OK, We'll provide a list of domains of certificate which we've already proceeded replaced certificate to [email protected] from my email [email protected] soon. Please do not try to contact the email address and contact number of clients on the list.
: -) Sincere, Bruce 在2023年6月14日星期三 UTC+8 01:52:14<Thomas Zermeno> 写道: > Bruce, We want to work with you on notifying the affected parties but we > will proceed independently if we have to. We have no intention of > "poaching"; we are trying to minimize the impact on those subscribers since > the QUANTUM CA LIMITED entity no longer exists. If you want to assist > SSL.com in contacting the affected subscribers, please contact us using the > options in https://www.ssl.com/contact_us/ and we will route your request > to the proper department. Regards, > > Tom > SSL.com > > On Tuesday, 13 June 2023 at 11:59:47 UTC-5 Xiaohui Lam wrote: > >> Thomas Zermeno, >> >> >> > in full compliance with our CP/CPS and the CA/B Forum Baseline >> Requirements. We are also reaching out to individual subscribers affected >> by this upcoming revocation event to minimize the impact. >> >> You mean to get in touch w/ our subscribers to purchase from SSL.com >> directly in the future? I don't think this is a behave friendly or good >> reputation of a CA/Manufacturers to existing/former partners. >> >> There is a proverb called "My customer's customer, isn't my customer". >> >> We stand against poaching our clients, and I'm sure any reseller does too. >> >> >> 在2023年6月13日星期二 UTC+8 23:56:41<Thomas Zermeno> 写道: >> >>> In light of the ongoing HiCA discussion, we feel compelled to provide >>> additional clarity on the subject. Not only were we unaware of the >>> existence of HiCA until recently, but we were unaware that QuantumCA was >>> distributing acme.sh. QuantumCA's reseller account was never enabled for >>> ACME therefore no certs were issued from any of QuantumCA branded SubCAs >>> via ACME at any time. >>> >>> However, SSL.com's free community ACME 90-day certs have been available >>> since 2021 and we have no involvement, collaboration, or control over any >>> ACME client scripts or applications including HiCA's acme.sh. Our courtesy >>> ACME service is available in a similar vein as other free publicly trusted >>> ACME TLS certificate providers with no restrictions or consideration on >>> which ACME clients are allowed access to this service. >>> >>> We do not collaborate on any projects with our SSL/TLS SubCA resellers >>> other than to provide them brandable certificates. Many members of the >>> community find brandable SubCAs valuable to help build reputation without >>> having to invest in a fully dedicated CA infrastructure, and most reseller >>> customers handle the privilege of their SubCAs responsibly. Unfortunately, >>> there are cases where abuse, intentional or otherwise, may crop up. At >>> SSL.com, we make every effort to respond swiftly and firmly whenever we are >>> alerted of any issues related to our branded SubCAs. >>> >>> In particular, SSL.com has already planned revocation of the branded >>> SubCAs within the required 7-day time window from the moment we discovered >>> the dissolution of QUANTUM CA LIMITED, in full compliance with our CP/CPS >>> and the CA/B Forum Baseline Requirements. We are also reaching out to >>> individual subscribers affected by this upcoming revocation event to >>> minimize the impact. >>> >>> Still, there are lessons to learn from this event. Although our CP/CPS >>> stipulates