San, 

The CRL that you are referencing reflects the status of our SubCAs, not the 
status of our SSL/TLS and Client Subscriber Certificates. 

>From our CP/CPS:

For the status of Subordinate CA Certificates and time-stamping 
Certificates, SSL.com shall
update and reissue CRLs at least:

     • once every* twelve (12) months* and
     • within *twenty-four (24) hours* after revoking a Subordinate CA 
Certificate,

and the value of the nextUpdate field must not be more than *twelve (12) 
months* beyond the
value of the thisUpdate field.

It is acceptable for these CRLs to have 1 year validity periods.

The CRL contains the serial numbers:

   1. 4E33A3DF038C94BD5611A51814F68CE9 
   <https://crt.sh/?sha1=C21028433BB62D1E64F5D54B592F9C94FFC5ADAE> (revoked 
   2023-06-15 15:53:15 UTC)
   2. 663E22B3F73CCB78DC74369353AB24C3 
   <https://crt.sh/?sha1=1999B1FD1224DA4E9CFDB15D45B8FD3A81F06C52> (revoked 
   2023-06-15 15:53:16 UTC)
   3. 50758BB068C7CA6BF84CC950ABC26539 
   <https://crt.sh/?sha1=B4C47116082859CE6D85114601352477413C5EBC> (revoked 
   2023-06-15 15:53:17 UTC)
   4. 3348510D6AA99654904848A14BE65170 
   <https://crt.sh/?sha1=6F9D48936597B67880F1463E0F0459EEDB298DA4> (revoked 
   2023-06-15 15:53:18 UTC)
   5. 0AF338327C1D48BA41753EBEB9EA6029 
   <https://crt.sh/?sha1=24C0B4AB0DDC29667F63417BF415E90ACFADAF13> (revoked 
   2023-06-15 15:53:20 UTC)
   6. 4EB6AD64EA15BA233C32B0D491670063 
   <https://crt.sh/?sha1=3DCA8C6256D9AED555940DFB77BA7244EAB5D82C> (revoked 
   2023-06-15 15:53:21 UTC)

And it was issued one minute after the revocations:
 Last Update: Jun 15 15:54:47 2023 GMT

Regards, 

Tom
SSL.com <https://www.ssl.com>
On Saturday, 24 June 2023 at 14:04:09 UTC-5 San Wong wrote:

