On 15/12/16 02:46, Tavis Ormandy wrote:
Hello, while working on an unrelated problem, I happened to notice that this
<https://crt.sh/?id=30316154> leaf certificate for DNS:test.wgh.cn and DNS:
test.ydn.cn has the same RSA public key as this trusted root
<https://crt.sh/?id=9329287> (and a few others).

test.wgh.cn no longer resolves, but wgh.cn is the personal blog of a WoSign
employee.

Is it possible key material was accidentally used in a web server and
removed from a HSM? Maybe there's another explanation, but if there was an
accident, I assume the root would need to be revoked.

I'm having trouble finding any observatory/census logs from this time
period to check, can anyone help?

Hi Tavis.

There are lots of links here: https://scans.io/

I took a brief look at https://scans.io/study/sonar.ssl and did not find the SHA-1 hash of the test.wgh.cn cert (https://crt.sh/?id=30316154) in either of the two logs dated soonest after that cert's notBefore date:
https://scans.io/data/rapid7/sonar.ssl/20150209/20150209_hosts.gz
https://scans.io/data/rapid7/sonar.ssl/20150216/20150216_hosts.gz

That cert has been revoked, but the (presumably backdated) revocation date in the CRL matches the cert's notBefore date:
    Serial Number: 6E58BF31CFAD4AB20071C26EA9662DA5
        Revocation Date: Feb  4 06:47:22 2015 GMT

BTW, https://crt.sh/?id=9329287 (360 EV Server CA G2) is an intermediate certificate, not a trusted root.

--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to