customers’/resellers’ obligation to notify SSL.com of any >>> business registration modification (which includes dissolution), we plan to >>> introduce proactive measures, such as applying periodic reverification of >>> all SubCA resellers' business registrations. >>> >>> Finally, we view unwarranted statements, which are probably in violation >>> of the Mozilla Community Participation Guidelines >>> <https://www.mozilla.org/en-US/about/governance/policies/participation/>, >>> or individual customer-to-company issues such as “refunds” as off-topic and >>> will directly communicate with the reseller on such matters. We consider >>> dev-security-policy group to be a public Forum to discuss ecosystem-wide >>> security/policy issues and good practices. For example, we could discuss >>> with other CAs to adopt the above-mentioned periodic reverification to >>> further protect the ecosystem. >>> >>> >>> Thank you, >>> >>> Tom >>> SSL.com >>> >>> >>> P.S. I have used my Google email address for the m.d.s.p. since 2017. I >>> continued to use it in this public group, after I took on the role of >>> Compliance Manager at SSL.com, as a means to continue the legacy of the >>> account and maintain records of the previous discussions. Unless otherwise >>> stated, all posts from this address should be considered official replies >>> from SSL.com. >>> On Tuesday, 13 June 2023 at 09:30:18 UTC-5 Levi wrote: >>> >>>> I think the key to this issue is "Is the CA should take actions to >>>> protect their third-party system security under authorized". This problem >>>> included the security of the system, public perception of their morality, >>>> and compliance issues. HiCA has used the RCE leak of ACME to add >>>> advertising to end users (or commercial activities) but as for now, there >>>> are not any security problems that destroy the security of CA reported. A >>>> few years ago, Quantum CA used the security leak of CA to issue the >>>> certificate which expires a period of 5 years, and now, HiCA used the >>>> security leak of ACME to add advertising to end users . >>>> >>>> In conclusion, there are things we know: >>>> 1. There is not any reported security of CA issues (Sectigo, GTS, and >>>> more). >>>> 2. HiCA used the RCE leak of ACME but has not caused any security >>>> problems (as of now). >>>> 3. People think the CA must take action to protect the system security >>>> (not only for CA's system) >>>> 在2023年6月13日星期二 UTC+8 13:00:45<James Kasten> 写道: >>>> >>>>> The final reference should be "3. >>>>> https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-v2.0.0.pdf" >>>>> instead of the 1.8.7 link provided. (It doesn't change the discussion.) >>>>> My >>>>> apologies. >>>>> >>>>> James Kasten >>>>> Google Trust Services >>>>> >>>>> On Mon, Jun 12, 2023 at 8:57 PM James Kasten <[email protected]> >>>>> wrote: >>>>> >>>>>> To be explicit, GTS does not have a business relationship with HiCA. >>>>>> >>>>>> Normally ACME services have protections against these types of >>>>>> MitM-CAs, but the remote RCE allowed HiCA to bypass these controls [1, >>>>>> 2]. >>>>>> >>>>>> For instance, it is possible HiCA replaced the local client's key >>>>>> authorization during challenge validation with a key authorization >>>>>> provided >>>>>> by HiCA, granting authorization of the domain names to HiCA. HiCA could >>>>>> theoretically use these authorizations to continue to issue certificates >>>>>> for the affected domain names, or revoke the certificates that were >>>>>> issued. >>>>>> >>>>>> So