> According to the previous discussion, sslcom.cn should be actually 
> controlled by ssl.com, but we found that both ocsp.sslcom.cn and 
> crl.sslcom.cn are not compliant.
>
>    1. ocsp.sslcom.cn returned an incorrect response to the ocsp 
>    verification request, so the certificate could not be revoked.
>    2. crl.sslcom.cn responds to historical data (data before revoking), 
>    and the cache time is as long as 1 year.
>
>
> ```
> # openssl crl -inform DER -in 
> http://crl.sslcom.cn/SSLcom-RootCA-RSA-4096-R1.crl -text -issuer -hash 
> -lastupdate -nextupdate
> issuer=/C=US/ST=Texas/L=Houston/O=SSL Corporation/CN=SSL.com Root 
> Certification Authority RSA
> 6fa5da56
> lastUpdate=Jun 15 15:54:47 2023 GMT
> nextUpdate=Jun 9 15:54:46 2024 GMT
> Certificate Revocation List (CRL):
> Version 2 (0x1)
> Signature Algorithm: sha256WithRSAEncryption
> Issuer: /C=US/ST=Texas/L=Houston/O=SSL Corporation/CN=SSL.com Root 
> Certification Authority RSA
> Last Update: Jun 15 15:54:47 2023 GMT
> Next Update: Jun 9 15:54:46 2024 GMT
> CRL extensions:
> X509v3 Authority Key Identifier:
> keyid:DD:04:09:07:A2:F5:7A:7D:52:53:12:92:95:EE:38:80:25:0D:A6:59
>
> X509v3 CRL Number:
> 19
> Revoked Certificates:
> ...
> ```
>
> Not compliant with CPS 
> <https://legal.ssl.com/documents/SSLcom-CP-CPS-v1.17.pdf> 4.9.7 and 4.9.9.
>
> 在2023年6月20日星期二 UTC+8 03:24:19<Thomas Zermeno> 写道:
>
>> This is to provide an update on the revocation of the QuantumCA SubCAs. 
>> They were all revoked within the required timeframe. Since they were never 
>> enabled for ACME, there was never an issue with these SubCAs being used in 
>> the HiCA acme.sh RCE client.  
>>
>> With regards to other issues raised in the discussion and which mention 
>> SSL.com:
>>
>> Before issuing SubCAs to any resellers, SSL.com performs verification 
>> equivalent to an Extended Validation review of the organization applying 
>> for the SubCA(s). In summary, this includes verification of the legal, 
>> physical and operational existence, and verification of the authorization 
>> of the request. It does not include background checks, reputational 
>> research, or any checks for criminal records of the organization 
>> representatives, other than checks against the applicable sanctions lists.
>>
>> In the case of Quantum, our checks included doing lookups on the 
>> organization using the UK Registry Companies House and a Qualified 
>> Independent Information Source (QIIS), verifying the identity of contact 
>> persons representing the organization and comparing them against several US 
>> sanctions lists. Additionally, we performed live interviews with company 
>> representatives over teleconference and via the verified means of 
>> communication with the organization. All required verifications were 
>> performed and approved before issuance of QuantumCA’s SubCAs.
>>
>> Furthermore, we confirm that the sole purpose of domain sslcom.cn was to 
>> serve CRL and OCSP responses, and SSL.com is the only entity operating the 
>> OCSP responders and CRL distribution points under that domain. There are no 
>> active certificates relying on that domain.  
>>
>> Finally, we would like to point out that section 5.3.1 of our CP/CPS only 
>> applies to employees, agents or independent contractors of SSL.com and 
>> delegated third parties which are engaged in the Certificate Management 
>> Process. As a branded SubCA consumer, QuantumCA was not a delegated third 
>> party of SSL.com. Although not required, SSL.com still performed EV review 
>> on them as we do with all other SubCA resellers.
>>
>> To summarize, the Quantum SubCAs were never enabled for ACME by SSL.com 
>> and they could not have been used to issue certificates with the vulnerable 
>> acme.sh client. During the course of this discussion, due to the 
>> dissolution of Quantum CA Limited, we took additional action in revoking 
>> their SubCAs. We hope these statements address all relevant concerns 
>> regarding HiCA’s use of Quantum SubCAs issued by SSL.com. 
>>
>> On Saturday, 17 June 2023 at 12:58:13 UTC-5 Xiaohui Lam wrote:
>>
>>> John Liptak,
>>>
>>> For the www1.hi.cn,
>>>
