Re: WoSign and StartCom

2016-09-26 Thread Percy
"However, many eyes are on the Web PKI and if such additional back-dating is discovered (by any means), Mozilla will immediately and permanently revoke trust in all WoSign and StartCom roots." Could you elaborate a bit on concrete ways of discovering such backdating? As WoSign itself suggested,

Re: WoSign and StartCom

2016-09-26 Thread Han Yuwei
在 2016年9月26日星期一 UTC+8下午10:21:13,Gervase Markham写道: > Today, Mozilla is publishing an additional document containing further > research into the back-dating of SHA-1 certificates, in violation of the > CAB Forum Baseline Requirements, to avoid browser blocks. It also > contains some conclusions we h

Re: Guang Dong Certificate Authority (GDCA) root inclusion request

2016-09-26 Thread wangsn1206
在 2016年9月27日星期二 UTC+8上午4:15:00,Andrew R. Whalley写道: > Hello, > > I have completed a read through of the English translations of the CP > (v1.2) and CPS (v4.1). Before I post my comments I wanted to see if there > were any more recent translations? It looks like the local language > versions are 1

Incident Report - certificate with 'sb' as a SAN:dnsName

2016-09-26 Thread Robin Alden
SUMMARY: Comodo was alerted at September 24 2016 07:11 BST to a report [1] of the issuance by Comodo of a Server Authentication certificate [2] that includes 'sb' as a SAN:dNSName. sb is a gTLD. OUR CURRENT (PRE-BALLOT 169) POLICY REGARDING 'www': To establish context, first we will explain our p

Re: Updating Production Common CA Database

2016-09-26 Thread Kathleen Wilson
> > - Reports which use 'Signature Algorithm'/ 'Signing Key Parameters' will > > show the new fields instead. > > - CSV Reports which use 'Signature Algorithm'/ 'Signing Key Parameters' > > will show the new fields instead. > > > The reports are still being updated. Some additional changes to

Re: Updating Production Common CA Database

2016-09-26 Thread Jakob Bohm
On 26/09/2016 11:05, Gervase Markham wrote: Hi Kathleen, This generally all looks excellent, but: On 25/09/16 00:02, Kathleen Wilson wrote: - 'CRl URl(s)' will be populated by urls ending with .crl only There is no standard, AFAIK, which requires CRL URLs to end in ".crl". File extensions in

Re: Updating Production Common CA Database

2016-09-26 Thread Peter Bowen
How about CA ID? On Sep 26, 2016 16:26, "Kathleen Wilson" wrote: > > "Certificate ID" seems like entirely the wrong name for this field, > > given that it [SHA-256(der(subject) + der(spki))] doesn't actually > > identify a unique certificate! > > Indeed, the whole point of having this > > field

Re: Updating Production Common CA Database

2016-09-26 Thread Kathleen Wilson
> "Certificate ID" seems like entirely the wrong name for this field, > given that it [SHA-256(der(subject) + der(spki))] doesn't actually > identify a unique certificate! > Indeed, the whole point of having this > field seems to be to identify _multiple_ related certificates. Correct > Why not

Re: Time to distrust

2016-09-26 Thread Jakob Bohm
On 23/09/2016 18:46, Ryan Sleevi wrote: On Friday, September 23, 2016 at 9:15:48 AM UTC-7, Jakob Bohm wrote: they are nowhere as bad as proponents of extreme centralization schemes claim. Citation needed. It would seem that you're not familiar with the somewhat well-accepted industry state of

Re: Time to distrust

2016-09-26 Thread Peter Kurrasch
The actual revocation model I had in mind was a more friendly one where the cert holder wants it revoked for some reason. This was based on your research which showed that many ‎WoSign clients were not using their WoSign-issued certs. (I don't remember if you indicated they had switched to a dif

WoSign and duplicate serial numbers

2016-09-26 Thread Kurt Roeckx
Hi, In their report and the audit statement they talk about 392 duplicate serial numbers, with links to the crt.sh page for those serial numbers. But they in fact actually point to 393, the first group has 314 and not 313 duplicates in it. This was already the case before they published their new