clients of HiCA should also consider the lasting effects on the >>>>>> the domains in addition to your normal recovery procedures for an RCE. >>>>>> It >>>>>> may be prudent to reissue and revoke any certificates with your choice >>>>>> of >>>>>> CA directly and to watch certificate transparency logs for any future >>>>>> unintended issuance. GTS allows authorization reuse up to 28 days on our >>>>>> ACME endpoint and issues certificates with lifetimes up to 90 days. >>>>>> Other >>>>>> CAs may differ. By the current baseline requirements CAs can issue 398 >>>>>> day >>>>>> certificates and reuse the authorizations for 398 days [3]. >>>>>> >>>>>> >>>>>> James Kasten >>>>>> Google Trust Services >>>>>> >>>>>> >>>>>> 1. https://datatracker.ietf.org/doc/html/rfc8555#section-6.4 >>>>>> 2. https://datatracker.ietf.org/doc/html/rfc8555#section-10.2 >>>>>> 3. >>>>>> https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.8.7.pdf >>>>>> >>>>>> >>>>>> On Sunday, June 11, 2023 at 6:34:44 AM UTC-7 Xiaohui Lam wrote: >>>>>> >>>>>>> No, actually we implementing GTS, SSL.com and sometimes Let's >>>>>>> Encrypt, Sectigo all the time. and especially SSL.com issued under >>>>>>> SSL.com >>>>>>> subCA, not under "Quantum Secure Site DV" acutally. >>>>>>> The CA >>>>>>> >>>>>>> 在2023年6月11日星期日 UTC+8 10:02:14<Amir Omidi (aaomidi)> 写道: >>>>>>> >>>>>>>> Emailing on my personal capacity: >>>>>>>> >>>>>>>> Xiaohui, can you please confirm that ssl.com was the only actual >>>>>>>> CA that was used for issuance through HiCA? >>>>>>>> >>>>>>>> On Saturday, June 10, 2023 at 2:08:47 PM UTC-4 Kurt Seifried wrote: >>>>>>>> >>>>>>>>> Forwarding this to the list, I'm not comfortable with off list >>>>>>>>> discussions in private. >>>>>>>>> >>>>>>>>> On Sat, Jun 10, 2023 at 11:18 AM Xiaohui Lam <[email protected]> >>>>>>>>> wrote: >>>>>>>>> >>>>>>>>>> Mr Seifried, >>>>>>>>> >>>>>>>>> >>>>>>>>>> > Is this really a situation where something extremely suspicious >>>>>>>>>> (remote code execution, CA's with multiple entities, some of which >>>>>>>>>> don't >>>>>>>>>> seem to properly exist, etc.) is going to be swept under the rug >>>>>>>>>> with a >>>>>>>>>> simple "yeah, we revoked this bad actors certificates, everything is >>>>>>>>>> fine"? >>>>>>>>>> >>>>>>>>>> We are a reseller, not a physical root CA. This is a widely >>>>>>>>>> accepted solution for cross border businesses. We have business >>>>>>>>>> accepts >>>>>>>>>> online payment, the China users needs pay via alipay or wechat, to >>>>>>>>>> sign up >>>>>>>>>> the merchant we must have a china company, >>>>>>>>>> and foreign needs stripe, merchant must be a non-MainlandChina >>>>>>>>>> company. this is not suspicious. >>>>>>>>>> >>>>>>>>>> *. I represent the above opinion of my company >>>>>>>>>> >>>>>>>>> >>>>>>>>>> > If HiCA can do this, how do we know there are not more >>>>>>>>>> intermediate/reseller CAs doing this? >>>>>>>>>> >>>>>>>>>> Most CA has no necessary to exploiting this RCE, because they >>>>>>>>>> can natively compatible with RFC 8555, they can define own CPS >>>>>>>>>> and CP, which contains validation policy, we does because we are not >>>>>>>>>> CA and >>>>>>>>>> can't to provider RFC 8555 ACME endpoint like a CA does. so a >>>>>>>>>> physical root >>>>>>>>>> CA has no necessary to provide ACME simulation by RCE. and also >>>>>>>>>> there're >>>>>>>>>> more difficulties for a ssl reseller to provide ACME service which >>>>>>>>>> real CAs >>>>>>>>>> won't undergo. >>>>>>>>>> >>>>>>>>>> - CSR stage difference: