The timestamp on a SCT is fully controlled by the signer, so why should
SCTs bearing a timestamp before May 2 still be considered trusted?

Alex

On Sun, May 3, 2020 at 6:19 PM Jeremy Rowley via dev-security-policy <
[email protected]> wrote:

> Hey all,
>
> The key used to sign SCTs for the CT2 log was compromised yesterday at 7pm
> through the Salt root bug. The remaining logs remain uncompromised and run
> on separate infrastructure.  We discovered the compromise today and are
> working to turn that log into read only mode so that no new SCTs are
> issued. We doubt the key was used to sign anything as you'd need to know
> the CT build to do so. However, as a precaution, we ask that you consider
> all SCTs invalid if the SCT was issued from CT2 after 7pm MST on May 2nd .
> Please let me know what questions you have.
>
> Jeremy
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to