Your top 10 or top 5 is not same as my top 10 or top 5.
BTW, 
Dangdang.com is using our certificate: 
https://www.ssllabs.com/ssltest/analyze.html?d=login.dangdang.com&latest

Some is also using our certificate that you don't know.


Regards,

Richard

> On 8 Sep 2016, at 23:59, Ming <[email protected]> wrote:
> 
> 在 2016年9月7日星期三 UTC+8下午6:08:33,Richard Wang写道:
>> Hi Gerv, Kathleen and Richard,
>> 
>> This discuss has been lasting two weeks, I think it is time to end it, it 
>> doesn’t worth to waste everybody’s precious time.
>> I make my confession that our system and management do have some problems 
>> which lead to the misissuance of some certificates. And I am very sorry that 
>> WoSign don’t notify all browsers after the incident happened and even after 
>> the problem fixed.
>> 
>> I’d like to give my suggestion action for Mozilla as below:
>> 1. Mozilla will trust those SSL certificates only:
>>    (1) The certificate notBefore date is before Jan. 1st 2015;
>>    (2) The certificate notBefore date is from Jan. 1st 2015 to July 4th 2016 
>> that listed in the Google CT log server;
>>    (3) The certificate notBefore date is from July 5th 2016 to Sept xx 2016 
>> that embedded SCT data in the certificate;
>>    (4) The certificate notBefore date is from Sept xx 2016 that embedded SCT 
>> data in the certificate and must have the “C=CN” in the certificate subject.
>> 
>> 2. Mozilla can assign a WebTrust auditor to WoSign office to check and 
>> inspect every incident, check every relevant issued certificate, and record 
>> a report with:  what happened, why this happened and what is being done to 
>> prevent this in the future etc., WoSign will pay the audit cost.
>> 
>> I’d like to make some supplements about 1. (4) above, this term means WoSign 
>> will only issue SSL certificates to China subscribers. 
>> WoSign issued about 120K SSL certificates for websites in China including 
>> many central government websites like MIIT and many other local province 
>> government websites, many university websites, many online banking websites, 
>> 6 of the Top 10 ecommerce websites, big supermarket online store like 
>> Walmart, 4 of the Top 5 cloud service in China, and many big companies that 
>> listed in NYSE and Nasdaq, and many subsidiaries of foreign countries big 
>> companies.
> 
> Richard,I check the  top 10 e-commerce websites in China, ONLY suning.com and 
> yhd.com are your subscribers; and ZERO of the top 5 cloud service companies 
> in China use WoSign.
> 
> I have reason to doubt the authenticity of the data you provided. 
> 
> there is the top 10 e-commerce websites in China:
> taobao.com
> jd.com
> tmall.com
> amazon.cn
> vip.com
> meituan.com
> suning.com
> dangdang.com
> jumei.com
> yhd.com
> 
> the top 5 cloud service companies in China:
> aliyun.com
> qcloud.com
> qingcloud.com
> ucloud.cn
> hwclouds.com
> 
> 
>> Those customers like to use WoSign certificate especially our support of 
>> Chinese, local support and customer service. And some of them paid up to 
>> 10-year certificate fee in advance, we need to renew their certificate for 
>> free once it is about to expire at every three years for OV SSL.
>> 
>> I wish Mozilla could accept my suggestion, and I am sure WoSign will do it 
>> better after getting this so big lesson. 
>> Thank you.
>> 
>> 
>> Best Regards,
>> 
>> Richard Wang
>> CEO
>> WoSign CA Limited
>> 
>> 
>> -----Original Message-----
>> From: dev-security-policy 
>> [mailto:[email protected]] On 
>> Behalf Of Richard Wang
>> Sent: Sunday, September 4, 2016 5:49 PM
>> To: Gervase Markham <[email protected]>; 
>> [email protected]
>> Subject: RE: Incidents involving the CA WoSign
>> 
>> Hi all,
>> 
>> We finished the investigation and released the incidents report today: 
>> https://www.wosign.com/report/wosign_incidents_report_09042016.pdf 
>> 
>> This report has 20 pages, please let me if you still have any questions, 
>> thanks.
>> 
>> This report is just for Incident 0-2, we will release a separate report for 
>> another incident X soon.
>> 
>> 
>> Best Regards,
>> 
>> Richard Wang
>> CEO
>> WoSign CA Limited
>> 
>> 
>> -----Original Message-----
>> From: Gervase Markham [mailto:[email protected]] 
>> Sent: Wednesday, August 24, 2016 9:08 PM
>> To: [email protected]
>> Cc: Richard Wang <[email protected]>
>> Subject: Incidents involving the CA WoSign
>> 
>> Dear m.d.s.policy,
>> 
>> Several incidents have come to our attention involving the CA "WoSign".
>> Mozilla is considering what action it should take in response to these 
>> incidents. This email sets out our understanding of the situation.
>> 
>> Before we begin, we note that Section 1 of the Mozilla CA Certificate 
>> Enforcement Policy[0] says: "When a serious security concern is noticed, 
>> such as a major root compromise, it should be treated as a 
>> security-sensitive bug, and the Mozilla Policy for Handling Security Bugs 
>> should be followed." It is clear to us, and appears to be clear to other CAs 
>> based on their actions, that misissuances where domain control checks have 
>> failed fall into the category of "serious security concern".
>> 
>> Incident 0
>> ----------
>> 
>> On or around April 23rd, 2015, WoSign's certificate issuance system for 
>> their free certificates allowed the applicant to choose any port for 
>> validation. Once validation had been completed, WoSign would issue 
>> certificates for that domain. A researcher was able to obtain a certificate 
>> for a university by opening a high-numbered port (>50,000) and getting 
>> WoSign to use that port for validation of control.
>> 
