> This fixing of the notAfter date in this style of certificate may
> have been a sensible move to avoid accidentally issuing SHA-1
> certificates whose validity extends into 2017, which would also be a
> BR violation.

This contradicts the "Issue D" section at
https://wiki.mozilla.org/CA:WoSign_Issues which says that this
issue was not a BR violation.

> Many of the rest of the Macau certificates, which do not have an
> embedded SCT to show when they were issued, have "matching"
> SHA-256 versions issued at some point in 2016, with everything the
> same except the issuing intermediate certificate, the hash algorithm
> and the notBefore/notAfter dates. This hints at the possibility that
> the two certificates were actually issued at the same time, and the
> date in the SHA-256 version is the correct issue date for both. If
> this is true, it shows misissuance continued until at least June 2016
> (*.zlbaba.com SHA-1, SHA-256).

The two *.zlbaba.com certificates (https://crt.sh/?id=30773543 and
https://crt.sh/?id=31103218) do not appear to be matching to me:
their public keys and serial numbers are different.

> Should StartCom/WoSign be permitted to re-apply using the same roots,
> or would they need new roots?

New roots.  Considering the extent to which StartCom/WoSign have
mismanaged things, there could be further misissued certificates
chaining to their roots that we don't know about.  The only way to
protect the ecosystem from such certificates is to require new roots -
roots that have only ever operated under the new audits that will be
required by Mozilla.

Regards,
Andrew
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to