Hey Kathleen, hey list, I really don't get why Mozilla is pushing so hard on the Chinese and at the same time let others get away. For example the Comodo case from today. Isn't that a much worse incident than what has happened here. People were able to issue certs for other people domains. When I read the WoSign answer to the current case (https://www.wosign.com/report/WoSign_Incident_Report_Update_07102016.pdf) I personally felt, that they completely understood the seriousness of the situation. I doubt we'll see a professional answer like this in the current Comodo case. But then - of cause - Comodos headquarter is in the United States and not in China.
I feel like Mozilla is misusing its market power in a beginning trade war and this is not a good thing for the Mozilla Foundation. We all trust Mozilla to fight for a free web and not to choose sides in a trade war. Best, Nikolai Am Donnerstag, 13. Oktober 2016 18:50:02 UTC+2 schrieb Kathleen Wilson: > All, > > Thanks again to all of you who have put in so much time and effort to > determine what happened with WoSign and StartCom and discuss what to do about > it. > > Based on the information that I have seen regarding WoSign, I believe that > WoSign intentionally bent the rules in order to continue issuing SHA-1 SSL > certs, when they knew full well that was no longer allowed. I also believe > that the deception continued even after Mozilla directly asked WoSign about > this. WoSign has lost my confidence in their ability and intention to follow > Mozilla's policies. Therefore, I think we should respond similarly to WoSign > as we did to CNNIC [1][2]. Unfortunately, the number of certificates and the > timescales involved are such that we prefer not to create a list of the > domains for which previously-issued certs that chain up to the Affected Roots > may continue to be trusted, so our approach will be a little different, as > Gerv previously described[3]. > > Within this message, the term “Affected Roots” applies to the following 7 > root certificates. > > 1) Subject: CN=CA 沃通根证书, OU=null, O=WoSign CA Limited, C=CN > Certificate Serial Number: 50706bcdd813fc1b4e3b3372d211488d > SHA-1 Fingerprint > 16:32:47:8D:89:F9:21:3A:92:00:85:63:F5:A4:A7:D3:12:40:8A:D6 > SHA-256 Fingerprint > D6:F0:34:BD:94:AA:23:3F:02:97:EC:A4:24:5B:28:39:73:E4:47:AA:59:0F:31:0C:77:F4:8F:DF:83:11:22:54 > > 2) Subject: CN=Certification Authority of WoSign, OU=null, O=WoSign CA > Limited, C=CN > Certificate Serial Number: 5e68d61171946350560068f33ec9c591 > SHA-1 Fingerprint > B9:42:94:BF:91:EA:8F:B6:4B:E6:10:97:C7:FB:00:13:59:B6:76:CB > SHA-256 Fingerprint > 4B:22:D5:A6:AE:C9:9F:3C:DB:79:AA:5E:C0:68:38:47:9C:D5:EC:BA:71:64:F7:F2:2D:C1:D6:5F:63:D8:57:08 > > 3) Subject: CN=Certification Authority of WoSign G2, OU=null, O=WoSign CA > Limited, C=CN > Certificate Serial Number: 6b25da8a889d7cbc0f05b3b17a614544 > SHA-1 Fingerprint > FB:ED:DC:90:65:B7:27:20:37:BC:55:0C:9C:56:DE:BB:F2:78:94:E1 > SHA-256 Fingerprint > D4:87:A5:6F:83:B0:74:82:E8:5E:96:33:94:C1:EC:C2:C9:E5:1D:09:03:EE:94:6B:02:C3:01:58:1E:D9:9E:16 > > 4) Subject: CN=CA WoSign ECC Root, OU=null, O=WoSign CA Limited, C=CN > Certificate Serial Number: 684a5870806bf08f02faf6dee8b09090 > SHA-1 Fingerprint > D2:7A:D2:BE:ED:94:C0:A1:3C:C7:25:21:EA:5D:71:BE:81:19:F3:2B > SHA-256 Fingerprint > 8B:45:DA:1C:06:F7:91:EB:0C:AB:F2:6B:E5:88:F5:FB:23:16:5C:2E:61:4B:F8:85:56:2D:0D:CE:50:B2:9B:02 > > 5) Subject: CN=StartCom Certification Authority, OU=Secure Digital > Certificate Signing, O=StartCom Ltd., C=IL > Certificate Serial Number: 01 > SHA-1 Fingerprint > 3E:2B:F7:F2:03:1B:96:F3:8C:E6:C4:D8:A8:5D:3E:2D:58:47:6A:0F > SHA-256 Fingerprint > C7:66:A9:BE:F2:D4:07:1C:86:3A:31:AA:49:20:E8:13:B2:D1:98:60:8C:B7:B7:CF:E2:11:43:B8:36:DF:09:EA > > 6) Subject: CN=StartCom Certification Authority, OU=Secure Digital > Certificate Signing, O=StartCom Ltd., C=IL > Certificate Serial Number: 2d > SHA-1 Fingerprint > A3:F1:33:3F:E2:42:BF:CF:C5:D1:4E:8F:39:42:98:40:68:10:D1:A0 > SHA-256 Fingerprint > E1:78:90:EE:09:A3:FB:F4:F4:8B:9C:41:4A:17:D6:37:B7:A5:06:47:E9:BC:75:23:22:72:7F:CC:17:42:A9:11 > > 7) Subject: CN=StartCom Certification Authority