qihoo 360 was founded on Aug 2005, and the project 
> is neither part of the ***** fire wall project nor a project done by Qihoo 
> 360, actually it is part of the efforts to help Yahoo’s search engine could 
> work in China, I was the tech head of Yahoo!China ‘s tech team, director of 
> engineering and soon the CTO of Yahoo!China, I know what happened at that 
> time.
>  
> Thanks,
> Xiaosheng Tan
> 
> 
> 
> 在 2016/10/13 上午5:22,“dev-security-policy 代表 Han 
> Yuwei”<dev-security-policy-bounces+tanxiaosheng=360...@lists.mozilla.org 代表 
> hanyuwe...@gmail.com> 写入:
> 
>     在 2016年10月13日星期四 UTC+8上午3:12:08,Ryan Sleevi写道:
>     > As Gerv suggested this was the official call for incidents with respect 
> to StartCom, it seems appropriate to start a new thread.
>     > 
>     > It would seem that, in evaluating the relationship with WoSign and 
> Qihoo, we naturally reach three possible conclusions:
>     > 1) StartCom is treated as an independent entity
>     > 2) StartCom is treated as a subsidiary of Qihoo
>     > 3) StartCom is treated as a subsidiary of WoSign
>     > 
>     > We know there are serious incidents with WoSign that, collectively, 
> encourage the community to distrust future certificates. However, there 
> hasn't been a similar investigation into the trustworthiness of StartCom as 
> an independent entity or as an entity operated by Qihoo. It would seem that 
> germane to the discussion is how trustworthy the claims are - from either 
> StartCom or Qihoo - and how that affects trust.
>     > 
>     > Incidents with StartCom:
>     > A) Duplicate Serials. 
> https://bugzilla.mozilla.org/show_bug.cgi?id=1029884
>     > We know that StartCom had issues issuing duplicate serials, in 
> violation of RFC 5280. We know that they did not prioritize resolution, and 
> when attempting resolution, did so incompletely, as the issue still 
> resurfaced.
>     > 
>     > C) Improper OCSP responder. 
> https://bugzilla.mozilla.org/show_bug.cgi?id=1006479 / 
> https://bugzilla.mozilla.org/show_bug.cgi?id=1151270
>     > We know that StartCom continues to have issue with their OCSP responder 
> after they issue certificates. Presumably, this is a CDN distribution delay, 
> but we can't be sure, especially considering Incident A was with the 
> underlying systems. As a consequence of this, users with StartCom 
> certificates are disproportionately disadvantaged from enabling OCSP 
> stapling, which many browser programs support (and is perhaps the only viable 
> path towards a complete revocation solution).
>     > 
>     > E) Heartbleed. https://bugzilla.mozilla.org/show_bug.cgi?id=994033 / 
> https://bugzilla.mozilla.org/show_bug.cgi?id=994478
>     > We know StartCom had a notoriously poor response to HeartBleed. Eddy 
> first dismissed the significance, and then when proven wrong, still continued 
> to charge $25 USD for revocation. Ostensibly, this is a violation of the 
> Baseline Requirements, in that CAs are required to revoke certificates 
> suspected of Key Compromise. However, despite the BRs effective date of 2012, 
> Mozilla was not aggressively imposing compliance then (... or now, to be 
> fair).
>     > 
>     > G) StartCom BR violations - IV 
> https://bugzilla.mozilla.org/show_bug.cgi?id=1266942
>     > StartCom was materially violating its CP/CPS and the Baseline 
> Requirements with respect to certain types of validation. No explanation for 
> the root cause provided.
>     > 
>     > I) StartCom BR violations (2) - Key Sizes 
> https://bugzilla.mozilla.org/show_bug.cgi?id=1015767
>     > StartCom was issuing certificates less than 2048 bits.
>     > 
>     > K) StartCom impersonating mozilla.com. 
> https://bugzilla.mozilla.org/show_bug.cgi?id=471702
>     > StartCom's (former) CEO Eddy Nigg obtained a key and certificate for 
> www.mozilla.com and placed it on an Internet-facing server.
>     > 
>     > M) StartCom BR violations (3) - Key exponents 
> https://bugzilla.mozilla.org/show_bug.cgi?id=1212655
>     > StartCom was not enforcing the BRs with respect to RSA public exponents.
>     > 
>     > O) StartCom BR violations (4) - Curve violations 
> https://bug98304.bugzilla.mozilla.org/show_bug.cgi?id=1269183
>     > StartCom was not enforcing the BRs with respect to EC curve algorithms.
>     > 
>     > 
>     > 
>     > In addition to discussion of StartCom issues, it seems relevant to 
> future trust to evaluate issues with Qihoo. Many in the Mozilla community may 
> not have direct interactions with Qihoo, but they have obtained some 
> notoriety in security circles.
>     > 
>     > Q.A) Qihoo masking their browser as a critical Windows security update 
> to IE users.
>     > http://wmos.info/archives/7717 / 
> http://www.theregister.co.uk/2013/02/01/qihoo_government_warning_fraud/
>     > Qihoo displayed a misleading security update for Windows users that 
> instead installed their browser.
>     > 
>     > Q.C) Qihoo browser actively enables insecure cryptography.
>     > 
> https://docs.google.com/document/d/1b7lenmn5XO06QohaJzVffnJxjXjY1rD70wg34gfuxRo/edit
>     > Qihoo's browser is notably insecure with respect to SSL/TLS, with some 
> of the insecure changes requiring active modification to the low-level source 
> libraries that Chromium (of which they're based on) uses.
>     > 
>     > Q.E) Qihoo apps removed from app stores due to malware
>     > 
> https://www.techinasia.com/qihoo-committing-fraud-google-making-huge-mistake 
> / https://www.techinasia.com/qihoo-apps-banned-apple-app-store
>     > Qihoo Apps have repeatedly been banned from Apple's App Store due to 
> issues
>     > 
>     > Q.G) Qihoo "security" apps repeatedly found as unfair competition
>     > 
> https://www.techinasia.com/qihoo-360-loses-chinas-courts-ordered-pay-sogou-82-million-unfair-competition
>     > 
>     > 
>     > 
>     > I hope the above show that the odds are if the original StartCom 
> systems are restored, we're likely to continue to have significant BR 
> violations - a pattern StartCom has repeatedly demonstrated over several 
> years. Similarly, if we were to accept trust in Qihoo, then we would be 
> ignoring the precedent Qihoo has set of choosing insecure and anti-user 
> behaviours masked as "security".
>     
>     As a Chinese Internet user, I would say that Qihoo has a very negative 
> reputation on China online community for its precedent's malware(maybe not 
> accurate) and some awful actions such as "3Q Battle", installing software 
> sliently, misleading ads, suspiciously collecting data which is believed 
> helping govnerment monitoring citizens and so on. But on the other hand, 
> their product, "360安全卫士" (360 Total Security)(two names are not the same 
> version but I can't find another english name),as I thought, has improved the 
> total security level of China Internet. And it has changed the ecosystem of 
> Chinese anti-malware software,which I don't know it is good or bad. And it's 
> believed that Qihoo have a tight connection with the Great Fire Wall project.
>     
>     Since "The Big Brother is Watching you" is not accepted in Mozilla, I 
> thought Qihoo is not trustworthy in operating a CA.
>     
>     P.S. Anyone who knows to change the font size of google group? As a 
> non-english native speaker it is hard for me to read such a small size in the 
> content.
>     _______________________________________________
>     dev-security-policy mailing list
>     dev-security-policy@lists.mozilla.org
>     https://lists.mozilla.org/listinfo/dev-security-policy

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to