Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Thursday May 04 2017, @04:32PM   Printer-friendly
from the Symantec's-antics dept.

Submitted via IRC for TheMightyBuzzard

Google announced in March its intent to stop trusting all Symantec-issued digital certificates due to the certificate authority's failure to play by the rules. Symantec, its subsidiaries and its partners had been accused of making too many exceptions from Baseline Requirements (BR) in favor of their customers.

The developer of the Chrome web browser initially proposed the reduction of the validity period for newly issued Symantec certificates to nine months or less, gradual distrust and replacement of all existent certificates, and the removal of extended validation (EV) status for Symantec certificates.

[...] After some debate, Google made a second proposal that involves Symantec partnering with one or more existing CAs and using their infrastructure and validation process. Symantec would still handle business relations with customers and all CAs would be cross-signed by the company.

[...] Mozilla has advised Symantec to accept Google's second proposal and said it's open to discussing its implementation. However, if Symantec refuses, Mozilla may take alternative action to "reduce the risk from potential past and future mis-issuances by Symantec, and to ensure future compliance with the BRs and with other root program requirements."

Source: http://www.securityweek.com/mozilla-tells-symantec-accept-googles-ca-proposal


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Informative) by NCommander on Thursday May 04 2017, @05:42PM (9 children)

    by NCommander (2) Subscriber Badge <michael@casadevall.pro> on Thursday May 04 2017, @05:42PM (#504423) Homepage Journal

    Signing from the root is a horrid idea for several reasons. That's why intermediate certificates were created. The total length of the chain is usually 3 (sometimes four) certificates from the root to the leaf. SN's certificate chain is three on soylentnews.org, and four on *.soylentnews.org due to Lets Encrypt having a cross-signature from IdenTrust. The problem with signing from the root is that it means the root certificates are hard to change and manage; the root store has to be updated via system updates, browser updates, and god knows what else, and due to the fact that old crap won't have new roots means that you've got even bigger issues.

    What happened here is Symanptic just gave too many people access to sign certificates, didn't QA that crap, or do anything a CA should be doing. I'm honestly surprised they didn't get the CA death penalty, but a global detrust of the Symanptic roots would probably nuke a third of the Internet include shit like Apple and PayPal (which are signed by or chain to the Symantec root certificate).

    --
    Still always moving
    Starting Score:    1  point
    Moderation   +3  
       Informative=3, Total=3
    Extra 'Informative' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   5  
  • (Score: 2) by Nerdfest on Thursday May 04 2017, @05:47PM (1 child)

    by Nerdfest (80) on Thursday May 04 2017, @05:47PM (#504429)

    include shit like Apple and PayPal

    I thought you were trying to show why it was a *bad* idea.

    • (Score: 0) by Anonymous Coward on Thursday May 04 2017, @05:59PM

      by Anonymous Coward on Thursday May 04 2017, @05:59PM (#504441)

      Normies need services too!

  • (Score: 3, Insightful) by bradley13 on Thursday May 04 2017, @06:07PM (3 children)

    by bradley13 (3053) on Thursday May 04 2017, @06:07PM (#504450) Homepage Journal

    Still, they should have been distrusted (detrusted?). If it nukes a third of the Internet, then it does - any place that matters would replace their cert within a day. Heck, give customers a week's warning, and the effect would be negligible.

    Google is being far too nice.

    --
    Everyone is somebody else's weirdo.
    • (Score: 2) by zocalo on Thursday May 04 2017, @06:32PM (2 children)

      by zocalo (302) on Thursday May 04 2017, @06:32PM (#504465)
      I suspect that will be the next step if Symantec doesn't bite the bullet on Google's proposal. Mozilla has already demonstrated that they are not above effectively killing a major CA with their handling of the similar failure to follow the Baseline Requirements with WoSign/StartCom. That they are siding with Google on this should be all the wake-up that Symantec needs; it might be painful, but it's still a major lifeline compared to the alternative approach that was used on WoSign/StartCom, and that time based de-trusting approach could absolutely be used on Symantec if they don't up their game.
      --
      UNIX? They're not even circumcised! Savages!
      • (Score: 2) by edIII on Thursday May 04 2017, @07:28PM (1 child)

        by edIII (791) on Thursday May 04 2017, @07:28PM (#504496)

        I can't imagine why Symantec wouldn't take the deal. Considering what has happened, they are being allowed to *continue* to service the customer accounts, take money, and basically operate.

        This is forced outsourcing if anything, and a 3rd party company saying we're going to help with the Q&A and cross sign your certs. They failed at the core business of a CA, and now have others helping them.

        I'm reminded of Deadpool here:

        Fellas! Hey! Hey! You only work for that shit-spackled muppet fart. So, I'mma give you a chance for y'all to lay down your firearms... in exchange for preferential,bordering on gentle... possibly even lover-like treatment...

        They're being allowed to live and make money. That's pretty damn gentle lover-like treatment to me :)

        --
        Technically, lunchtime is at any moment. It's just a wave function.
        • (Score: 2) by zocalo on Thursday May 04 2017, @09:30PM

          by zocalo (302) on Thursday May 04 2017, @09:30PM (#504541)
          Nor can I, but Symantec has been "advised" to clean up its act (or rather its partner's and reseller's acts) on BR adherance on previous occasions and failed to do anything about it, so now Google and Mozilla are basically adding an "or else" to the advice, so it's really a matter of how stubborn they are going to be. Symantec is probably fortunate that Google is on point with this, because Mozilla's track record on such half-assed adherance to the BR and failure to fix problems is nothing like as lenient and they'd have probably gone straight for a WoSign-style phased revocation of the problem certificates when Symantec declined the first proposed solution. Still, between Android and Chrome's marketshare dominance, plus the number of third parties that use Mozilla's trust DB (including most *NIX systems), it's pretty obvious that Symantec doesn't have a strong hand to play with so holding out for an even better deal probably won't end well for them.
          --
          UNIX? They're not even circumcised! Savages!
  • (Score: 2, Disagree) by mcgrew on Thursday May 04 2017, @07:05PM (1 child)

    by mcgrew (701) <publish@mcgrewbooks.com> on Thursday May 04 2017, @07:05PM (#504479) Homepage Journal

    I ran across one in Firefox yesterday from Google News. Despite there being no reason at all to need a security certificate for a well-known newspaper. It was hard (and annoying) to get past the multiple warning screens. It isn't like I was buying something or downloading software, those are the places that need certificates.

    My guess was that one of their advertisers had a bad cert.

    --
    mcgrewbooks.com mcgrew.info nooze.org
    • (Score: 2) by KiloByte on Thursday May 04 2017, @09:41PM

      by KiloByte (375) on Thursday May 04 2017, @09:41PM (#504545)

      My guess was that one of their advertisers had a bad cert.

      Yet another thing that Request Policy fixes. Or at least Adblock with a good list, but advertisers multiply like vermin they are, so a blacklist-based approach is never accurate enough.

      --
      Ceterum censeo systemd esse delendam.
  • (Score: 0) by Anonymous Coward on Friday May 05 2017, @03:08AM

    by Anonymous Coward on Friday May 05 2017, @03:08AM (#504656)

    Yes, if there were no intermediate certs, the CAs would be a lot more careful about what they sign. That would increase my level of trust.