Most CA's subscriber request process or >>>>>>>>>> reseller API process, requires CSR be submitted in the `new-order` >>>>>>>>>> API, >>>>>>>>>> ACME requires CSR be submitted in `finalize` API. I have a topic in >>>>>>>>>> letsencrypt community years ago about this - >>>>>>>>>> https://community.letsencrypt.org/t/why-acme-requires-domain-auth-first-before-csr/98482 >>>>>>>>>> - Challenge difference: Most CA's subscriber request process or >>>>>>>>>> reseller API process's DNS validation requires `_<md5>` / `_dnsauth` >>>>>>>>>> dnshost, and dnstype possibly CNAME or possibly TXT, But ACME's DNS >>>>>>>>>> validation dnshost is constant: `_acme-challenge`, dnstype `TXT`. >>>>>>>>>> And in a >>>>>>>>>> more deep talk ACME's dnsvalue needs publickey's thumbprint + server >>>>>>>>>> token >>>>>>>>>> which is totally different than traditional way's dnsvalue. >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> My opinion is community can research how many ACME was publicly >>>>>>>>>> provided, and investigate is the provider a physical CA. if is >>>>>>>>>> natively >>>>>>>>>> compatible with RFC 8555, no worry about that one and continue >>>>>>>>>> do investigate next. >>>>>>>>>> >>>>>>>>>> *. I represent the above opinion of my personal. not my company. >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> Sincere, >>>>>>>>>> Bruce. >>>>>>>>>> >>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> 在2023年6月11日星期日 UTC+8 00:39:16<Kurt Seifried> 写道: >>>>>>>>>> >>>>>>>>>> Is this really a situation where something extremely suspicious >>>>>>>>>> (remote code execution, CA's with multiple entities, some of which >>>>>>>>>> don't >>>>>>>>>> seem to properly exist, etc.) is going to be swept under the rug >>>>>>>>>> with a >>>>>>>>>> simple "yeah, we revoked this bad actors certificates, everything is >>>>>>>>>> fine"? >>>>>>>>>> >>>>>>>>>> If HiCA can do this, how do we know there are not more >>>>>>>>>> intermediate/reseller CAs doing this? >>>>>>>>>> >>>>>>>>>> https://news.ycombinator.com/item?id=36252310. >>>>>>>>>> >>>>>>>>>> Just a note, apparently, websites have been shut down and stuff >>>>>>>>>> deleted with respect to HiCA. >>>>>>>>>> >>>>>>>>>> Posting some of the threads here in case they get removed or >>>>>>>>>> whatever: >>>>>>>>>> >>>>>>>>>> ================== >>>>>>>>>> egecks 1 day ago | prev | next [–] >>>>>>>>>> >>>>>>>>>> I think the title buries the most horrifying part of this. The >>>>>>>>>> HiCA certificate authority is relying on an RCE to do an end-run >>>>>>>>>> around the >>>>>>>>>> semantics of the ACME HTTP-01 validation method. >>>>>>>>>> Fucked up and they should be booted from every root program for >>>>>>>>>> this. >>>>>>>>>> >>>>>>>>>> ================= >>>>>>>>>> >>>>>>>>>> 0x0 1 day ago | prev | next [–] >>>>>>>>>> >>>>>>>>>> Looks like they are issuing under a sub-CA of "ssl.com" >>>>>>>>>> according to >>>>>>>>>> https://github.com/acmesh-official/acme.sh/issues/4659#issue... >>>>>>>>>> Interestingly, the mozilla dev-security-policy group seems to >>>>>>>>>> contain a recent discussion about including "ssl.com" in the >>>>>>>>>> root store here >>>>>>>>>> https://groups.google.com/a/mozilla.org/g/dev-security-polic... >>>>>>>>>> >>>>>>>>>> Curious to know if this could, maybe it should, have ripple >>>>>>>>>> effects to the various SSL Root CA programs. Having someone run a >>>>>>>>>> subCA >>>>>>>>>> that actually exploits an RCE against ACME clients doesn't seem very >>>>>>>>>> trustworthy, and any CA enabling this