Re: Guang Dong Certificate Authority (GDCA) root inclusion request

2016-09-26 Thread Andrew R. Whalley
Hello, I have completed a read through of the English translations of the CP (v1.2) and CPS (v4.1). Before I post my comments I wanted to see if there were any more recent translations? It looks like the local language versions are 1.4 and 4.3 respectively. Many thanks, Andrew On Wed, Aug 3, 2

Re: Updating Production Common CA Database

2016-09-26 Thread Rob Stradling
Hi Kathleen. "Certificate ID" seems like entirely the wrong name for this field, given that it [SHA-256(der(subject) + der(spki))] doesn't actually identify a unique certificate! Indeed, the whole point of having this field seems to be to identify _multiple_ related certificates. Why not call it

Re: WoSign and StartCom

2016-09-26 Thread Gervase Markham
On 26/09/16 19:13, Andrew Ayer wrote: > Fair enough. You should revise the following wording which says > that the serial numbers and public keys are the same: Updated again. Gerv ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.

Re: WoSign and StartCom

2016-09-26 Thread Andrew Ayer
On Mon, 26 Sep 2016 18:54:09 +0100 Gervase Markham wrote: > > The two *.zlbaba.com certificates (https://crt.sh/?id=30773543 and > > https://crt.sh/?id=31103218) do not appear to be matching to me: > > their public keys and serial numbers are different. > > The serial numbers of all the pairs ar

Re: WoSign and StartCom

2016-09-26 Thread Gervase Markham
On 26/09/16 18:10, Andrew Ayer wrote: > This contradicts the "Issue D" section at > https://wiki.mozilla.org/CA:WoSign_Issues which says that this > issue was not a BR violation. You are quite right, thank you - fixed :-) > The two *.zlbaba.com certificates (https://crt.sh/?id=30773543 and > http

Re: WoSign and StartCom

2016-09-26 Thread Andrew Ayer
> This fixing of the notAfter date in this style of certificate may > have been a sensible move to avoid accidentally issuing SHA-1 > certificates whose validity extends into 2017, which would also be a > BR violation. This contradicts the "Issue D" section at https://wiki.mozilla.org/CA:WoSign_Is

Re: Updating Production Common CA Database

2016-09-26 Thread Kathleen Wilson
> Summary of changes: > > - 'Signature Hash Algorithm' will have new drop down list: > md2WithRSAEncryption, md5WithRSAEncryption, sha1WithRSAEncryption, > sha256WithRSAEncryption, sha384WithRSAEncryption, sha512WithRSAEncryption, > ecdsaWithSHA256, ecdsaWithSHA384. ecdsaWithSHA521 > - 'Public

Re: Updating Production Common CA Database

2016-09-26 Thread Kathleen Wilson
On Monday, September 26, 2016 at 2:06:22 AM UTC-7, Gervase Markham wrote: > Hi Kathleen, > > This generally all looks excellent, but: > > On 25/09/16 00:02, Kathleen Wilson wrote: > > - 'CRl URl(s)' will be populated by urls ending with .crl only > > There is no standard, AFAIK, which requires C

Re: WoSign and StartCom

2016-09-26 Thread yuhongbao_386
On Monday, September 26, 2016 at 7:21:13 AM UTC-7, Gervase Markham wrote: > Today, Mozilla is publishing an additional document containing further > research into the back-dating of SHA-1 certificates, in violation of the > CAB Forum Baseline Requirements, to avoid browser blocks. It also > contain

Re: Sanctions short of distrust

2016-09-26 Thread Gervase Markham
On 26/09/16 12:25, Rob Stradling wrote: > Who determines whether or not the PSL is accurate? Does common sense > ever override the explicitly stated will of the TLD operator? Normally no, not for the explicitly-stated will (e.g. an email to us). It might perhaps override a random policy document,

WoSign and StartCom

2016-09-26 Thread Gervase Markham
Today, Mozilla is publishing an additional document containing further research into the back-dating of SHA-1 certificates, in violation of the CAB Forum Baseline Requirements, to avoid browser blocks. It also contains some conclusions we have drawn from the recent investigations, and a proposal fo

Re: Sanctions short of distrust

2016-09-26 Thread Simone Carletti
On Mon, Sep 26, 2016 at 1:14 PM, Gervase Markham wrote: > There are several .ru in your list; we should check whether the PSL is > actually accurate. I think they opened up a lot of previously-reserved > domains a while back, but it's hard to find the right records. > .RU entries need a cleanup.

