Things went interesting, the webpage is about the 19 honored internet security 
researcher by China government, some of them are professors of university, like 
Professor Xiaoyun Wang who contributed a lot on cryptology(MD5 &SHA-1), Min 
Yang, Haixin Duan, Jianwei Liu, Xingshu Chen……, and the fellow of China Academy 
of Engineering, Mr.Changxiang Shen, there is also officers of the 
Administration of public security, are they treated as “Bad Guys” in this 
community? 

Mr.Wenbin Zheng, the GM of Core Security BU of Qihoo 360, is one of the 19 
honored peoples there, he is the top experienced engineer on Microsoft Windows 
Driver development, focus on DEFENDING the virus/Trojan attack for Microsoft 
Windows, the XP Shield made by his team provide additional protect to XP users, 
effectively.

Maybe we should consider technology, product/service and politics separately, 
somebody may not be funs of some government, but if we mixed the technology, 
product/service and politics together, it might make the world even worse.

Thanks,
Xiaosheng Tan


在 2016/10/13 下午12:42,“dev-security-policy 代表 
yliva...@gmail.com”<dev-security-policy-bounces+tanxiaosheng=360...@lists.mozilla.org
 代表 yliva...@gmail.com> 写入:

    Would this be enough? 
    http://www.cac.gov.cn/2016-09/19/c_1119583763.htm
    
    On Thursday, October 13, 2016 at 10:58:34 AM UTC+8, 谭晓生 wrote:
    > Yuwei, 
    > I don’t know who you are, but I can tell you and the community, Qihoo 360 
never been involved in ***** Fire Wall project, if you did some investigation 
to the message that accused Qihoo 360 joined the project “Search Engine Content 
Security Management System”, you should know the project had been done on Feb 
2005, before Qihoo 360 was founded on Aug 2005, and the project is neither part 
of the ***** fire wall project nor a project done by Qihoo 360, actually it is 
part of the efforts to help Yahoo’s search engine could work in China, I was 
the tech head of Yahoo!China ‘s tech team, director of engineering and soon the 
CTO of Yahoo!China, I know what happened at that time.
    >  
    > Thanks,
    > Xiaosheng Tan
    > 
    > 
    > 
    > 在 2016/10/13 上午5:22,“dev-security-policy 代表 Han 
Yuwei”<dev-security-policy-bounces+tanxiaosheng=360...@lists.mozilla.org 代表 
hanyuwe...@gmail.com> 写入:
    > 
    >     在 2016年10月13日星期四 UTC+8上午3:12:08,Ryan Sleevi写道:
    >     > As Gerv suggested this was the official call for incidents with 
respect to StartCom, it seems appropriate to start a new thread.
    >     > 
    >     > It would seem that, in evaluating the relationship with WoSign and 
Qihoo, we naturally reach three possible conclusions:
    >     > 1) StartCom is treated as an independent entity
    >     > 2) StartCom is treated as a subsidiary of Qihoo
    >     > 3) StartCom is treated as a subsidiary of WoSign
    >     > 
    >     > We know there are serious incidents with WoSign that, collectively, 
encourage the community to distrust future certificates. However, there hasn't 
been a similar investigation into the trustworthiness of StartCom as an 
independent entity or as an entity operated by Qihoo. It would seem that 
germane to the discussion is how trustworthy the claims are - from either 
StartCom or Qihoo - and how that affects trust.
    >     > 
    >     > Incidents with StartCom:
    >     > A) Duplicate Serials. 
https://bugzilla.mozilla.org/show_bug.cgi?id=1029884
    >     > We know that StartCom had issues issuing duplicate serials, in 
violation of RFC 5280. We know that they did not prioritize resolution, and 
when attempting resolution, did so incompletely, as the issue still resurfaced.
    >     > 
    >     > C) Improper OCSP responder. 
https://bugzilla.mozilla.org/show_bug.cgi?id=1006479 / 
https://bugzilla.mozilla.org/show_bug.cgi?id=1151270
    >     > We know that StartCom continues to have issue with their OCSP 
responder after they issue certificates. Presumably, this is a CDN distribution 
delay, but we can't be sure, especially considering Incident A was with the 
underlying systems. As a consequence of this, users with StartCom certificates 
are disproportionately disadvantaged from enabling OCSP stapling, which many 
browser programs support (and is perhaps the only viable path towards a 
complete revocation solution).
    >     > 
    >     > E) Heartbleed. https://bugzilla.mozilla.org/show_bug.cgi?id=994033 
/ https://bugzilla.mozilla.org/show_bug.cgi?id=994478
    >     > We know StartCom had a notoriously poor response to HeartBleed. 
Eddy first dismissed the significance, and then when proven wrong, still 
continued to charge $25 USD for revocation. Ostensibly, this is a violation of 
the Baseline Requirements, in that CAs are required to revoke certificates 
suspected of Key Compromise. However, despite the BRs effective date of 2012, 
