On Wednesday, August 17, 2016 at 2:53:24 AM UTC+8, Kathleen Wilson wrote: > All, > > It has come to our attention that Hongkong Post has recently issued a > SHA1 cert that can be used in TLS/SSL. > > https://bugzilla.mozilla.org/show_bug.cgi?id=1267332#c3 > > The certificate was signed by the "Hongkong Post e-Cert CA 1 - 10" > intermediate certificate. > > From the CA: "This certificate is issued to a person, instead of a > server, as you've seen that it does not contain any DNS name. "Hongkong > Post e-Cert CA 1 - 10" will continue issue client certificates to > individuals, although it has been stopped issuing SSL server > certificates since 1 January 2016. > > Our understanding: "The real problem here is that the issuing > certificate is using sha-1 with predictable serial numbers. ... If a > chosen-prefix attack on sha-1 were discovered... an attacker could use > this CA to obtain a certificate for a domain that isn't theirs." > > We are looking into this, and as always will greatly appreciate data > that folks have that will aid in assessing this situation. > > Thanks, > Kathleen
We have already stopped issuing SHA-1 SSL certificates under "Hongkong Post e-Cert CA 1 - 10" since 1 January 2016, and have been issuing SHA-256 SSL certificates under "Hongkong Post e-Cert CA 1- 14" and "Hongkong Post e-Cert CA 1 - 15" respectively (https://bugzilla.mozilla.org/show_bug.cgi?id=1267332#c2). This certificate is a client certificate issued to a person for private use such as digital signature and encryption of electronic messages, but not for SSL server communication. We are contacting the subscriber to confirm why and how he/she uses that certificate in a server of https://gps.autotoll-gps.com.hk. Once we confirmed that he/she mis-used the certificate, we will revoke this certificate. _______________________________________________ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy