Facebook is using a wildcard for SSL. The following are a list of domains/hosts the cert provides for. Notice the additional onion addresses
Not Critical DNS Name: *.facebook.com DNS Name: facebook.com DNS Name: *.fb.com DNS Name: *.fbsbx.com DNS Name: *.fbcdn.net DNS Name: *.xx.fbcdn.net DNS Name: *.xy.fbcdn.net DNS Name: fb.com DNS Name: facebookcorewwwi.onion DNS Name: fbcdn23dssr3jqnq.onion DNS Name: fbsbx2q4mvcl63pw.onion I'm still wondering how one verifies ownership of a .onion domain? You aren't going to look at the WHOIS record and send an email to the technical contact on file or send an email to postmaster@xxx.onion. Do large companies like FB have a fast track for getting odd requests? On Fri, Oct 31, 2014 at 9:05 AM, AntiTree <antit...@gmail.com> wrote: > I find the interesting part the fact that they got a CA to sign a .onion > domain certificate. Is that normal? > > On Fri, Oct 31, 2014 at 8:39 AM, Nariman Gharib <nariman...@gmail.com> > wrote: >> >> It's important to us at Facebook to provide methods for people to use >> our site securely. People connect to Facebook in many different ways, >> which is why we have implemented HTTPS across our service, and Perfect >> Forward Secrecy, HSTS, and other technologies which help give people >> more confidence that they are connected securely to Facebook. >> >> >> That doesn't mean we can't improve yet further. >> >> >> Consider Tor: Tor challenges some assumptions of Facebook's security >> mechanisms - for example its design means that from the perspective of >> our systems a person who appears to be connecting from Australia at >> one moment may the next appear to be in Sweden or Canada. In other >> contexts such behaviour might suggest that a hacked account is being >> accessed through a "botnet", but for Tor this is normal. >> >> >> Considerations like these have not always been reflected in Facebook's >> security infrastructure, which has sometimes led to unnecessary >> hurdles for people who connect to Facebook using Tor. To make their >> experience more consistent with our goals of accessibility and >> security, we have begun an experiment which makes Facebook available >> directly over Tor network at the following URL: >> >> >> https://facebookcorewwwi.onion/ >> >> >> [ NOTE: link will only work in Tor-enabled browsers ] >> >> >> Facebook Onion Address >> >> >> Facebook's onion address provides a way to access Facebook through Tor >> without losing the cryptographic protections provided by the Tor >> cloud. >> >> >> The idea is that the Facebook onion address connects you to Facebook's >> Core WWW Infrastructure - check the URL again, you'll see what we did >> there - and it reflects one benefit of accessing Facebook this way: >> that it provides end-to-end communication, from your browser directly >> into a Facebook datacentre. >> >> >> We decided to use SSL atop this service due in part to architectural >> considerations - for example, we use the Tor daemon as a reverse proxy >> into a load balancer and Facebook traffic requires the protection of >> SSL over that link. As a result, we have provided an SSL certificate >> which cites our onion address; this mechanism removes the Tor >> Browser's "SSL Certificate Warning" for that onion address and >> increases confidence that this service really is run by Facebook. >> Issuing an SSL certificate for a Tor implementation is - in the Tor >> world - a novel solution to attribute ownership of an onion address; >> other solutions for attribution are ripe for consideration, but we >> believe that this one provides an appropriate starting point for such >> discussion. >> >> >> Over time we hope to share some of the lessons that we have learned - >> and will learn - about scaling and deploying services via the Facebook >> onion address; we have many ideas and are looking forward to improving >> this service. A medium-term goal will be to support Facebook's >> mobile-friendly website via an onion address, although in the meantime >> we expect the service to be of an evolutionary and slightly flaky >> nature. >> >> >> We hope that these and other features will be useful to people who >> wish to use Facebook's onion address. >> >> >> Finally, we would like to extend our thanks to Ms. Runa Sandvik and to >> Dr. Steven Murdoch of UCL for their kind assistance and generous >> advice in the development of this project. >> >> >> Alec Muffett is a Software Engineer for Security Infrastructure at >> Facebook London. >> >> >> SOURCE: >> https://www.facebook.com/notes/protect-the-graph/making-connections-to-facebook-more-secure/1526085754298237 >> >> >> -- >> PGP: 0xa53963936999cbb6 >> -- >> Liberationtech is public & archives are searchable on Google. Violations >> of list guidelines will get you moderated: >> https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, >> change to digest, or change password by emailing moderator at >> compa...@stanford.edu. > > -- Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu.