On 15/10/15 10:54, Rob Stradling wrote:
> Rick, your report [1] states that...
> 
>    "...the certificates never left Symantec's secure test labs or the

A charitable reading of this might be "the private keys never left...".
But yes, it might help to have more details on what exactly is being
claimed here.

>     QA test machine, and they were never visible to any end user...
>     One of these test certificates with a CN=www.google.com was an
>     Extended Validation (EV) test certificate and was logged to public
>     Certificate Transparency (CT) log servers"
> 
> IIUC, this statement claims that, out of all the certs/precerts listed
> in [2], the www.google.com precertificate [3] is the only one that "left
> Symantec's secure test labs".

It would be helpful to know if the test certificate generation software
logged the certs it generated to CT. If so, would we not expect more of
them to be there? If not, how did some of them end up there? Were they
placed there manually as part of the test?

>   - an EV cert for 123Symantec.com - see [6].

Note that that cert has a SAN for "san2.com", which is a domain owned by
someone other than Symantec.

> Also, when I looked for evidence of any of the other certs in [2] in
> some of our historical SSL crawler logs, I was surprised to find that...

These findings are indeed surprising, although it seems more likely that
there are problems with Symantec's list than threats to the CA system.
Previous Symantec test certs I've seen have had Symantec in the O field,
which is not true for these.

Rick: how are you determining which certs to add to your list? Are the
ones Rob has found in the wild mistaken additions, or were they in fact
test certs which were supposed not to leave the lab?

Gerv
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to