>>> There have *no payment business* entry *at the web. *it only accepts 
>>> payments only on command line. So this one is controversial, You can’t ask 
>>> a website that provides only an online donation button for a blog to also 
>>> go through the ICP revenue registration which needs taking more than 10,000 
>>> yuan.
>>>
>>> So we think a website only published tutorials needn't ICP revenue 
>>> business registration.
>>> You can check the website no member link to register/login, and cart 
>>> functions to purchase product.
>>>
>>> - http://web.archive.org/web/20230330032620/https://www1.hi.cn/
>>>
>>> We have no plan to invest resources(about thousands dollars) to apply 
>>> the ICP revenue registration for a dead business.
>>>
>>> ---
>>>
>>> For www.quantumca.com.cn it have revenue business online,  that's our 
>>> mistake and, we decide to apply ICP revenue business registration at Q3. 
>>> Sounds a little off-topic about the question, this thread should closely 
>>> talking about RCE security or things technical. 
>>> 在2023年6月18日星期日 UTC+8 01:33:39<John Liptak> 写道:
>>>
>>>> > We looked up the crt.sh tool [^1], It is a widely accepted way for 
>>>> subordinate CA customization resellers to provide domain for CA’s 
>>>> different 
>>>> OCSP hosting. Look up ocsp responder which public-suffixing .cn,We can 
>>>> find 
>>>> my many responders of Sectigo and DigiCerr own domain ICP but no business 
>>>> ICP.
>>>>
>>>> This is a red herring fallacy. What I asked was your the person in 
>>>> charge of the domain sslcom.cn is different from the person in the ICP 
>>>> beian application you sent to the government. This is what I said:
>>>> *If it is operated by SSL.com, then that means you had provided false 
>>>> materials to the government and the person/legal entity in charge of the 
>>>> website is different from the person in your application*.
>>>>
>>>> Also, Tom from SSL.com has claimed "other than to provide them 
>>>> brandable certificates"; however, I think you must have helped or assisted 
>>>> SSL.com to establish this CRL/OCSP server in China. You are more than a 
>>>> reseller.
>>>>
>>>> Since you mentioned digicert, I did look them up.
>>>>
>>>> digicert.cn is registered and operated by Digicert China. The ICP 
>>>> beian also shows the domain belongs to Digicert China.
>>>>
>>>> dcocsp.cn is registered by iTrusChina. Do you have evidence that 
>>>> iTrusChina is not operating dcocsp.cn? iTrusChina is listed in 
>>>> Digicert's Trusted partners directory. 
>>>> https://www.digicert.com/es/partners/trusted-partners-directory
>>>>
>>>> iTrusChina is a root CA and has obtained webtrust audits.
>>>> Moreover, iTrusChina has ICP license. They also have 电子认证服务许可证, 
>>>> 电子认证服务使用密码许可证, and 电子政务电子认证服务批文 issued by the State Cryptography 
>>>> Administration (国家密码管理局).
>>>>
>>>> Even iTrusChina is not operating dcocsp.cn, again, just because 
>>>> someone else is doing the same thing doesn't mean it's not illegal.
>>>>
>>>> > And many of them have ICP license for domain, but no ICP business 
>>>> license.
>>>> Since you asked this question: I want to point out Digicert has never 
>>>> used digicert.cn to SELL certificates. However, you sell certificates 
>>>> directly on your quantumca.com.cn and www1.hi.cn
>>>> On Saturday, June 17, 2023 at 1:54:11 AM UTC-4 [email protected] wrote:
>>>>
>>>>> Thank you for your further response and questions.
>>>>>
>>>>> > You claimed "We never operates the CRL and OCSP responders. But CA 
>>>>> does(SSL.com can confirm it)," but you are serving CRLs and OCSP 
>>>>> responses 
>>>>> from the domain sslcom.cn, which is registered by 上海帝熙科技有限公司 and the 
>>>>> ICP beian shows it belongs to 上海帝熙科技有限公司. If it is operated by SSL.com, 
>>>>> then that means you had provided false materials to the government and 
>>>>> the 
>>>>> person/legal entity in charge of the website is different from the person 
>>>>> in your application.
>>>>>
>>>>> We looked up the crt.sh tool [^1], It is a widely accepted way for 
>>>>> subordinate CA customization resellers to provide domain for CA’s 
>>>>> different 
>>>>> OCSP hosting. Look up ocsp responder which public-suffixing .cn,We can 
