Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Tuesday September 27 2016, @07:23AM   Printer-friendly
from the who-CAN-you-trust? dept.

Over the last several months Mozilla has been investigating a large number of breaches of what Mozilla deems to be acceptable CA protocols by the Chinese root CA WoSign and their perhaps better known subsidiary StartCom, whose acquistion by WoSign is one of the issues in question. Mozilla has now published their proposed solution (GoogleDocs link), and it's not looking good for WoSign and Startcom. Mozilla's position is that they have lost trust in WoSign and, by association StartCom, with a proposed action to give WoSign and StartCom a "timeout" by distrusting any certificates issued after a date to be determined in the near future for a period of one year, essentially preventing them issuing any certificates that will be trusted by Mozilla. Attempts to circumvent this by back-dating the valid-from date will result in an immediate and permanent revocation of trust, and there are some major actions required to re-establish that trust at the end of the time out as well.

This seems like a rather elegant, if somewhat draconian, solution to the issue of what to do when a CA steps out of line. Revoking trust for certificates issued after a given date does not invalidate existing certificates and thereby inconvenience their owners, but it does put a severe - and potentially business ending - penalty on the CA in question. Basically, WoSign and StartCom will have a year where they cannot issue any new certificates that Mozilla will trust, and will also have to inform any existing customers that have certificate renewals due within that period they cannot do so and they will need to go else where - hardly good PR!

What do the Soylentils think? Is Mozilla going too far here, or is their proposal justified and reasonable given WoSign's actions, making a good template for potential future breaches of trust by root CAs, particularly in the wake of other CA trust breaches by the likes of CNNIC, DigiNotar, and Symantec?

It appears this situation developed from this discussion at Google Groups.

[Editor's Note: SoylentNews used StartCom certificates in the past but we now use only certificates from Gandi and "Let's Encrypt."]


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Informative) by zocalo on Tuesday September 27 2016, @09:15AM

    by zocalo (302) on Tuesday September 27 2016, @09:15AM (#406883)
    Look again. They're not going to breaking any existing certs - by Startcom or WoSign - they're proposing to start rejecting certs with a NotBefore date that is yet to be determined and lies at some point in the future specifically to avoid end user disruption; there won't be any existing certs that stop working until they expire anyway, apart from the few documented special cases of the "Macau certificates". They've also identified some major flaws and policy violations in WoSign's setup that now appear to have been adopted by StartCom, either by a copy of the WoSign proceedures and infrastructure or by moving StartCom's operations to China - the time of certificate issuance suggests the latter, and use of infratructure software that is five *years* behind on its patches. Hardly a ringing endorsement for a business that is, by definition, based on trust and accountability. You do have a point on Comodo though; they only managed to get away with it by being the first one to get caught out so the policies and procedures in place were not as robust, but everyone in the CA business should be well aware that things have been getting much more strict since then with the other CA issues I linked at the end.

    Anyway, good luck with your new browser. Ryan Sleevi, one of the authors of the proposal, works for Google on Chromium's CA, so it seems very likely Google will be following suit, and since all the major players have generally acted in unison when it comes to matters like this I'd say the writing is on the wall unless there are some compelling objections raised in response to Mozilla's proposal.
    --
    UNIX? They're not even circumcised! Savages!
    Starting Score:    1  point
    Moderation   +3  
       Informative=3, Total=3
    Extra 'Informative' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   5  
  • (Score: 2) by TheRaven on Wednesday September 28 2016, @08:46AM

    by TheRaven (270) on Wednesday September 28 2016, @08:46AM (#407287) Journal

    They're not going to breaking any existing certs - by Startcom or WoSign - they're proposing to start rejecting certs with a NotBefore date that is yet to be determined and lies at some point in the future specifically to avoid end user disruption

    And they're going to continue to do so for a year. StartSSL's free certs are only valid for one year, which means that this is guaranteeing to break free certs for at least a few months and force everyone to move to something else. Purely by coincidence, the backers of this proposal are also the backers of Let's Encrypt, for whom StartCom is the major competitor.

    --
    sudo mod me up