-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Walter Goulet skrev 2014-04-10 15:59:> On Thursday, April 10, 2014
4:10:58 AM UTC-5, Kaspar Janßen wrote:
>> On 10/04/14 10:08, Peter Eckersley wrote:
>> 
>> <snip>
>> 
>> The key is that anybody should be able to shout out "don't trust
>> me
>> 
>> anymore!" without a fee. Isn't that part of the trustchain idea?
>> 
>> <snip>
>> 
>> Kaspar
> 
> Hi Kaspar,
> 
> Your message is very timely; I have a domain I own using a
> StartSSL
Class 1 certificate that I was planning on requesting revocation for
due to Heartbleed. I had no idea that I had to pay for revocation
either; in my mind this changes the entire value proposition of their
offering. I personally have not yet decided if I will indeed revoke,
but I will be dropping a line to them to inform them that this
'revocation fee' should clearly be stated on their website and that
their 'free' Class 1 certificate is not actually free if you need to
pay for security controls like revocation!
> 
> Walter _______________________________________________

Hi there Walter,
I would like to inform you that when you get a service you tend to
read the FAQs and Certificate Policy Statements, i.e StartSSL have a
FAQ where a whole bunch of numbers concern revocation and handling fees.
http://www.startssl.com/?app=25#72
(#70 to #74). So please do not claim they do not clearly state it,
either you didn't read or didn't care to read.

Now they do not charge the certificate in anyway for revocation, it's
merely a handling fee, i.e the guys that work there need to get paid
to do their job.

I can agree that some certificates _MIGHT_ be compromised and need
revocation, but as StartSSL stated earlier, if you got no intention of
paying $24.90 you could also create a _NEW_ certificate with a
different subdomain and replace yours, that would cost you.. nothing?
https://bugzilla.mozilla.org/show_bug.cgi?id=994033#c4

But I can not for the life of me see why we can't pay $24.90, they
have given us a service for free and now when we need to do something
we think its wrong of them to charge us? Compare it to the real world,
companies must make money somehow its just a question of how and where.
A good point of this is by Marcus Sundberg in the bug #994033,
https://bugzilla.mozilla.org/show_bug.cgi?id=994033#c23

Also this is issue is quite hard to handle, it is unknown how many
certs that actually have been compromised since it's not traceable.

As Rob Stradling said;

> The Mozilla CA Certificate Maintenance Policy (Version 2.2) [1]
> says
(emphasis mine):
> 
> "CAs _must revoke_ Certificates that they have issued upon the
occurrence of any of the following events:
> ... - the CA obtains _reasonable evidence_ that the subscriber’s
private key (corresponding to the public key in the certificate) has
been compromised or is _suspected of compromise_ (e.g. Debian weak keys)"

This is a bit of an issue here, we don't know whom might have been
targeted with this bug, I find it hard that low traffic domains could
have been compromised but theres a possibility, in this case there is
no way to get reasonable evidence of a subscriber loosing its private
key. And to suspect every cert has been compromised well, then all CAs
would need to make a huge CRL and pretty much revoke any certificate
that's been active during this incident, as all might be suspected of
compromise.

- From the cabfpub;
> Heartbleed Bug Impact
> 
> If the servers in your SSL environment do not use OpenSSL, if your
servers
> use OpenSSL 1.0.0 or earlier, if your servers do not use OpenSSL 
> 1.0.2-beta1, or if your servers are compiled without the heartbeat
extension
> enabled, then your environment is not vulnerable to the Heartbleed
> Bug attack.
> 
> However, if your servers are running an OpenSSL version 1.0.1
through 1.0.1f
> with the heartbeat extension enabled, then your environment is
vulnerable to
> a Heartbleed Bug attack. Although no Heartbleed Bug attacks have
> been documented, it is impossible to know if the Heartbleed Bug
vulnerability has
> been exploited because the attack does not leave a trace.

To actually have a chance here as a CA you would need to contact every
certificate holder and get their SSL environment. Most servers usually
run on older versions, for instance Debian squeeze have OpenSSL 0.9.8o.
Therefor it's hard to say how many have been impacted, how many that
has been targeted and what the next step would be.

But as a end here, try to get a new certificate for a new subdomain if
you can not pay $25. Or actually start to pay for SSL from the first
place? I mean, nothing is really free in the world, something got to
cost. IMHO this removing of StartCom is just bogus. Maybe that Mozilla
can go together and force out a policy of instant removal from clients
if they request so, but until then, they have been included, they have
given out numerous certificates and even considering removing them
from the trust store because of this is ludicrous.



- -- 
Pontus Engblom

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (MingW32)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJTRrf6AAoJEGtXimUqCrbRDTcH/1tM952lyP/x31UzgjdS511V
NI1+rWbuaTQpgS6NpKFVsHzMZtHDKcJe6zeHcvNAoU3QGe9Ws3soh2ixXedlflMZ
DlUhJbr+Tgpakf6+valaE1+Sd1PmKkU5U6+cZYGg1Y1GvZzaW6Oi3SNjovdM5s1M
FDpLT3zf7wWrgXqr2SqeLeS6bFTVZIAd/S+G8wfNVabXmirlzQwZR3lNmHIwKZGN
s1f7Nak81lmuiyMYO5GUFxo9FzbRpiuEfLCZYjvbU1plrmJ+CfPXmnyOWi15UI0D
9lV9JOOS2Y0iF44nPpJZEq9vfJhu5FRnESjwGdRM/o8eFqlk37YflPHAvOCQf+4=
=51dE
-----END PGP SIGNATURE-----
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to