On 04/24/2014 05:04 AM, Radu Hociung wrote:
On Wednesday, April 23, 2014 6:00:41 PM UTC-4, Eddy Nigg wrote:

I do have a few questions to you! How can you know that a site using a
certificate from ANY CA isn't or wasn't affected by the Heartbleed bug?
I'm planning on a more thorough answer that cross references the SSL 
observatory data from 2010 with a fresh update, and with published CRLs. One 
would expect that each CA would have about 17% of their issued certificates be 
revoked and re-keyed due to heartbleed. In a day or two I should have some 
stats.

Don't waste your time, I'll help you....: https://isc.sans.edu/crls.html

Now, using current data from Netcraft which I'm not really allowed to publish shows StartCom with slightly above 100,000 certificates. Without leaking any more data from Netcraft I can tell you that the revocation rate of StartSSL is in fact higher than any other CA except GlobalSign, but their situation is unique (and maybe also problematic due to the CRL size).

Assuming that 17% of all certificates were affected by teh bug you can see easily that about 1.5% of all certificates were revoked in average excluding GlobalSign. StartCom's revocations is currently slightly short of 2%, above average.

It also means that in average there are still 15.5% of certificates that might be affected and still not revoked, assuming none of them expired. Not that I believe that those keys in fact have been compromised, but applying your logic there are a bunch of CAs you probably should disable now.

--
Regards
Signer:         Eddy Nigg, COO/CTO
        StartCom Ltd. <http://www.startcom.org>
XMPP:   [email protected] <xmpp:[email protected]>
Blog:   Join the Revolution! <http://blog.startcom.org>
Twitter:        Follow Me <http://twitter.com/eddy_nigg>

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to