[191259] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Chinese root CA issues rogue/fake certificates

daemon@ATHENA.MIT.EDU (Eric Kuhnke)
Wed Aug 31 02:02:37 2016

X-Original-To: nanog@nanog.org
In-Reply-To: <CA+E3k91eiwyykLV05fVL89Fd=USe-pzuhFRx4SFaCnuYMYskKA@mail.gmail.com>
From: Eric Kuhnke <eric.kuhnke@gmail.com>
Date: Tue, 30 Aug 2016 23:02:16 -0700
To: Royce Williams <royce@techsolvency.com>
Cc: "nanog@nanog.org list" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

mozilla.dev.security thread:

https://groups.google.com/forum/m/#!topic/mozilla.dev.security.policy/k9PBmyLCi8I/discussion


On Aug 30, 2016 10:12 PM, "Royce Williams" <royce@techsolvency.com> wrote:

> On Tue, Aug 30, 2016 at 8:38 PM, Eric Kuhnke <eric.kuhnke@gmail.com>
> wrote:
> >
> > http://www.percya.com/2016/08/chinese-ca-wosign-faces-revocation.html
> >
> > One of the largest Chinese root certificate authority WoSign issued many
> > fake certificates due to an vulnerability.  WoSign's free certificate
> > service allowed its users to get a certificate for the base domain if
> they
> > were able to prove control of a subdomain. This means that if you can
> > control a subdomain of a major website, say percy.github.io, you're
> able to
> > obtain a certificate by WoSign for github.io, taking control over the
> > entire domain.
>
>
> And there is now strong circumstantial evidence that WoSign now owns -
> or at least, directly controls - StartCom:
>
> https://www.letsphish.org/?part=about
>
> There are mixed signals of incompetence and deliberate action here.
>
> Royce
>

home help back first fref pref prev next nref lref last post