behaviour should probably be >>>>>>>>>> kicked >>>>>>>>>> out of the trust stores? >>>>>>>>>> >>>>>>>>>> reply >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> agwa 1 day ago | parent | next [–] >>>>>>>>>> >>>>>>>>>> The sub CA is operated by ssl.com, not HiCA (which is not a >>>>>>>>>> trusted certificate authority). HiCA is relaying the certificate >>>>>>>>>> requests >>>>>>>>>> to ssl.com, which is properly validating the requests in >>>>>>>>>> accordance with all the requirements. ssl.com isn't doing >>>>>>>>>> anything wrong. That's why HiCA needs to exploit an RCE in acme.sh - >>>>>>>>>> ACME >>>>>>>>>> doesn't support relaying certificate requests to other CAs like this. >>>>>>>>>> reply >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> 0x0 23 hours ago | root | parent | next [–] >>>>>>>>>> >>>>>>>>>> Someone posted a comment on github claiming they are the founder >>>>>>>>>> of Quantum (the sub CA of ssl.com - see >>>>>>>>>> https://crt.sh/?caid=200960 ) and that they are the provider of >>>>>>>>>> the HiCA service. So it does sound like there is a closer link here >>>>>>>>>> than >>>>>>>>>> your comment would indicate: >>>>>>>>>> https://github.com/acmesh-official/acme.sh/issues/4659#issue... >>>>>>>>>> >>>>>>>>>> reply >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> agwa 23 hours ago | root | parent | next [–] >>>>>>>>>> >>>>>>>>>> Quantum is not a trusted CA. ssl.com has a white-labeled >>>>>>>>>> intermediate CA with the name "Quantum" in it, but this intermediate >>>>>>>>>> CA is >>>>>>>>>> operated by ssl.com under all the same controls as ssl.com's >>>>>>>>>> other intermediate CAs. Quantum has no ability to issue trusted >>>>>>>>>> certificates themselves. >>>>>>>>>> reply >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> 0x0 23 hours ago | root | parent | next [–] >>>>>>>>>> >>>>>>>>>> So the person claiming to be the founder of "QuantumCA" does not >>>>>>>>>> possess the private key corresponding to >>>>>>>>>> https://crt.sh/?caid=200960 - can we be sure the private key is >>>>>>>>>> only accessible by ssl.com's CA system? So the certificates >>>>>>>>>> listed here aren't issued by this person, but by the ssl.com's >>>>>>>>>> system? >>>>>>>>>> https://crt.sh/?Identity=%25&iCAID=200960&exclude=expired&de... >>>>>>>>>> Also, why would ssl.com even create a subCA named "QuantumCA"? >>>>>>>>>> Are they in business with this person claiming to be the founder of >>>>>>>>>> "QuantumCA" who appears to be responsible for exploiting this >>>>>>>>>> acme.sh 0day? >>>>>>>>>> What does this say about ssl.com's trustworthiness? Or is the >>>>>>>>>> person in the github comments lying? >>>>>>>>>> >>>>>>>>>> reply >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> agwa 23 hours ago | root | parent | next [–] >>>>>>>>>> >>>>>>>>>> > So the person claiming to be the founder of "QuantumCA" does >>>>>>>>>> not possess the private key corresponding to >>>>>>>>>> https://crt.sh/?caid=200960 - can we be sure the private key is >>>>>>>>>> only accessible by ssl.com's CA system? So the certificates >>>>>>>>>> listed here aren't issued by this person, but by the ssl.com's >>>>>>>>>> system? >>>>>>>>>> https://crt.sh/?Identity=%25&iCAID=200960&exclude=expired&de... >>>>>>>>>> Correct. You can see the Quantum intermediates listed in ssl.com's >>>>>>>>>> most recent audit statement, meaning an auditor has verified that >>>>>>>>>> ssl.com has controls to protect the private key: >>>>>>>>>> https://www.cpacanada.ca/generichandlers/CPACHandler.ashx?at... >>>>>>>>>> >>>>>>>>>> (The