Thorsten Glaser skrev 2014-04-10 17:48:
> Pontus Engblom | DigiSSL AB dixit:
> 
>> Now they do not charge the certificate in anyway for revocation, it's
>> merely a handling fee, i.e the guys that work there need to get paid
>> to do their job.
> 
> I do not disagree with people needing to get their money.
> I’d happily pay 5 € for certificates, and possibly a handling
> fee for a revocation “on my whim”, but not acting in the face
> of a security breach like this one is inacceptable (and, as
> Rob Stradling pointed out, a violation of their obligations).
> 
Yes, I can agree the timing of this is bad, but a company have its
policies to follow, if they have a fee for revocation it's quite hard to
step away from it. Now when we know the extent of this bug we can just
wait and see what happends, but as you mention further down, the best
way would be to either reboot the system or either do something and try
to implement a new system.

>> I can agree that some certificates _MIGHT_ be compromised and need
> 
> No. We must assume that all private keys ever used in vulnerable
> systems have been compromised; there is evidence that this has
> been exploited as early as November 2013.
> 
I do agree with you that its been around for a while and that we should
treat every system compromised that had thoose vulnerabilities. But I
know plenty of people that just upgraded their OpenSSL and restarted
apache and think their good. Also alot of thoose systems are extremely
lowlevel traffic or no traffic domains either. I'm just pointing out
that if all CAs were to remove ALL suspected compromised certs (which
would require alot of time and effort to track down all systems that the
admin doesnt know about this), there would be no Class 1 certificates
left untouched, every single Class 1 cert should in that case be
revocated. And this can cause a bit of a problem on alot of websites.
>> revocation, but as StartSSL stated earlier, if you got no intention of
>> paying $24.90 you could also create a _NEW_ certificate with a
>> different subdomain and replace yours, that would cost you.. nothing?
> 
> This would help absolutely nobody because the attacker *still*
> can use the private key (which they stole from you) and the
> StartCom-signed certificate (which they get during the handshake
> anyway) to do an MITM attack on your visitors, with StartCom
> saying that the MITM attacker is “the genuine thing”.
> 
> The only option is, for example, if you have www.foo.org as
> StartCom certificate, to remove A and AAAA records for both
> www.foo.org. and foo.org. from the DNS, and get a certificate
> for www2.foo.org – good luck getting any traffic there. And
> even then, an attacker can just redirect their target’s DNS,
> making the attack once again successful.
> 
> No, no matter what, those StartCom/StartSSL-issued certificates
> *must* be revoked, or StartCom/StartSSL *must* be removed from
> the trusted root store, no later than this Friday.
> 
This assumes that the domain has been targeted yes and that a evil
person would want to harm users using that domain yes.

If we go in an event like this, it's not actually the CAs fault, neither
the system administrators fault, this was a bug. Who should we really blame?

If we are to blame the CA for not revocating, why aren't there a
proposal for a explicit policy that forces CAs to remove certs that
users ask for, but it's up to the CA to then either charge the client
for a new certificate or not do business with that client.

I am not really sure about this, but I never said that I support not
revocating, all I say is that this is one way for StartSSL to actually
earn some income. Which I must say can not be easy when everyone just
want the stuff for free and not pay at all for security.

>> But I can not for the life of me see why we can't pay $24.90, they
>> have given us a service for free and now when we need to do something
>> we think its wrong of them to charge us? Compare it to the real world,
> 
> It’s an obligation. CAs have an oligopoly and as such, they have
> certain social responsibilities, for the good of the SSL ecosy-
> stem as a whole.
> 
Yes, they have no obligation to give us free certificates either. They
could start charging us like any other CA, that would just end up in
lots of unsecured domains. Most people that holds a Class 1 I doubt
would want to pay for SSL, at the current price ranges, but what do I know.

>> have been compromised but theres a possibility, in this case there is
>> no way to get reasonable evidence of a subscriber loosing its private
>> key. And to suspect every cert has been compromised well, then all CAs
>> would need to make a huge CRL and pretty much revoke any certificate
> 
> Yes. (It would probably be easier to reboot the system…) But for all
> we know, they need to act.
> 
> (Note that I am currently running a StartCom certificate that was
> never compromised (due to only using OpenSSL 0.x) on one system,
> a compromised one (which they refuse to revoke) on another system,
> and a healthy mix of GoDaddy-rekeyed ones on most other systems.)
> 
I am not defending any actions by anyone here, I just pointed out that
this is a business model of StartSSL to survive as a company. What if
they would go bankrupt for not getting any income at all? Then what?
Now I do think they got their revenue stream under control but, a
company cost, servers cost, facilities cost, audits cost. Somewhere you
need to get that money, now this is a ill place I agree but hopefully
Mozilla and StartCom could come to a meeting point in this matter.

>>> If the servers in your SSL environment do not use OpenSSL, if your
>> servers
>>> use OpenSSL 1.0.0 or earlier, if your servers do not use OpenSSL 
>>> 1.0.2-beta1, or if your servers are compiled without the heartbeat
>> extension
>>> enabled, then your environment is not vulnerable to the Heartbleed
>>> Bug attack.
> 
> Right, there’s still two years of certificates, and a stable release
> of Debian, two releases of OpenBSD, and other OSes, to cover. Since
> responsible admins would contact StartCom and ask for rekey/revoke
> Right Now™ (or after getting back from vacation, i.e. this month,
> probably), it would not be bad for them to waive their fees this
> month to people citing this vulnerability. Just revoking *every*
> certificate is probably a bit too much.
> 
> The important thing is to do that *right now*, and issue a statement
> that they accept their responsibility for the ecosystem and will
> waive fees for everyone affected. (I fully understand they will
> want handling fees for “at-will” revocals normally. But this is
> an exceptional situation!)
> 
I have to agree to that, but normally a Class 1 certificate has a
lifespan of 1 year, which means that StartSSL should have a year of
certificates to revoke, this can brake alot of websites.


>> cost. IMHO this removing of StartCom is just bogus. Maybe that Mozilla
> 
> Are you speaking for DigiSSL AB here, or just privately?
> 
> bye,
> //mirabilos
> 

I am speaking for myself. The DigiSSL isn't anything active or current,
its just a domain I use for mailing but no business from.

-- 
Sincerely,

*Pontus Engblom*
[email protected] <mailto:[email protected]>

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to