>>>>> find 
>>>>> my many responders of Sectigo and DigiCerr own domain ICP but no business 
>>>>> ICP.
>>>>> And many of them have ICP license for domain, but no ICP business 
>>>>> license.
>>>>> So I think meantimes the subordinate CA’s created at, there’s no leads 
>>>>> to reveal the way is illegal toChinese regulations or violations to 
>>>>> CPS/CP.
>>>>>
>>>>>
>>>>> If my opinion wrong, correct it welcome
>>>>>
>>>>>
>>>>> [1]. https://crt.sh/ocsp-responders
>>>>>
>>>>> Sincere,
>>>>> Bruce Lam
>>>>> ------------------------------
>>>>> 发自我的iPhone
>>>>>
>>>>>
>>>>> ------------------ Original ------------------
>>>>> *From:* John Liptak <[email protected]>
>>>>> *Date:* Sat,Jun 17,2023 10:33 AM
>>>>> *To:* [email protected] <[email protected]>
>>>>> *Cc:* xiaohuilam <[email protected]>, Thomas Zermeno <
>>>>> [email protected]>
>>>>> *Subject:* Re: RCE used by Intermediate CA to issue certificates.
>>>>> I've been a member of chromium-dev group and am particularly 
>>>>> interested in internet security. I choose not to reply all because I'm 
>>>>> asking questions to specific people. The screenshot you've taken shows 
>>>>> I'm 
>>>>> asking that question to you and the SSL.com representative, not to 
>>>>> everyone 
>>>>> else.
>>>>>
>>>>> Because SSL.com CPS 5.3.1 claims they will verify the trustworthiness 
>>>>> of an independent contractor and apparently you are doing this business 
>>>>> illegally in China (e.g., selling digital certificates online without the 
>>>>> ICP license), so I don't think they follow their CPS.
>>>>>
>>>>> You claimed "We never operates the CRL and OCSP responders. But CA 
>>>>> does(SSL.com can confirm it)," but you are serving CRLs and OCSP 
>>>>> responses 
>>>>> from the domain sslcom.cn, which is registered by 上海帝熙科技有限公司 and the 
>>>>> ICP beian shows it belongs to 上海帝熙科技有限公司. If it is operated by SSL.com, 
>>>>> then that means you had provided false materials to the government and 
>>>>> the 
>>>>> person/legal entity in charge of the website is different from the person 
>>>>> in your application.
>>>>>
>>>>> Again, all these evidence reveals SSL.com did not verify the 
>>>>> trustworthiness of an independent contractor and I think they don't 
>>>>> follow 
>>>>> their CPS.
>>>>>
>>>>> I am not Chinese and I have no interest in attacking HiCA. 
>>>>> Nevertheless, I am interested in whether SSL.com and you have followed 
>>>>> the 
>>>>> CPS and operated legally.
>>>>> On Friday, June 16, 2023 at 4:07:33 AM UTC-4 xiaohuilam wrote:
>>>>>
>>>>>> Your horner Mozilla PKI Policy team and CA members,
>>>>>>
>>>>>>
>>>>>> The accusation is fabricated and I have good evidence that 
>>>>>> [email protected] and [email protected] appearing on this mailing 
>>>>>> list are new potential detractors with the identity and speech style of 
>>>>>> https://github.com/acmesh- 
>>>>>> official/acme.sh/issues/4675 and DDOS attack criminals 
>>>>>> https://hostloc.com/thread-1177834-1-1.html are highly similar (do 
>>>>>> not care about technical and industry compliance or even RCE 
>>>>>> vulnerability 
>>>>>> itself, rather than trying to discredit a company as credible).
>>>>>>
>>>>>> I will introduce some of the origins of these IDs with me.
>>>>>> After Matthew Holt revealed that ACME.sh had an RCE vulnerability and 
>>>>>> was exploited by HiCA, our 2 Chinese servers and 6 overseas servers were 
>>>>>> severely attacked by DDOS, and also considered to   so we try to close 
>>>>>> HiCA 
>>>>>> to avoid DDOS attacks from affecting our kernel business users (it is 
>>>>>> web 
>>>>>> page accepts CSR to issue certificates which registered online, which 
>>>>>> has 
>>>>>> nothing to do with ACME in command line).
>>>>>>
>>>>>> However, due to DNS cache and other reasons, the attack continued; 
>>>>>> during this period, we analyzed the logs and switched routes to block a 
>>>>>> large number of IPs. Later we saw that acme.hi.cn and www1.hi.cn had 
>>>>>> no traffic at all and the attack was still affecting until we saw
>>>>>>
>>>>>> - https://hostloc.com/thread-1177834-1-1.html
>>>>>> (He tried to call on others to participate in the CC Flood/DDOS 
