Previous certificates for GitHub and Dropbox have been revoked for this reason.
If this problem has been reintroduced, they similarly need to be revoked. On Tue, Jun 20, 2017 at 4:57 PM annie nguyen via dev-security-policy < dev-security-policy@lists.mozilla.org> wrote: > Hi! > > I'm not sure if this is the correct place to ask (I'm not sure where > else I would ask). I'm so sorry if this message is unwanted. > > Earlier this week, a certificate for a domain resolving to 127.0.0.1 in > a Cisco application was revoked, because it was deemed to have been > compromised. > > Dropbox, GitHub, Spotify and Discord (among others) have done the same > thing for years: they embed SSL certificates and private keys into their > applications so that, for example, open.spotify.com can talk to a local > instance of Spotify (which must be served over https because > open.spotify.com is also delivered over https). > > This has happened for years, and these applications have certificates > issued by DigiCert and Comodo all pointing to 127.0.0.1 whose private > keys are trivially retrievable, since they're embedded in publicly > distributed binaries. > > - GitHub: ghconduit.com > - Discord: discordapp.io > - Dropbox: www.dropboxlocalhost.com > - Spotify: *.spotilocal.com > > Here is Spotify's, for example: > https://gist.github.com/venoms/d2d558b1da2794b9be6f57c5e81334f0 > > ---- > > What I want to know is: how does this differ to Cisco's situation? Why > was Cisco's key revoked and considered compromised, but these have been > known about and deemed acceptable for years - what makes the situation > different? > > It's been an on-going question for me, since the use case (as a software > developer) is quite real: if you serve a site over HTTPS and it needs to > communicate with a local client application then you need this (or, you > need to manage your own CA, and ask every person to install a > certificate on all their devices) > > Thank you so much, > Annie > _______________________________________________ > dev-security-policy mailing list > dev-security-policy@lists.mozilla.org > https://lists.mozilla.org/listinfo/dev-security-policy > _______________________________________________ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy