Hi,
I stumbled across this service by StartCom: https://startssl.com/StartPKI (archive link: https://archive.is/GRkAK) I got a bit afraid when looking at their nice screenshots (https://archive.is/GRkAK#75%), because they offer intermediate certificates for companies allowing them to issue certificates by themself.

So I checked their site to find out what this is about.
The certs are "Trusted by all browsers" (https://archive.is/GRkAK#selection-419.0-419.23). So I thought in this case they (StartCom) need to control the process, especially as they allow EV certs to be issued. However here is what they state on their website: "StartPKI, let you control your SSL certificate life cycle management by yourself, not by the CA!" (https://archive.is/GRkAK#selection-517.0-517.96) This does rather sound as if the company would have a web interface where they can issue certificates like they want...

So I thought they at least keep the private key on their servers/HSMs. However they mention "FIPS 140 Luna G5 HSM Secured" under "Setup your name issuing CA" (https://archive.is/GRkAK#selection-619.0-631.24), so does this indicate the companies have to setup a HSM? If so, for what if it is not the private key of the intermediate? On the other hand they say it you need no "No PKI infrastructure Investment" (https://archive.is/GRkAK#selection-449.0-449.32), but the "All controlled by yourself" (https://archive.is/GRkAK#selection-673.0-673.26) is not a very appeasing statement when it comes to who can issue certificates. Also they say you can "Issue certificates instantly" (https://archive.is/GRkAK#selection-425.0-425.28) (for free) I am wondering how this can work for EV certificates.

On their news page (https://startssl.com/NewsDetails?date=20160428) they say the intermediate CA is "for the exclusive use of the verified organization". But how can they enforce this? At least they say that "the intermediate CA will be provided by StartCom's [...] infrastructure", so it seems they keep the intermediate themself.

So at least they keep the private key. However this still does not answer the question how they control the certificates issued by this intermediate - especially when it comes to EV certificates. It is also unclear what kind of verification is made when a company issues a certificate with their own intermediate.

Also note that there is a difference to StartResell. On their hompage (https://startssl.com/NewsDetails?date=20160530) they also state, that resellers have their own intermediate certificate. However there they seem to do the verification by themself and "charge the end user identity validation". This obviously does not happen for StartPKI... As StartPKI is "Ready to use in 3 days" (https://archive.is/GRkAK#selection-413.0-413.22) I doubt that they can trust all companies they issue intermediates for to do sane verification.

The service is all in all quite questionable and statements like "All controlled by yourself" are horrible to hear. I hope this statement is just wrong and they somehow keep control.

Best regards,
rugk

--
I offer PGP support. To send me a PGP-encrypted mail, please ask for my private mail address.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to