We can separate the 2015 incident from 2016, and separate report incident from 
un-reported, then all clear:



In 2015 reported:

Incident -2: 16 January 2015 - 5 March 2015 - 1,132 BR-violating SHA-1 
certificates

Incident X:  April 9 - April 14, 2015 - 392 duplicate serial numbers



In 2015 un-reported:

Incident -1: April 4, 2015 - WoSign is informed it's routinely violating its 
CPS for issued certificates.

Incident 0: April 23, 2015 - 72 potentially dangerous port-validated 
certificates

Incident 1: June, 2015 - 33 unvalidated base-domain from sub-domain certificates



In 2016 un-reported:

Incident 2: July, 2016 - At least 1 backdated SHA-1 certificate

We give Google detail information after receiving your email instantly, and we 
also replied Mozilla email instantly that all details are reported to Bugzilla: 
https://bugzilla.mozilla.org/show_bug.cgi?id=1293366



I said " Yes, we are improved", you can see from the timeline that from June 
2015 to July 2016, over one-year period that we don't have any incident, this 
means we fixed system bug in time and do more validation and check, we blocked 
many illegal order for famous domains.





Best Regards,



Richard



-----Original Message-----

From: Ryan Sleevi [mailto:[email protected]]

Sent: Friday, September 2, 2016 12:01 AM

To: Richard Wang <[email protected]<mailto:[email protected]>>

Cc: 
[email protected]<mailto:[email protected]>

Subject: Re: Incidents involving the CA WoSign



On Wed, August 31, 2016 10:09 pm, Richard Wang wrote:

>  Thanks for your so detail instruction.

>  Yes, we are improved. The two case is happened in 2015 and the

> mis-issued  certificate period is only 5 months that we fixed 3 big

> bugs during the 5  months.

>  For CT, we will improve the posting system.



I had a little trouble parsing this, but let's make sure we're on the same 
page. I've continued Gerv's original numbering:



Incident -2: 16 January 2015 - 5 March 2015 - 1,132 BR-violating SHA-1 
certificates ( https://cert.webtrust.org/SealFile?seal=2019&file=pdf )

Incident -1: April 4, 2015 - WoSign is informed it's routinely violating its 
CPS for issued certificates ( 
https://www.wosign.com/policy/wosign-policy-1-2-10.pdf )

Incident X: April 9 - April 14, 2015 - 392 duplicate serial numbers

Incident 0: April 23, 2015 - 72 potentially dangerous port-validated 
certificates

Incident 1: June, 2015 - 33 unvalidated base-domain from sub-domain certificates

Incident 2: July, 2016 - At least 1 backdated SHA-1 certificate (was this the 
only one? I wasn't clear from 
https://groups.google.com/d/msg/mozilla.dev.security.policy/k9PBmyLCi8I/gksYkOTLCwAJ

)



Just making sure we're in agreement about the facts and timelines surrounding 
these, so that it's easier than debating 2 or 3 or 5 or more.




_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to