All,

I have filed the following two bugs.

WoSign Action Items:
https://bugzilla.mozilla.org/show_bug.cgi?id=1311824 

StartCom Action Items:
https://bugzilla.mozilla.org/show_bug.cgi?id=1311832

I will work on a security blog that will probably get posted early next week. 
It will point to these two bugs, and list the actions Mozilla plans to take.

As we have been discussing, Mozilla plans to take the following actions:

1) Distrust certificates with a notBefore date after October 21, 2016 which 
chain up to the following affected roots. If additional back-dating is 
discovered (by any means) to circumvent this control, then Mozilla will 
immediately and permanently revoke trust in the affected roots.
a) This change will go into the Firefox 51 release train.
b) The code will use the following Subject Distinguished Names to identify the 
root certificates, so that the control will also apply to cross-certificates of 
these roots.
i) CN=CA 沃通根证书, OU=null, O=WoSign CA Limited, C=CN 
ii) CN=Certification Authority of WoSign, OU=null, O=WoSign CA Limited, C=CN 
iii) CN=Certification Authority of WoSign G2, OU=null, O=WoSign CA Limited, 
C=CN 
iv) CN=CA WoSign ECC Root, OU=null, O=WoSign CA Limited, C=CN 
v) CN=StartCom Certification Authority, OU=Secure Digital Certificate Signing, 
O=StartCom Ltd., C=IL 
vi) CN=StartCom Certification Authority G2, OU=null, O=StartCom Ltd., C=IL 

2) Add the previously identified backdated SHA-1 certificates chaining up to 
these affected roots to OneCRL.

3) No longer accept audits carried out by Ernst & Young Hong Kong.

4) Remove these affected root certificates from Mozilla’s root store at some 
point in the future. If the CA's new root certificates are accepted for 
inclusion, then Mozilla may coordinate the removal date with the CA’s plans to 
migrate their customers to the new root certificates. Otherwise, Mozilla may 
choose to remove them at any point after March 2017.

5) Mozilla reserves the right to take further or alternative action.


This discussion is still open, and I will still continue to appreciate your 
input on this topic.

Thanks,
Kathleen


_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to