>>>>>> website using the webbench tool made by golang, and we believe himself 
>>>>>> participated)
>>>>>>
>>>>>> We contacted the attack source IP ASN owner/ISP: the abuse prevention 
>>>>>> team of IPXO LLC, and finally blocked the attacker's IP.
>>>>>> [image: 网页捕获_16-6-2023_153756_help.ipxo.com.jpeg]
>>>>>>
>>>>>> When we collected all the evidence and prepared to report the case 
>>>>>> added a statement on restored www1.hi.cn website and, the attacker’s 
>>>>>> settlement new topic came, to compromise
>>>>>>
>>>>>> - https://hostloc.com/thread-1178837-1-1.html
>>>>>> - https://hostloc.com/thread-1179012-1-1.html
>>>>>>
>>>>>> The other party expressed their willingness to pay for the part of 
>>>>>> the bill that we can prove to be related to him due to the loss caused 
>>>>>> by 
>>>>>> DDOS. We did not take the next legal action to advocate punishment for 
>>>>>> the 
>>>>>> network DDOS attackers because they did pay me:
>>>>>> [image: 1521686900808_.pic.jpg]
>>>>>> (Note that the memo information of the other party’s remarks is: DDOS 
>>>>>> attack compensation. To protect the privacy of him we did mosaic)
>>>>>>
>>>>>>
>>>>>> We thought the matter was over. I had some unanswered questions on 
>>>>>> twitter just before Matthew Holt's twitter reply. (Forgive the twitter 
>>>>>> account I registered more than ten years ago that has not been used for 
>>>>>> a 
>>>>>> long time and cannot meet the risk control; it took a lot of time to 
>>>>>> re-register one).
>>>>>>
>>>>>> Until this Issues appeared,
>>>>>> - https://github.com/acmesh-official/acme.sh/issues/4675
>>>>>>
>>>>>> It's hard to imagine such abusive voices in the community and on the 
>>>>>> dev-security-policy mailing list. Even though it's an accusation we can 
>>>>>> try 
>>>>>> to respond to, it's frustrating that this post isn't a technical 
>>>>>> accusation. And we found an interesting thing:
>>>>>>
>>>>>> The issuer ID gzchjz007 of 
>>>>>> https://github.com/acmesh-official/acme.sh/issues/4675 is highly 
>>>>>> similar to the criminal ID gzchenjz of our ddos server!
>>>>>>
>>>>>> When I pointed out that their slander is fake, this ID gzchjz007 and 
>>>>>> gzchenjz stopped acting, but a new ID appeared, and came to this 
>>>>>> dev-security-policy post. That's why I think they're suspicious:
>>>>>> - [email protected]
>>>>>> - [email protected]
>>>>>>
>>>>>>
>>>>>> Because they are Chinese speaking people, but pretend to be 
>>>>>> non-asian. they made same mistake i did, they replied author only but 
>>>>>> when 
>>>>>> i respond they quick reposted one time suspicious
>>>>>> [image: image.png]
>>>>>>
>>>>>>
>>>>>> they are obviously Chinese to don't understand two button(“回复全部” and 
>>>>>> “回复作者”)'s difference, they are very familiar with the Chinese network 
>>>>>> but 
>>>>>> pretend to be English nicknames and IDs and to bash competitors., and 
>>>>>> what 
>>>>>> is even more unbelievable is that they did not have any maillist 
>>>>>> participation records before this mailing group.
>>>>>>
>>>>>> [image: image.png]
>>>>>>
>>>>>> [image: image.png]
>>>>>>
>>>>>>
>>>>>>
>>>>>> But if we look up other real industry participants there must be a 
>>>>>> mail listing included.(i tried lookup, No offenses, Mr Kurt Seifried)
>>>>>> [image: image.png]
>>>>>>
>>>>>> I think everyone has the right to accuse because this is freedom, but 
>>>>>> it doesn't mean that one person can play multiple roles to abuse this 
>>>>>> dev-security-policy mailing list, besides who're affiliated with the 
>>>>>> Cybercriminals DDoS Team. 
>>>>>>
>>>>>> If they are really an industry participant who will not commit the 
>>>>>> misconception that OCSP and CRL will be operated by resellers, please 
>>>>>> register an official ID to participate in the discussion. We welcome it, 
>>>>>> and I believe the community does too. But I am convinced that they are 
>>>>>> the 
>>>>>> ones who denial-of-service cyber attacks on our servers, and we have 
>>>>>> decided to formally prosecute them for criminal acts.
>>>>>>
>>>>>>
>>>>>>
>>>>>> Roger M Lambdin <[email protected]> 于2023年6月16日周五 14:34写道:
>>>>>>
>>>>>>> Dear members.
>>>>>>>
