On 15/10/15 00:04, Rick Andrews wrote:
On Tuesday, October 13, 2015 at 5:16:10 PM UTC-7, Charles Reiss wrote:
<snip>
This list of test certs for owned domains contains an entry for
a cert with serial number 0xc222a issued by RapidSSL CA, valid from 05/18/2013
22:27:16 GMT to 06/20/2015 13:57:13 GMT (last entry of the owned domains PDF).
This appears to be this certificate https://crt.sh/?id=1990400 which has:
<snip>
Thanks for your post.

Symantec does not own the icns.com.au domain, but we had authorization by the 
domain owner to use the domain for testing. This icns.com.au test certificate 
was properly authenticated, and was installed and used externally by the domain 
owner.

We included this certificate on our list of certificates associated with 
domains that we do not own, which is accurate. However, because we had 
authorization from the domain owner to issue the certificate, this certificate 
did not need to be on this list but was included for completeness.

Hi Rick.

Doesn't "installed and used externally" conflict with the following statement from your report [1] (emphasis mine) ?
  "Through a comprehensive internal review, we confirmed this incident
   was limited only to the issuance of test certificates, which *at all
   times were fully controlled within Symantec* and never posed any
   threat to any user or organization."

BTW, [2] also lists another, older certificate for the same domain - *.icns.com.au:
https://crt.sh/?id=658905


[1] https://www-secure.symantec.com/connect/sites/default/files/Test_Certificates_Incident_Final_Report_10_13_2015v3.pdf

[2] https://www-secure.symantec.com/connect/sites/default/files/TestCertificateIncidentReportOwnedDomains.pdf

--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to