audit could be flawed, but it's the same amount of assurance >>>>>>>>>> we have for any intermediate CA's private key - the fact that >>>>>>>>>> "QuantumCA" >>>>>>>>>> is in the name does not change the risk calculus) >>>>>>>>>> >>>>>>>>>> > Also, why would ssl.com even create a subCA named "QuantumCA"? >>>>>>>>>> Are they in business with this person claiming to be the founder of >>>>>>>>>> "QuantumCA" who appears to be responsible for exploiting this >>>>>>>>>> acme.sh 0day? >>>>>>>>>> What does this say about ssl.com's trustworthiness? Or is the >>>>>>>>>> person in the github comments lying? >>>>>>>>>> >>>>>>>>>> There is a business relationship between QuantumCA and ssl.com. >>>>>>>>>> QuantumCA is a reseller of ssl.com, and they've paid extra to >>>>>>>>>> ssl.com so that the certificates they purchase get issued from >>>>>>>>>> an intermediate CA named "QuantumCA" rather than one of ssl.com's >>>>>>>>>> usual intermediate CAs which have "ssl.com" in the name. This >>>>>>>>>> lets QuantumCA pretend to be a real CA. This is a common practice in >>>>>>>>>> the >>>>>>>>>> industry, and I don't think it says anything about the >>>>>>>>>> trustworthiness of >>>>>>>>>> ssl.com, because the business relationship with QuantumCA >>>>>>>>>> doesn't in any way subvert the integrity of the WebPKI since >>>>>>>>>> ssl.com retains control of the issuance. Still, I wish >>>>>>>>>> intermediate CA white-labeling were banned because it causes >>>>>>>>>> terrible >>>>>>>>>> confusion about who is and isn't a CA. >>>>>>>>>> >>>>>>>>>> reply >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> 0x0 23 hours ago | root | parent | next [–] >>>>>>>>>> >>>>>>>>>> I find it troubling that a root CA (ssl.com) is apparently OK >>>>>>>>>> with lending their name in a business relationship with an actor >>>>>>>>>> that is >>>>>>>>>> actively exploiting an acme.sh 0day. >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> tptacek 20 hours ago | root | parent | next [–] >>>>>>>>>> >>>>>>>>>> This feels a little bit like doubling down to find ways to >>>>>>>>>> implicate the actual CA instead of the reseller. It's clear how >>>>>>>>>> mismanagement by a real CA would make a more interesting story than >>>>>>>>>> by this >>>>>>>>>> random no-longer-existing pseudo-reseller, but I don't think there's >>>>>>>>>> evidence to support that story yet. >>>>>>>>>> reply >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> 0x0 20 hours ago | root | parent | next [–] >>>>>>>>>> >>>>>>>>>> But it's not a random pseudo-reseller? The one github comment >>>>>>>>>> from "the founder of Quantum CA" seems to say they are also the >>>>>>>>>> creator of >>>>>>>>>> HiCA, which is the entity that was exploiting the 0day in acme.sh. >>>>>>>>>> And the >>>>>>>>>> crt.sh link shows an intermediate CA cert named "QuantumCA", signed >>>>>>>>>> by >>>>>>>>>> ssl.com. >>>>>>>>>> So QuantumCA == HiCA == exploiters of the acme.sh 0day, it's all >>>>>>>>>> the same entity? The intermediate CA could just as well be named >>>>>>>>>> "0dayexploitersCA"? Why is it not a huge concern that ssl.com is >>>>>>>>>> fine with operating such a "0dayexploitersCA" intermediate? >>>>>>>>>> >>>>>>>>>> Am I missing something here? >>>>>>>>>> >>>>>>>>>> reply >>>>>>>>>> ================= >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> On Fri, Jun 9, 2023 at 1:32 PM Xiaohui Lam <[email protected]> >>>>>>>>>> wrote: >>>>>>>>>> >>>>>>>>>> Mr mochaaP, >>>>>>>>>> >>>>>>>>>> We're