>>>>>>> I have conducted a background check on HiCA administrator Xiaohui 
>>>>>>> Lam and would like to share the following with you. These findings are 
>>>>>>> for 
>>>>>>> reference only, so please evaluate them for yourself.
>>>>>>>
>>>>>>> First, in 2013, Xiaohui Lam hijacked AFF promotions by exploiting 
>>>>>>> vulnerabilities in Aliyun forums, defrauded hostloc members by 
>>>>>>> installing 
>>>>>>> backdoors in Discuz forum plugins, and stole others' social accounts 
>>>>>>> through leaked data from CSDN [^1].
>>>>>>>
>>>>>>> Second, in 2015, Xiaohui Lam exploited a vulnerability in the 
>>>>>>> GlobalSign system to sell a large number of 5-year wildcard 
>>>>>>> certificates, 
>>>>>>> but all certificates were revoked after they were discovered [^2].
>>>>>>>
>>>>>>> I would like to emphasize that these are past actions of HiCA 
>>>>>>> administrators and I do not think he will repeat the same mistakes 
>>>>>>> again. 
>>>>>>> However, these events show that he is not a developer who knows very 
>>>>>>> little 
>>>>>>> about security. In the past, he has been someone who knew how to mine 
>>>>>>> vulnerabilities, exploit them and commit fraud and threats against 
>>>>>>> customers.
>>>>>>>
>>>>>>> Based on the above findings, I believe we need to take the following 
>>>>>>> steps:
>>>>>>>
>>>>>>> 1. Considering that he suggested users to execute his script RCE[^3] 
>>>>>>> with root privileges on his official website, we should send a reminder 
>>>>>>> email to all users who have applied for a certificate, asking them to 
>>>>>>> evaluate whether there is unauthorized code on their machines.
>>>>>>>
>>>>>>> 2. the results of the query found that Mr. Lam has two CAs: HiCA and 
>>>>>>> Quantum CA. the website for registration information about Quantum CA 
>>>>>>> is 
>>>>>>> acme.hi.cn. then we need to confirm whether they are using the same 
>>>>>>> infrastructure and whether Quantum CA also uses RCE to issue 
>>>>>>> certificates 
>>>>>>> [^4].
>>>>>>>
>>>>>>> Mr. Lam has shut down HiCA's infrastructure after he was found to be 
>>>>>>> using RCE, but we still need to do a more detailed assessment.
>>>>>>>
>>>>>>> As a member of the community, I believe transparency and trust are 
>>>>>>> vital to us. I hope Mr. Lam will provide the community with a more 
>>>>>>> complete 
>>>>>>> statement and evidence so that the community can evaluate this incident.
>>>>>>>
>>>>>>> [^1]: 
>>>>>>> https://web.archive.org/web/20130816004143/http://bbs.aliyun.com/read.php?tid=144441
>>>>>>> [^2]: https://v2ex.com/t/178503?p=1
>>>>>>> [^3]: 
>>>>>>> https://web.archive.org/web/20230325041716/http://www1.hi.cn/docs/getting-started/acme.sh-installation
>>>>>>> [^4]: https://www.tianyancha.com/company/5599034293
>>>>>>>         https://www.tianyancha.com/company/3435468365
>>>>>>>
>>>>>> 在2023年6月16日星期五 UTC+8 06:00:39<John Liptak> 写道:
>>>>>>>
>>>>>>>> >  First, the cryptography license license is mandatory only for 
>>>>>>>> CAs (organizations who operate PKI facilities);
>>>>>>>>
>>>>>>>> You are operating a CRL & OCSP server in China, right?
>>>>>>>>
>>>>>>>> > Secondly, There are many sole proprietorship (self-employed 
>>>>>>>> people) are also selling SSL digital certificates and running their 
>>>>>>>> own 
>>>>>>>> websites, which is totally unable to enroll ICP Registration License.
>>>>>>>>
>>>>>>>> Just because someone else is doing the same thing doesn't mean it's 
>>>>>>>> not illegal.
>>>>>>>>
>>>>>>>> > your post is completely weering off topic.
>>>>>>>>
>>>>>>>> I'm concerned with SSL.com CP/CPS 5.3.1. It claims "SSL.com 
>>>>>>>> verifies the identity and trustworthiness of all personnel, whether as 
>>>>>>>> an 
>>>>>>>> employee,
>>>>>>>> agent, or an independent contractor, prior to the engagement of 
>>>>>>>> such person(s)."
>>>>>>>>
>>>>>>>> If an independent contractor operates illegally in his/her country, 
>>>>>>>> how can he/she be considered trustworthy?
>>>>>>>>
>>>>>>>

-- 
You received this message because you are subscribed to the Google Groups 
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/64157954-dd43-41c3-9801-b7019f093f7en%40mozilla.org.

Reply via email to