Yeah, their entire website is designed and implemented by someone in China. See 
my analysis here 
http://www.percya.com/2016/09/startcom-operated-solely-in-china.html

On Thursday, August 25, 2016 at 10:11:21 AM UTC-7, rugk wrote:
> Hi,
> I stumbled across this service by StartCom: 
> https://startssl.com/StartPKI (archive link: https://archive.is/GRkAK)
> I got a bit afraid when looking at their nice screenshots 
> (https://archive.is/GRkAK#75%), because they offer intermediate 
> certificates for companies allowing them to issue certificates by 
> themself.
> 
> So I checked their site to find out what this is about.
> The certs are "Trusted by all browsers" 
> (https://archive.is/GRkAK#selection-419.0-419.23).
> So I thought in this case they (StartCom) need to control the process, 
> especially as they allow EV certs to be issued.
> However here is what they state on their website: "StartPKI, let you 
> control your SSL certificate life cycle management by yourself, not by 
> the CA!" (https://archive.is/GRkAK#selection-517.0-517.96)
> This does rather sound as if the company would have a web interface 
> where they can issue certificates like they want...
> 
> So I thought they at least keep the private key on their servers/HSMs. 
> However they mention "FIPS 140 Luna G5 HSM Secured" under "Setup your 
> name issuing CA" (https://archive.is/GRkAK#selection-619.0-631.24), so 
> does this indicate the companies have to setup a HSM? If so, for what if 
> it is not the private key of the intermediate?
> On the other hand they say it you need no "No PKI infrastructure 
> Investment" (https://archive.is/GRkAK#selection-449.0-449.32), but the 
> "All controlled by yourself" 
> (https://archive.is/GRkAK#selection-673.0-673.26) is not a very 
> appeasing statement when it comes to who can issue certificates.
> Also they say you can "Issue certificates instantly" 
> (https://archive.is/GRkAK#selection-425.0-425.28) (for free) I am 
> wondering how this can work for EV certificates.
> 
> On their news page (https://startssl.com/NewsDetails?date=20160428) they 
> say the intermediate CA is "for the exclusive use of the verified 
> organization". But how can they enforce this?
> At least they say that "the intermediate CA will be provided by 
> StartCom's [...] infrastructure", so it seems they keep the intermediate 
> themself.
> 
> So at least they keep the private key. However this still does not 
> answer the question how they control the certificates issued by this 
> intermediate - especially when it comes to EV certificates.
> It is also unclear what kind of verification is made when a company 
> issues a certificate with their own intermediate.
> 
> Also note that there is a difference to StartResell. On their hompage 
> (https://startssl.com/NewsDetails?date=20160530) they also state, that 
> resellers have their own intermediate certificate.
> However there they seem to do the verification by themself and "charge 
> the end user identity validation". This obviously does not happen for 
> StartPKI...
> As StartPKI is "Ready to use in 3 days" 
> (https://archive.is/GRkAK#selection-413.0-413.22) I doubt that they can 
> trust all companies they issue intermediates for to do sane 
> verification.
> 
> The service is all in all quite questionable and statements like "All 
> controlled by yourself" are horrible to hear. I hope this statement is 
> just wrong and they somehow keep control.
> 
> Best regards,
> rugk
> 
> -- 
> I offer PGP support. To send me a PGP-encrypted mail, please ask for my 
> private mail address.

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to