G2, OU=null, O=StartCom Ltd., > C=IL > Certificate Serial Number: 3b > SHA-1 Fingerprint > 31:F1:FD:68:22:63:20:EE:C6:3B:3F:9D:EA:4A:3E:53:7C:7C:39:17 > SHA-256 Fingerprint > C7:BA:65:67:DE:93:A7:98:AE:1F:AA:79:1E:71:2D:37:8F:AE:1F:93:C4:39:7F:EA:44:1B:B7:CB:E6:FD:59:95 > > I intend to move forward as follows, unless further information or input > causes me to rethink this plan. Therefore, I will continue to appreciate your > input, and this discussion is still open. > > Mozilla will perform the following 4 actions. I have filed Bugzilla Bug > #1309707 to track the engineering work for this. Please keep discussion here > in mozilla.dev.security.policy, and not in the bug. > > 1) Distrust certificates chaining up to Affected Roots with a notBefore date > after October 21, 2016. If additional back-dating is discovered (by any > means) to circumvent this control, then Mozilla will immediately and > permanently revoke trust in the Affected Roots. > -- This change will go into the Firefox 51 release train [4]. > -- The code will use the subject key id (hash of public key) to identify the > Affected Roots, so that the control will also apply to cross-certs of the > Affected Roots. > 2) Add the previously identified backdated SHA-1 certs chaining up to the > Affected Roots to OneCRL. > 3) No longer accept audits carried out by Ernst & Young Hong Kong. > 4) Remove the Affected Roots from NSS after the SSL certificates issued > before October 1, 2016, have expired or have been replaced. > > WoSign may apply for inclusion of new (replacement) root certificates > following Mozilla's normal root inclusion/change process (minus waiting in > the queue for the discussion), after they have completed all of the following > action items, and no earlier than June 1, 2017. If StartCom is able to > provide proof enough to convince the Mozilla community in the > mozilla.dev.security.policy forum that WoSign has no control (people or code) > over StartCom, then StartCom may re-apply for inclusion earlier, as soon as > the following action items are completed. > > 1. Provide a list of changes that the CA plans to implement to ensure that > there are no future violations of Mozilla Policy and the Baseline > Requirements. > > 2. Implement the changes, and update their CP/CPS to fully document their > improved processes. The CP/CPS must explicitly state that it is prohibited to > backdate the notBefore of certificates by more than one day. > > 3. Provide a public-facing attestation from a Licensed WebTrust > Practitioner[5] other than EY Hong Kong that the changes have been made. > This audit may be part of an annual WebTrust CA audit. > > 4. Provide auditor attestation that a full performance audit has been > performed confirming compliance with the CA/Browser Forum's Baseline > Requirements[6]. This audit may be part of an annual WebTrust BR audit. It > must include a full security audit of the CA’s issuing infrastructure. > > 5. 100% embedded CT for all issued certificates, with embedded SCTs from at > least one Google and one non-Google log not controlled by the CA. > > Notes: > * The new (replacement) root certificates may be cross-signed by the Affected > Roots. However, the Affected Roots may *not* be cross-signed by the new > (replacement) root certificates, because that would bring the concerns about > the Affected Roots into the scope of the new roots. > * Mozilla's root inclusion/change process includes checking that certificates > in the CA hierarchy comply with the CA/Browser Forum's Baseline Requirements. > > Please let me know if I’ve missed anything. > > Thanks, > Kathleen > > [1] > https://blog.mozilla.org/security/2015/04/02/distrusting-new-cnnic-certificates/ > [2] https://bugzilla.mozilla.org/show_bug.cgi?id=1177209 > [3] > https://docs.google.com/document/d/1C6BlmbeQfn4a9zydVi2UvjBGv6szuSB4sMYUcVrR8vQ/edit# > [4] https://wiki.mozilla.org/RapidRelease/Calendar > [5] > http://www.webtrust.org/licensed-webtrust-practitioners-international/item64419.aspx > [6] https://wiki.mozilla.org/CA:BaselineRequirements _______________________________________________ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy