It's so not ture. I am sure this misuse is not intentional. Actually the MCSHolding is contact CNNIC first early in the 2015. After dicussion, we signed agreement to issue a 2 weeks intermediate root for testing propose.
And we take action to revoke the intermediate root as soon as we received report from Microsoft and Apple, and strongly request MCS to provide sealed and signed offcially report(attached). And I sent the incident report include whole timeline of this case to Kathleen intiatively to avoid more harmful result of the misused cert. So this is absolutely not a intentional issue. Our Webtrust Audit will start soon in April, we surely will take action to improve security management and dicussed with audit team(Ernst & Young) if we decide to have external intermediate Root authorization in the future. CC to Amr from MCS HOLDING. Regards, An Yin -----邮件原件----- 发件人: [email protected] [mailto:[email protected]] 代表 David E. Ross 发送时间: 2015年3月24日 10:23 收件人: [email protected] 主题: Re: Consequences of mis-issuance under CNNIC On 3/23/2015 5:59 PM, Peter Kurrasch wrote: > Hi Richard, > > Is the proposal to limit CNNIC roots to only .cn domains or would others be allowed? > > I'm curious to know what CNNIC's perspective is on this proposal, so will a representative be replying in this forum? > > Thanks. > > Original Message > From: Richard Barnes > Sent: Monday, March 23, 2015 5:48 PM > To: [email protected] > Subject: Consequences of mis-issuance under CNNIC > > Dear dev.security.policy, > > It has been discovered that an intermediate CA under the CNNIC root > has mis-issued certificates for some Google domains. Full details can > be found in blog posts by Google [0] and Mozilla [1]. We would like to > discuss what further action might be necessary in order to maintain > the integrity of the Mozilla root program, and the safety of its users. > > There have been incidents of this character before. When ANSSI issued > an intermediate that was used for MitM, name constraints were added to > limit its scope to French government domains. When TurkTrust > mis-issued intermediate certificates, they changed their procedures > and then they were required to be re-audited in order to confirm their > adherence to those procedures. > > We propose to add name constraints to the CNNIC root in NSS to > minimize the impact of any future mis-issuance incidents. The “update > procedures and re-audit” approach taken with TurkTrust is not suitable for this scenario. > Because the mis-issuance was done by a customer of CNNIC, it’s not > clear that updates to CNNIC’s procedures would address the risks that > led to this mis-issuance. We will follow up this post soon with a > specific list of proposed constraints. > > Please send comments to this mailing list. We would like to have a > final plan by around 1 April. > > Thanks, > --Richard > > [0] > http://googleonlinesecurity.blogspot.com/2015/03/maintaining-digital-c > ertificate-security.html > [1] > https://blog.mozilla.org/security/2015/03/23/revoking-trust-in-one-cnn > ic-intermediate-certificate/ > _______________________________________________ > dev-security-policy mailing list > [email protected] > https://lists.mozilla.org/listinfo/dev-security-policy > What assurance is there that the mis-issued certificates were not intentional. The approval of the CNNIC was quite controversial. Assertions were made that CNNIC is actually an agent of the Chinese military. -- David E. Ross I am sticking with SeaMonkey 2.26.1 until saved passwords can be used when autocomplete=off. See <https://bugzilla.mozilla.org/show_bug.cgi?id=433238>. _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

