Re: StartCom cross-signs disclosed by Certinomis

2017-08-02 Thread okaphone.elektronika--- via dev-security-policy
On Thursday, 3 August 2017 02:12:18 UTC+2, Matt Palmer wrote: > On Wed, Aug 02, 2017 at 06:38:44PM -0400, Jonathan Rudenberg via > dev-security-policy wrote: > > I think the correct response is to add both intermediates to OneCRL > > immediately, especially given the historic issues with StartCom

Re: DigiCert-Symantec Announcement

2017-08-02 Thread Peter Gutmann via dev-security-policy
Peter Bowen writes: >Gerv's email was clear that sale to DigiCert will not impact the plan, >saying: "any change of control of some or all of Symantec's roots would not >be grounds for a renegotiation of these dates." > >So the sanctions are still intact. Ah, I phrased my question a bit unclearl

Re: DigiCert-Symantec Announcement

2017-08-02 Thread Peter Bowen via dev-security-policy
On Wed, Aug 2, 2017 at 8:10 PM, Peter Gutmann via dev-security-policy wrote: > Jeremy Rowley via dev-security-policy > writes: > >>Today, DigiCert and Symantec announced that DigiCert is acquiring the >>Symantec CA assets, including the infrastructure, personnel, roots, and >>platforms. > > I re

Re: DigiCert-Symantec Announcement

2017-08-02 Thread Peter Gutmann via dev-security-policy
Jeremy Rowley via dev-security-policy writes: >Today, DigiCert and Symantec announced that DigiCert is acquiring the >Symantec CA assets, including the infrastructure, personnel, roots, and >platforms. I realise this is a bit off-topic for the list but someone has to bring up the elephant in th

RE: DigiCert-Symantec Announcement

2017-08-02 Thread Jeremy Rowley via dev-security-policy
* Will there be other players in Symantec's SubCA plan or is DigiCert the only one? [DC] Only DigiCert. * ‎Is DigiCert prepared (yet?) to commit to a "first day of issuance" under the SubCA plan? That is, when is the earliest date that members of the general public may purchase cer

Re: DigiCert-Symantec Announcement

2017-08-02 Thread Peter Kurrasch via dev-security-policy
This certainly shakes things up! I've had my concerns that Symantec's plan was complicated and risky, but now I'm wondering if this new path will be somewhat simpler--yet even more risky? I'm not suggesting we sho

Re: DigiCert-Symantec Announcement

2017-08-02 Thread Peter Bowen via dev-security-policy
On Wed, Aug 2, 2017 at 2:12 PM, Jeremy Rowley via dev-security-policy wrote: > Today, DigiCert and Symantec announced that DigiCert is acquiring the > Symantec CA assets, including the infrastructure, personnel, roots, and > platforms. At the same time, DigiCert signed a Sub CA agreement wherein

Re: StartCom cross-signs disclosed by Certinomis

2017-08-02 Thread Matt Palmer via dev-security-policy
On Wed, Aug 02, 2017 at 06:38:44PM -0400, Jonathan Rudenberg via dev-security-policy wrote: > I think the correct response is to add both intermediates to OneCRL > immediately, especially given the historic issues with StartCom. +1. Also a strongly worded letter of "are you f%*king kidding me?!?

Re: StartCom cross-signs disclosed by Certinomis

2017-08-02 Thread Kathleen Wilson via dev-security-policy
Jonathan, Thank you for bringing this to our attention. I have filed two bugs... 1) https://bugzilla.mozilla.org/show_bug.cgi?id=1386891 Certinomis: Cross-signing of StartCom intermediate certs, and delay in reporting it in CCADB 2) https://bugzilla.mozilla.org/show_bug.cgi?id=1386894 Add "Star

RE: DigiCert-Symantec Announcement

2017-08-02 Thread Jeremy Rowley via dev-security-policy
Hey Nick - I plan to include all relevant OIDs in the cert. I figured that way relying parties understand the total risk associated with verification of the certificate, even if they don't know exactly the methods tied to each listed domain. If a method is eventually deemed less desirable (*cough*

RE: DigiCert-Symantec Announcement

2017-08-02 Thread Jeremy Rowley via dev-security-policy
Thanks Kathleen. We already offer short-lived certs (anywhere from 8 hours up), but they are not issued off a dedicated intermediate. It's a great suggestion, and we'll add it to the DigiCert plan. Jeremy -Original Message- From: dev-security-policy [mailto:dev-security-policy-bounces+je

Re: DigiCert-Symantec Announcement

2017-08-02 Thread Nick Lamb via dev-security-policy
On the use of OIDs to signify the Blessed Method used for validation I thought it can't hurt to mention the first obstacle for this idea which occurred to me in respect of Let's Encrypt (and more generally any CA importing ACME I think) Suppose an applicant asks for www.example.com, images.examp