running businesses under multi entities, one is UK company, >>>>>>>>>> and one is CN company, the UK company is registered and running by a >>>>>>>>>> former >>>>>>>>>> workmate which leaved our team, and CN company is registered and >>>>>>>>>> running by >>>>>>>>>> me. >>>>>>>>>> >>>>>>>>>> We do stopped from selling SSL.com certificate due to business >>>>>>>>>> concern and the cross-sign root expiration concern, That meantime we >>>>>>>>>> do >>>>>>>>>> have some cooperates with other CAs without >>>>>>>>>> whitelabel/intermediateCA, some >>>>>>>>>> CAs are directly implemented and some are tier-2 implements(under >>>>>>>>>> other >>>>>>>>>> resellers). So, our website is kept running, including HiCA keeps. >>>>>>>>>> >>>>>>>>>> But we will stop all misleading business to stop provide our >>>>>>>>>> Quantum brand products, only contain our China company's materials. >>>>>>>>>> >>>>>>>>>> My KEY OPINION: our China entity has been kept in existence so we >>>>>>>>>> kept the reselling business. >>>>>>>>>> >>>>>>>>>> Sincere. >>>>>>>>>> Bruce Lam >>>>>>>>>> 在2023年6月10日星期六 UTC+8 03:13:11<mochaaP> 写道: >>>>>>>>>> >>>>>>>>>> Hi Xiaohui, >>>>>>>>>> >>>>>>>>>> I think you may have misunderstood my message. What I meant to >>>>>>>>>> convey was that I am skeptical of your intention to resell your own >>>>>>>>>> CA for >>>>>>>>>> a dissolved Ltd. that was not subject to having its certificate >>>>>>>>>> revoked. We >>>>>>>>>> believe that this practice is uncommon for a reseller in such a case. >>>>>>>>>> >>>>>>>>>> Please understand that my message was not intended to be hateful >>>>>>>>>> towards you or your team. If you believe that this was an honest >>>>>>>>>> mistake, >>>>>>>>>> please reply to this thread with more details. The community values >>>>>>>>>> transparency and trust, and we would be happy to hear your >>>>>>>>>> perspective. >>>>>>>>>> >>>>>>>>>> Best regards, >>>>>>>>>> Zephyr Lykos >>>>>>>>>> On Saturday, June 10, 2023 at 1:08:08 AM UTC+8 Xiaohui Lam wrote: >>>>>>>>>> >>>>>>>>>> Thanks John to share this topic to the dev-security forum. >>>>>>>>>> >>>>>>>>>> This is HiCA founder, let me to explain your concern, Mr John , >>>>>>>>>> the RCE is fully used to finish the challenge which validated by >>>>>>>>>> CAs, in another word, the ACME.sh-enrolled certificates which >>>>>>>>>> passing this >>>>>>>>>> RCE, it does compliant with each CA's BR validation requirements. CA >>>>>>>>>> did >>>>>>>>>> nothing wrong. And also by this trick can enroll any CA's >>>>>>>>>> certificate >>>>>>>>>> before acme.sh fix patch. >>>>>>>>>> >>>>>>>>>> and to Mr @mochaaP, you said to punish our team, we're NOT a >>>>>>>>>> public CA or private CA(in my understanding, a CA must manage a or >>>>>>>>>> more PKI >>>>>>>>>> infrastructure physically), [3]so the clarify relationship to HiCA >>>>>>>>>> w/ >>>>>>>>>> QuantumCA is no necessary, but we still told we runs HiCA inside >>>>>>>>>> QuantumCA >>>>>>>>>> project's source code, it's a sub-application inside it. >>>>>>>>>> >>>>>>>>>> I agree @Andrew's opinion, CAs shouldn't take any >>>>>>>>>> responsibilities to the RCE incidents. or there are hundreds >>>>>>>>>> acme-tools for >>>>>>>>>> CAs need to concern. >>>>>>>>>> 在2023年6月10日星期六 UTC+8 00:43:47<mochaaP> 写道: >>>>>>>>>> >>>>>>>>>> Hello, >>>>>>>>>> >>>>>>>>>> Although HiCA is not a CA itself, the person own HiCA seems also >>>>>>>>>> owns (or at least works for) Quantum CA[1][2]. they also confirmed >>>>>>>>>> that >>>>>>>>>> Quantum CA is operated by both their