Re: Sanctions short of distrust

2016-09-26 Thread Rob Stradling
Who determines whether or not the PSL is accurate? Does common sense ever override the explicitly stated will of the TLD operator? (BTW, just to be clear: I wasn't alleging, or even speculating, that the certs containing dNSNames for these public suffices were necessarily misissued. I only wante

Re: Sanctions short of distrust

2016-09-26 Thread Gervase Markham
On 26/09/16 11:14, Rob Stradling wrote: > ICANN: kuzbass.ru There are several .ru in your list; we should check whether the PSL is actually accurate. I think they opened up a lot of previously-reserved domains a while back, but it's hard to find the right records. These are the non-RU entries:

Re: Sanctions short of distrust

2016-09-26 Thread Rob Stradling
On 26/09/16 10:07, Gervase Markham wrote: > Hi Rob, > > On 23/09/16 16:18, Rob Stradling wrote: >> BTW, I also found certs containing the following ICANN suffixes (i.e., >> PSL+0), some of which may be of interest: > > Are these in the PUBLIC or PRIVATE section of the PSL? (s/PUBLIC/ICANN) A m

Re: Time to distrust

2016-09-26 Thread Gervase Markham
On 23/09/16 17:15, Jakob Bohm wrote: > Mechanisms such as OneCRL tend to be horribly incomplete. Just in the > past few months there has been repeated mention on this list of revoked > certificates that were not on OneCRL, only on the CA CRLs. OneCRL is not intended to be a comprehensive list of

Re: WoSign and StartCom audit reports

2016-09-26 Thread Eddy Nigg
On 09/23/2016 10:11 PM, Peter Bowen wrote: On Fri, Sep 23, 2016 at 10:46 AM, Eddy Nigg wrote: Speaking only for StartCom here, as far as I know and as per auditing standards, all intermediate CAs are audited (no external intermediates existed). As to network security, I believe this is part of

Re: Sanctions short of distrust

2016-09-26 Thread Gervase Markham
Hi Rob, On 23/09/16 16:18, Rob Stradling wrote: > BTW, I also found certs containing the following public suffixes (i.e., > PSL+0), some of which may be of interest: Are these in the PUBLIC or PRIVATE section of the PSL? CAs are, with appropriate caution, not constrained from issuing certificates

Re: Updating Production Common CA Database

2016-09-26 Thread Gervase Markham
Hi Kathleen, This generally all looks excellent, but: On 25/09/16 00:02, Kathleen Wilson wrote: > - 'CRl URl(s)' will be populated by urls ending with .crl only There is no standard, AFAIK, which requires CRL URLs to end in ".crl". File extensions indicating the file type were originally a Windo

Re: Comodo issued a certificate for an extension

2016-09-26 Thread Showfom
On Saturday, September 24, 2016 at 7:07:39 AM UTC+8, Showfom wrote: > First, let me introduce myself, I'm a famous investor of ccTLD domains from > China. > > Recently we get an easy-remember domain www.sb, please note the extension is > .sb > > I ordered a Comodo Positive SSL for this domain,

Re: Comodo issued a certificate for an extension

2016-09-26 Thread Showfom
On Sunday, September 25, 2016 at 6:24:11 AM UTC+8, Percy wrote: > Ha! @Showfom perhaps you should try getting a widecard cert from them and > consequently obtain a cert for all *.sb domains. I tried to get cert from StartSSL, they will only issue www.sb or www.www.sb, that's good. __