StartCom cross-signs disclosed by Certinomis

2017-08-02 Thread Jonathan Rudenberg via dev-security-policy
Two certificates were disclosed by Certinomis in the CCADB today: - https://crt.sh/?q=F6044A7B147C26BABAB17C5189A09BE781919E95E26F8014D6A8B9880A6BABED - https://crt.sh/?q=6D9A258172F5CD1BDFF447EF64F9A9593070F4ACCBFD07465E4A7CBD205A5CFC These certificates are cross-signs of StartCom’s "StartCom

Re: DigiCert-Symantec Announcement

2017-08-02 Thread Kathleen Wilson via dev-security-policy
On Wednesday, August 2, 2017 at 2:13:40 PM UTC-7, Jeremy Rowley wrote: > Today, DigiCert and Symantec announced that DigiCert is acquiring the > Symantec CA assets, including the infrastructure, personnel, roots, and > platforms. At the same time, DigiCert signed a Sub CA agreement wherein we > wi

DigiCert-Symantec Announcement

2017-08-02 Thread Jeremy Rowley via dev-security-policy
Hi everyone, Today, DigiCert and Symantec announced that DigiCert is acquiring the Symantec CA assets, including the infrastructure, personnel, roots, and platforms. At the same time, DigiCert signed a Sub CA agreement wherein we will validate and issue all Symantec certs as of Dec 1, 2017.

Re: Certificate with invalid CN and dnsName issued by certSIGN

2017-08-02 Thread Jonathan Rudenberg via dev-security-policy
> On Aug 2, 2017, at 12:28, Jonathan Rudenberg via dev-security-policy > wrote: > > This certificate, issued on July 27 by certSIGN, has an invalid common name > of “todyro_2017” and an invalid SAN dnsName of “ tody.ro” (note the leading > space): > > https://crt.sh/?q=93EACBC95AE53D57322CA9

Re: Certificate with invalid dnsName issued from Baltimore intermediate

2017-08-02 Thread Nick Lamb via dev-security-policy
On Monday, 24 July 2017 17:34:03 UTC+1, Ben Wilson wrote: > Nick, > We are in discussions with Intesa Sanpaolo about implementing/pursuing > OneCRL or a similar approach (e.g. outright revocation of the CAs). > Thanks, > Ben Is there any progress on this? To be honest I was more meaning that Mozi

Certificate with invalid CN and dnsName issued by certSIGN

2017-08-02 Thread Jonathan Rudenberg via dev-security-policy
This certificate, issued on July 27 by certSIGN, has an invalid common name of “todyro_2017” and an invalid SAN dnsName of “ tody.ro” (note the leading space): https://crt.sh/?q=93EACBC95AE53D57322CA9646DCF260AE240369714906CD464561402BF32CE96&opt=cablint __

Re: Intermediates missing audit disclosures (Firmaprofesional)

2017-08-02 Thread Jonathan Rudenberg via dev-security-policy
> On Aug 2, 2017, at 12:02, Jonathan Rudenberg via dev-security-policy > wrote: > > There are still three intermediates (one issued by Firmaprofesional and two > issued by Swisscom) that are missing audit disclosures in the CCADB and do > not have a pending OneCRL revocation: > > - > https:

Intermediates missing audit disclosures (Firmaprofesional and Swisscom)

2017-08-02 Thread Jonathan Rudenberg via dev-security-policy
There are still three intermediates (one issued by Firmaprofesional and two issued by Swisscom) that are missing audit disclosures in the CCADB and do not have a pending OneCRL revocation: - https://crt.sh/?sha256=cbc689c87a63fa7323a7607cc7c457b3b450572befa47470b61c35bf079b600b (see https://bu

Undisclosed Taiwan GRCA intermediates

2017-08-02 Thread Jonathan Rudenberg via dev-security-policy
Two intermediates were issued by the Taiwan Government Root Certification Authority two weeks ago and have not been disclosed in CCADB: - https://crt.sh/?sha256=a423a33493b31953226df96477627dbd056756704211001b6161fb5f8299dc3a - https://crt.sh/?sha256=dd9c545d6b645c2bfbe1b6ecb60376006464e97bb130

Re: Found something I can't understand in these cerificates.

2017-08-02 Thread Jakob Bohm via dev-security-policy
On 02/08/2017 04:28, Han Yuwei wrote: 在 2017年8月1日星期二 UTC+8下午8:47:57,Nick Lamb写道: On Tuesday, 1 August 2017 08:39:28 UTC+1, Han Yuwei wrote: 1. the CN of two cerificates are same. So it is not necessary to issue two certificates in just 2 minutes. I think the most likely explanation is the d