Mozilla was not aggressively imposing compliance then (... or now, to be fair).
    >     > 
    >     > G) StartCom BR violations - IV 
https://bugzilla.mozilla.org/show_bug.cgi?id=1266942
    >     > StartCom was materially violating its CP/CPS and the Baseline 
Requirements with respect to certain types of validation. No explanation for 
the root cause provided.
    >     > 
    >     > I) StartCom BR violations (2) - Key Sizes 
https://bugzilla.mozilla.org/show_bug.cgi?id=1015767
    >     > StartCom was issuing certificates less than 2048 bits.
    >     > 
    >     > K) StartCom impersonating mozilla.com. 
https://bugzilla.mozilla.org/show_bug.cgi?id=471702
    >     > StartCom's (former) CEO Eddy Nigg obtained a key and certificate 
for www.mozilla.com and placed it on an Internet-facing server.
    >     > 
    >     > M) StartCom BR violations (3) - Key exponents 
https://bugzilla.mozilla.org/show_bug.cgi?id=1212655
    >     > StartCom was not enforcing the BRs with respect to RSA public 
exponents.
    >     > 
    >     > O) StartCom BR violations (4) - Curve violations 
https://bug98304.bugzilla.mozilla.org/show_bug.cgi?id=1269183
    >     > StartCom was not enforcing the BRs with respect to EC curve 
algorithms.
    >     > 
    >     > 
    >     > 
    >     > In addition to discussion of StartCom issues, it seems relevant to 
future trust to evaluate issues with Qihoo. Many in the Mozilla community may 
not have direct interactions with Qihoo, but they have obtained some notoriety 
in security circles.
    >     > 
    >     > Q.A) Qihoo masking their browser as a critical Windows security 
update to IE users.
    >     > http://wmos.info/archives/7717 / 
http://www.theregister.co.uk/2013/02/01/qihoo_government_warning_fraud/
    >     > Qihoo displayed a misleading security update for Windows users that 
instead installed their browser.
    >     > 
    >     > Q.C) Qihoo browser actively enables insecure cryptography.
    >     > 
https://docs.google.com/document/d/1b7lenmn5XO06QohaJzVffnJxjXjY1rD70wg34gfuxRo/edit
    >     > Qihoo's browser is notably insecure with respect to SSL/TLS, with 
some of the insecure changes requiring active modification to the low-level 
source libraries that Chromium (of which they're based on) uses.
    >     > 
    >     > Q.E) Qihoo apps removed from app stores due to malware
    >     > 
https://www.techinasia.com/qihoo-committing-fraud-google-making-huge-mistake / 
https://www.techinasia.com/qihoo-apps-banned-apple-app-store
    >     > Qihoo Apps have repeatedly been banned from Apple's App Store due 
to issues
    >     > 
    >     > Q.G) Qihoo "security" apps repeatedly found as unfair competition
    >     > 
https://www.techinasia.com/qihoo-360-loses-chinas-courts-ordered-pay-sogou-82-million-unfair-competition
    >     > 
    >     > 
    >     > 
    >     > I hope the above show that the odds are if the original StartCom 
systems are restored, we're likely to continue to have significant BR 
violations - a pattern StartCom has repeatedly demonstrated over several years. 
Similarly, if we were to accept trust in Qihoo, then we would be ignoring the 
precedent Qihoo has set of choosing insecure and anti-user behaviours masked as 
"security".
    >     
    >     As a Chinese Internet user, I would say that Qihoo has a very 
negative reputation on China online community for its precedent's malware(maybe 
not accurate) and some awful actions such as "3Q Battle", installing software 
sliently, misleading ads, suspiciously collecting data which is believed 
helping govnerment monitoring citizens and so on. But on the other hand, their 
product, "360安全卫士" (360 Total Security)(two names are not the same version but 
I can't find another english name),as I thought, has improved the total 
security level of China Internet. And it has changed the ecosystem of Chinese 
anti-malware software,which I don't know it is good or bad. And it's believed 
that Qihoo have a tight connection with the Great Fire Wall project.
    >     
    >     Since "The Big Brother is Watching you" is not accepted in Mozilla, I 
thought Qihoo is not trustworthy in operating a CA.
    >     
    >     P.S. Anyone who knows to change the font size of google group? As a 
non-english native speaker it is hard for me to read such a small size in the 
content.
    >     _______________________________________________
    >     dev-security-policy mailing list
    >     dev-security-policy@lists.mozilla.org
    >     https://lists.mozilla.org/listinfo/dev-security-policy
    
    _______________________________________________
    dev-security-policy mailing list
    dev-security-policy@lists.mozilla.org
    https://lists.mozilla.org/listinfo/dev-security-policy
    

_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to