team and SSL.com team[3]. >>>>>>>>>> >>>>>>>>>> I think this probably is not as simple as a white-label >>>>>>>>>> intermediate CA being abused, rather a CA that resells their own >>>>>>>>>> product to >>>>>>>>>> themselves to prevent being punished for bad behaviors. >>>>>>>>>> >>>>>>>>>> [1]: https://github.com/xiaohuilam (see "Pinned" section) >>>>>>>>>> [2]: https://github.com/quantumca (see "People" section) >>>>>>>>>> [3]: >>>>>>>>>> https://github.com/acmesh-official/acme.sh/issues/4659#issuecomment-1584546150 >>>>>>>>>> >>>>>>>>>> (note that this person never clearified their relationship with >>>>>>>>>> Quantum CA >>>>>>>>>> and only replied with "So this isn't the evidence to proof HiCA is a >>>>>>>>>> CA >>>>>>>>>> which managed PKI.") >>>>>>>>>> >>>>>>>>>> Regards, >>>>>>>>>> Zephyr Lykos >>>>>>>>>> >>>>>>>>>> On Friday, June 9, 2023 at 9:04:34 PM UTC+8 Andrew Ayer wrote: >>>>>>>>>> >>>>>>>>>> On Fri, 9 Jun 2023 05:42:22 -0700 (PDT) >>>>>>>>>> "John Han (hanyuwei70)" <[email protected]> wrote: >>>>>>>>>> >>>>>>>>>> > Here is the story. >>>>>>>>>> > https://github.com/acmesh-official/acme.sh/issues/4659 >>>>>>>>>> > >>>>>>>>>> > Seems like they exploited acme.sh and let user to evade >>>>>>>>>> certificate >>>>>>>>>> > issuing procedure. >>>>>>>>>> > >>>>>>>>>> > Do we need to discuss this? >>>>>>>>>> >>>>>>>>>> The party in question (HiCA/QuantumCA) is not a certificate >>>>>>>>>> authority, >>>>>>>>>> and I don't see any evidence that the actual CAs in question >>>>>>>>>> evaded any >>>>>>>>>> validation requirements. >>>>>>>>>> >>>>>>>>>> HiCA/QuantumCA is just acting as an intermediary between >>>>>>>>>> subscribers >>>>>>>>>> and the issuance APIs operated by actual CAs[1]. Literally anyone >>>>>>>>>> can >>>>>>>>>> do this and do monumentally stupid/insecure things; it's not >>>>>>>>>> productive >>>>>>>>>> to have a discussion every time this happens. >>>>>>>>>> >>>>>>>>>> Regards, >>>>>>>>>> Andrew >>>>>>>>>> >>>>>>>>>> [1] It's true they have a reseller relationship with ssl.com, >>>>>>>>>> who are >>>>>>>>>> operating a white-label intermediate CA with "QuantumCA" in the >>>>>>>>>> subject, but HiCA/QuantnumCA are also fronting other CAs, >>>>>>>>>> including >>>>>>>>>> GTS, which doesn't require a reseller agreement to access their >>>>>>>>>> free >>>>>>>>>> ACME API, so I don't see that aspect as being productive to >>>>>>>>>> discuss >>>>>>>>>> either. >>>>>>>>>> >>>>>>>>>> -- >>>>>>>>>> >>>>>>>>>> You received this message because you are subscribed to the >>>>>>>>>> Google Groups "[email protected]" group. >>>>>>>>>> To unsubscribe from this group and stop receiving emails from it, >>>>>>>>>> send an email to [email protected]. >>>>>>>>>> >>>>>>>>>> To view this discussion on the web visit >>>>>>>>>> https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/0f9174b3-02d6-4ff6-a7fa-3b931375076dn%40mozilla.org >>>>>>>>>> >>>>>>>>>> <https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/0f9174b3-02d6-4ff6-a7fa-3b931375076dn%40mozilla.org?utm_medium=email&utm_source=footer> >>>>>>>>>> . >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> -- >>>>>>>>>> Kurt Seifried (He/Him) >>>>>>>>>> [email protected] >>>>>>>>>> >>>>>>>>>> >>>>>>>>> >>>>>>>>> -- >>>>>>>>> Kurt Seifried (He/Him) >>>>>>>>> [email protected] >>>>>>>>> >>>>>>>> -- You received this message because you are subscribed to the Google Groups "[email protected]" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/7a6ce886-6545-4376-ad20-2fae497fd38fn%40mozilla.org.
