TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

StartSSL domain validation vulnerability

154 pointsby bracewelabout 9 years ago

18 comments

G3E9about 9 years ago
When prompting for &quot;postmaster&quot;, &quot;hostmaster&quot; or &quot;webmaster&quot;, the values in that form should be just those and StartSSL should then put the two together ($MASTER_EMAIL + &quot;@&quot; + $DOMAIN.) They shouldn&#x27;t assume that the &quot;sendToEmail&quot; value wasn&#x27;t tampered with or overridden. If the original poster didn&#x27;t include his screenshots or his steps then I wouldn&#x27;t believe such a stupid mistake, especially one made by a certificate authority.<p>Back before I found Gandi.net I came across StartSSL (I was looking for basic SSL certifications.) At the time StartSSL&#x27;s website was horrible, and I mean ugly, it turned me away because it felt so unprofessional. I see now, even with a new flashy website, that they still remain unprofessional (maybe not in their looks, but obviously in their practices.)
评论 #11331826 未加载
评论 #11332889 未加载
pfgabout 9 years ago
&gt; This method is rarely used, instead for the domain validation most certificate authorities ask the domain owner to place a certain file in their websites.<p>This statement strikes me as odd. Email-based validation is the most common validation method used by most CAs for DV certificates. The only exceptions that come to mind are WoSign and Let&#x27;s Encrypt.<p>The vulnerability is pretty bad, though. Good catch.
评论 #11332056 未加载
评论 #11346710 未加载
评论 #11335738 未加载
keketiabout 9 years ago
A vulnerability of this level is inexcusable. StartSSL ought to be removed from all major browsers.
评论 #11332205 未加载
评论 #11332226 未加载
评论 #11332019 未加载
评论 #11331453 未加载
advisedwangabout 9 years ago
Amongst it&#x27;s repsonse, StartSSL should start logging every granted certificate to a Certificate Transparency log. From now on they need to provide the transparency so that site owners can verify there are no phony certificates being issued for their domains.
评论 #11332854 未加载
评论 #11334470 未加载
dan1234about 9 years ago
This seems to an incredibly basic error for a company trusted to issue SSL certificates.<p>How long has this vulnerability existed? Can we trust <i>any</i> StartSSL certificates? Will they charge for revocation, as they did with Heartbleed?
评论 #11331520 未加载
评论 #11332490 未加载
abritishguyabout 9 years ago
If this is genuine then it is absolutely inexcusable - this isn&#x27;t some complex attack, that is web 101 stuff.
评论 #11332626 未加载
mercoraabout 9 years ago
I do not have appropriate words for this. What a terrible nightmare. And even worse the second time they did this. I mean what kind of company is this? I am seriously shattered that they are so careless with so much responsibility. I never liked the trusted CA system on the web but always thought you would need to be at least some state actor or serious professional in order to be able to get hold of certificates from them without validation. They should all be required to get some real security audit on everything involved, and do it again whenever there is a change or some time passed. Without they should be dropped from the list of trusted CAs. I really do not get how this happened. It is like someone did this on purpose. I am sad now.
0x0about 9 years ago
Meanwhile, when I tried to use them for a client&#x27;s domain after actually paying $$$ for business validation I was refused because the names on the WHOIS records didn&#x27;t match our business name.
评论 #11331996 未加载
评论 #11334717 未加载
Titanousabout 9 years ago
This is basically a worst-case scenario. The entire public Certificate Authority trust model depends on the validation of ownership of domains that certificates are being issued for. If an attacker can get a trusted certificate for facebook.com, then they can silently man-in-the-middle connections and pretend to be Facebook.
Karunamonabout 9 years ago
Now that Let&#x27;s Encrypt is a thing, there&#x27;s no reason to do business with these greedy losers.<p>That&#x27;s not just an off the cuff insult either - I find very few charitable words to describe a company that charges $25 to rekey a certificate for reasons outside the user&#x27;s control, i.e. heartbleed.<p>More to the point, in my arrogant opinion, now that a <i>good</i>, free alternative exists, users in the know should pressure the browser makers to come down a lot harder on companies that let this kind of issue fly. There&#x27;s no need to work through the CAB bureaucracy when, say, Google and Mozilla are probably a lot more amenable to dealing with bad (be that by ignorance or malice) actors by refusing to recognize their crappily-validated certificates.
评论 #11331721 未加载
评论 #11332281 未加载
IgorPartolaabout 9 years ago
OK, so this seems like a terrible vulnerability. Does anyone know if (a) StartSSL has been notified and (b) what has been their response. This seems like such a severe vulnerability that publishing it on Blogspot seems too low key. Shouldn&#x27;t there be a CVE about this?
评论 #11331581 未加载
评论 #11335220 未加载
评论 #11331591 未加载
sdcaabout 9 years ago
Could the hotmail address have been allowed because it&#x27;s listed on his domain name&#x27;s WHOIS?
评论 #11336083 未加载
startcomfanabout 9 years ago
check this: <a href="https:&#x2F;&#x2F;www.startssl.com&#x2F;NewsDetails?date=20160322" rel="nofollow">https:&#x2F;&#x2F;www.startssl.com&#x2F;NewsDetails?date=20160322</a>
评论 #11346645 未加载
tehmillhouseabout 9 years ago
Good to know StartSSL is just as shoddy as it&#x27;s always looked. Good thing we have letsencrypt these days.
评论 #11333260 未加载
评论 #11334249 未加载
nlyabout 9 years ago
Arguably this vulnerability is serious enough to see StartSSL dropped from the trusted root store, or at least see browsers taking action to block DV certs from StartSSL issued before a certain date. It&#x2F;they won&#x27;t be, of course, since the whole system is a farce.<p>I&#x27;d lament again how we still need to push DANE, but I was doing that 2 days ago here on HN[0] and I&#x27;m tired of it.<p>Nevermind, maybe the next bug we see will be in one of the other DV methods, like tricking the validator to access a http uri of your choosing rather than &#x27;&#x2F;.well-known&#x2F;&#x27;, for instance. Or authoritative DNS poisoning.<p>[0] <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=11321184" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=11321184</a>
评论 #11345452 未加载
jlgaddisabout 9 years ago
Too bad the author didn&#x27;t issue certificates for, say, google.com, microsoft.com, and&#x2F;or mozilla.org. That&#x27;d be a more likely way of getting those browser makers to put some restrictions or &quot;sanctions&quot; on them like Google recently did with Symantec.
评论 #11332936 未加载
iamkakarotoabout 9 years ago
Interestingly, this blog author hasn&#x27;t activated HTTPS for his own blog yet, which can be done with a single click on the Blogger settings page.
评论 #11335452 未加载
评论 #11332063 未加载
startcomfanabout 9 years ago
and this news:<a href="https:&#x2F;&#x2F;www.startssl.com&#x2F;NewsDetails?date=20160323" rel="nofollow">https:&#x2F;&#x2F;www.startssl.com&#x2F;NewsDetails?date=20160323</a> StartCom log all issued SSL certificates to public CT log servers