Sebastien,

I apologize, but I don’t follow the issue.  What flaw are you reporting?  Can 
you describe in detail the problem?

Also, if you think that this is not a publicly known issue, please see 
https://www.mozilla.org/en-US/security/#For_Developers 
<https://www.mozilla.org/en-US/security/#For_Developers>

Thanks,
Peter

> On Sep 11, 2015, at 3:18 PM, Sebastien Bigras <[email protected]> wrote:
> 
> Ive been working on a very large forensic case in US/Canada and Ive pin 
> pointed a major issue...There are people exploiting this flaw...Ive seen lots 
> of these bad certificates that shows up as good and are used to proxy data...
> 
> Youve probable seen the ATP group using satellites...
> 
> They also use the Microsoft Sysinternal tools like psexec and others to sign 
> their drivers because these tools are already signed by Microsoft...
> 
> Ive seen a bot searching for DNSSEC non secure attributes. Most of the 
> organizations have secured downstream, but not upstream...so they exploit any 
> non secure attributes on top of them. Then leverage cross-side 
> scripting/cookie injection so the referrer is the good site but the real 
> access goes to the other site above (usually malicious..)
> 
> Check facebook --> http://dnsviz.net/d/facebook.com/dnssec/ 
> 
> After they find a registrar for .com domains and can register 
> zzzz.com.facebook.com
> 
> https://pir.org/products/find-a-registrar/ 
> 
> I used your crt.sh tool and found many...
> 
> https://crt.sh/?q=1E%3ABD%3A89%3A4C%3A76%3A9F%3A24%3A84%3AF5%3A39%3A0F%3A24%3AF3%3A10%3A9E%3AB6%3A62%3A6F%3A75%3AE2
> 
> Subject:
>            commonName                = *.opensrs.com
>            organizationalUnitName    = Operations
>            organizationName          = Tucows.com Co.
>            localityName              = Toronto
>            stateOrProvinceName       = Ontario
>            countryName               = CA
> 
> If you also take in consideration your file here 
> http://data.iana.org/TLD/tlds-alpha-by-domain.txt
> 
> This one below is really bad for all OWA Outlook Web Access sites on 
> internet...Many, many use webmail has the name like webmail.company.com. 
> 
> processing ../certs/12.x.x.x/12.x.x.143/12.41.18.143.results
> Violations: storemail,webmail
> Valid: Yes
> Root:  C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=Terms of use at 
> https://www.verisign.com/rpa (c)06, CN=VeriSign Class 3 Extended Validation 
> SSL SGC CA

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to