>> This problem was reported to Google, and thence to WoSign and resolved.
>> Mozilla only became aware of it recently.
>> 
>> * Before the recent passage of Ballot 169 in the CAB Forum, which limits the 
>> ports and paths which can be used, the Baseline Requirements said that one 
>> acceptable method of domain validation was "Having the Applicant demonstrate 
>> practical control over the FQDN by making an agreed‐upon change to 
>> information found on an online Web page identified by a uniform resource 
>> identifier containing the FQDN". This method therefore did not violate the 
>> letter of the BRs. However, Mozilla considers the basic security knowledge 
>> that ports over 1024 are unprivileged should have led all CAs not to accept 
>> validations of domain control on such ports, even when not documented in the 
>> BRs.
>> 
>> * The misissuance incident was not reported to Mozilla by WoSign as it 
>> should have been (see above).
>> 
>> * This misissuance incident did not turn up on WoSign's subsequent BR 
>> audit[1].
>> 
>> Incident 1
>> ----------
>> 
>> In June 2015, an applicant found a problem with WoSign's free certificate 
>> service, which allowed them to get a certificate for the base domain if they 
>> were able to prove control of a subdomain.
>> 
>> The reporter proved the problem in two ways. They accidentally discovered it 
>> when trying to get a certificate for med.ucf.edu and mistakenly also applied 
>> for www.ucf.edu, which was approved. They then confirmed the problem by 
>> using their control of theiraccount.github.com/theiraccount.github.io to get 
>> a cert for github.com, github.io, and www.github.io.
>> 
>> They reported this to WoSign, giving only the Github certificate as an 
>> example. That cert was revoked and the vulnerability was fixed. However 
>> recently, they got in touch with Google to note that the ucf.edu cert still 
>> had not been revoked almost a year later.
>> 
>> * The lack of revocation of the ucf.edu certificate (still unrevoked at time 
>> of writing, although it may have been by time of posting) strongly suggests 
>> that WoSign either did not or could not search their issuance databases for 
>> other occurrences of the same problem. Mozilla considers such a search a 
>> basic part of the response to disclosure of a vulnerability which causes 
>> misissuance, and expects CAs to keep records detailed enough to make it 
>> possible.
>> 
>> * This misissuance incident was not reported to Mozilla by WoSign as it 
>> should have been (see above).
>> 
>> * This misissuance incident did not turn up on WoSign's subsequent BR 
>> audit[1].
>> 
>> Incident 2
>> ----------
>> 
>> In July 2016, it became clear that there was some problems with the 
>> StartEncrypt automatic issuance service recently deployed by the CA 
>> StartCom. As well as other problems it had, which are outside the scope of 
>> this discussion, changing a simple API parameter in the POST request on the 
>> submission page changed the root certificate to which the resulting 
>> certificate chained up. The value "2" made a certificate signed by "StartCom 
>> Class 1 DV Server CA", "1" selected "WoSign CA Free SSL Certificate G2" and 
>> "0" selected "CA 沃通根证书", another root certificate owned by WoSign and 
>> trusted by Firefox.
>> 
>> Using the value "1" led to a certificate which had a notBefore date (usage 
>> start date) of 20th December 2015, and which was signed using the
>> SHA-1 checksum algorithm.
>> 
>> * The issuance of certificates using SHA-1 has been banned by the Baseline 
>> Requirements since January 1st, 2016. Browsers, including Firefox, planned 
>> to enforce this[2] by not trusting certs with a notBefore date after that 
>> date, but in the case of Firefox the fix had to be backed out due to web 
>> compatibility issues. However, we are considering how/when to reintroduce 
>> it, and CAs presumably know this.
>> 
>> * The issuance of backdated certificates is not forbidden, but is listed in 
>> Mozilla's list of Problematic Practices[3]. It says "Minor tweaking for 
>> technical compatibility reasons is accepted, but backdating certificates in 
>> order to avoid some deadline or code-enforced restriction is not."
>> 
>> * WoSign deny that their code backdated the certificates in order to avoid 
>> browser-based restrictions - they say "this date is the day we stop to use 
>> this code"[4]. If that is true, it is not clear to us how StartCom came to 
>> deploy WoSign code that WoSign itself had abandoned.
>> 
>> * It seems clear from publicly available information that StartCom's 
>> issuance systems are linked to WoSign's issuance systems in some way.
>> Nevertheless, it should not have been possible for an application for a cert 
>> from StartCom to produce a cert signed by WoSign.
>> 
>> * This misissuance incident was not reported to Mozilla by WoSign as it 
>> should have been.
>> 
>> 
>> Taking into account all these incidents and the actions of this CA, Mozilla 
>> is considering what action to take. Your input is welcomed.
>> 
>> Gerv, Kathleen and Richard
>> 
>> 
>> [0]
>> https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/enforcement/
>> [1] https://cert.webtrust.org/SealFile?seal=2019&file=pdf
>> [2] https://bugzilla.mozilla.org/show_bug.cgi?id=942515
>> [3]
>> https://wiki.mozilla.org/CA:Problematic_Practices#Backdating_the_notBefore_date
>> [4] https://bugzilla.mozilla.org/show_bug.cgi?id=1293366
>> _______________________________________________
>> dev-security-policy mailing list
>> [email protected]
>> https://lists.mozilla.org/listinfo/dev-security-policy
> 
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to