TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

WoSign Incidents Report Update [pdf]

113 pointsby xnyhpsover 8 years ago

12 comments

teromover 8 years ago
Awesome use of load balancing for request retry across multiple backend servers:<p>&gt; This was caused by the CMS (Certificate Management System), when it sent the signing request of the certificate to the signing server A, which had no response, then the CMS sent it to the other newly added signing server B. After a while the signing server A signed the certificate and sent to the CMS and also to the subscriber, then the subscriber installed the cert in its website and hat&#x27;s why Censys recorded this certificate; in the meantime, the signing server B also signed this certificate some time later (in seconds) and sent it to the CMS, the CMS accepted it and rewrote it in the DB.<p>&gt; This issue happened after adding another signing server on Jan 5th 2015, and found it on April 9th 2015. When had the two signing servers added a load balancer, but the configuration was not properly done because it didn&#x27;t lock the request.<p>Mind you, that&#x27;s a perfectly legit technical bug. Maybe they were using nginx for load balancing POST requests? :)<p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=11217477" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=11217477</a>
评论 #12668797 未加载
zamberover 8 years ago
Cross linking the earlier WoSign scandal reports: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=12389573" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=12389573</a> <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=12582534" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=12582534</a> <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=12617659" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=12617659</a><p>So if I get it right, WoSign will cease to exist as a CA given the 1y probation proposed by Mozilla and the general distrust that will follow?
评论 #12667393 未加载
ctzover 8 years ago
&gt; &quot;Many customers in China find it important to use a domestic CA for purposes of security.&quot;<p>That&#x27;s not how the CA system works. Your security is unaffected by what CA you choose; it is invariably the minimum of all trusted CAs.
评论 #12666415 未加载
评论 #12666729 未加载
评论 #12666902 未加载
评论 #12666648 未加载
nikcubover 8 years ago
Interesting aside that came out of this case is the issue of cross-signing intermediary and root certs and it not being disclosed.<p>The WoSign roots were cross-signed by[0] Comodo and StartCom (owned by WoSign, but we didn&#x27;t know that), so even with WoSign roots being revoked, there would still be a verification path.<p>Nice to see that now there is an effort to disclose all of these[2][3], and[1]:<p>&gt; Mozilla now requires the disclosue of all intermedidate certificates, including those cross-certificates.<p>[0] <a href="https:&#x2F;&#x2F;wiki.mozilla.org&#x2F;CA:WoSign_Issues#Cross_Signing" rel="nofollow">https:&#x2F;&#x2F;wiki.mozilla.org&#x2F;CA:WoSign_Issues#Cross_Signing</a><p>[1] <a href="https:&#x2F;&#x2F;groups.google.com&#x2F;d&#x2F;msg&#x2F;mozilla.dev.security.policy&#x2F;k9PBmyLCi8I&#x2F;5c1c6L7JFwAJ" rel="nofollow">https:&#x2F;&#x2F;groups.google.com&#x2F;d&#x2F;msg&#x2F;mozilla.dev.security.policy&#x2F;...</a><p>[2] <a href="https:&#x2F;&#x2F;crt.sh&#x2F;mozilla-disclosures" rel="nofollow">https:&#x2F;&#x2F;crt.sh&#x2F;mozilla-disclosures</a><p>[3] <a href="https:&#x2F;&#x2F;secure.comodo.com&#x2F;products&#x2F;publiclyDisclosedSubCACerts" rel="nofollow">https:&#x2F;&#x2F;secure.comodo.com&#x2F;products&#x2F;publiclyDisclosedSubCACer...</a>
cpercivaover 8 years ago
Is the CEO stepping down because fraudulent certificates were signed, or is he stepping down because they got caught?
评论 #12666485 未加载
评论 #12666389 未加载
koolbaover 8 years ago
When you have a business that effectively prints money, why do something this stupid?<p>I also wonder how much more effort they thought it was to write the code to backdate the certs (rather than use &quot;now&quot;) v.s. code for upgrading to SHA-256.
评论 #12666535 未加载
nlyover 8 years ago
A shame. WoSign were super generous with their free certificate offering long before LetsEncrypt was a thing. They were a a handy alternative.<p>We should be thanking them for their free certs, and thanking them again now for giving us another example of how the PKI is a farce. The chances are there are a bunch other &#x27;reputable&#x27; CAs out there playing these games.
评论 #12670144 未加载
评论 #12666814 未加载
dredmorbiusover 8 years ago
This story is a bit of a mess to make sense of coming in cold and reading a Google Groups summary. Here&#x27;s my read, which may help clarify the story for others.<p>Mozilla have an excellent explanation document covering the backdated certs in detail here: <a href="https:&#x2F;&#x2F;docs.google.com&#x2F;document&#x2F;d&#x2F;1C6BlmbeQfn4a9zydVi2UvjBGv6szuSB4sMYUcVrR8vQ&#x2F;preview" rel="nofollow">https:&#x2F;&#x2F;docs.google.com&#x2F;document&#x2F;d&#x2F;1C6BlmbeQfn4a9zydVi2UvjBG...</a><p>(Thanks to @xnyhps for the link in a reply to this comment.)<p>WoSign, described elsewhere as China&#x27;s largest certificates authority, are a CA who have been found to have backdated SHA1 ceritificates to work around browser restrictions on SHA1 cert issueances. SHA1 is no longer considered secure. Resolution of that issue is discussed in new mozilla.dev.security.policy Usenet group peered by Google Groups: <a href="https:&#x2F;&#x2F;groups.google.com&#x2F;forum&#x2F;#!msg&#x2F;mozilla.dev.security.policy&#x2F;1XI3Y7PJ1Uc&#x2F;qc9PvezXFwAJ" rel="nofollow">https:&#x2F;&#x2F;groups.google.com&#x2F;forum&#x2F;#!msg&#x2F;mozilla.dev.security.p...</a><p>A better source for WoSign&#x27;s update to the story is in the PDF posted to the newsgroup, here: <a href="https:&#x2F;&#x2F;www.wosign.com&#x2F;report&#x2F;WoSign_Incident_Report_Update_07102016.pdf" rel="nofollow">https:&#x2F;&#x2F;www.wosign.com&#x2F;report&#x2F;WoSign_Incident_Report_Update_...</a><p>Titled &quot;WoSign Incidents Report Update&quot;. Which is even less descriptive than the title presently given on this HN post, though perhaps what HN posting guidelines prefer. I&#x27;ll let @dang wrestle his conscience on that one.<p>In that document are several issues listed, the one relevant to this HN post appears to be:<p>&quot;9. Issue S: Backdated SHA-1 Certs (January 2016)<p>&quot;WoSign has issued certificates after January 1st 2016 but backdated the notBefore date to be in December 2015. This has the effect of avoiding the blocks in browsers regarding SHA-1 certs issued after January 1st 2016. The number of certs affected is probably 67, but may be a few more or less.&quot;<p>Following down from there, several corporate restructuring steps are mentioned, including:<p><i>360’s Corporate Development team has been notified to execute the process to legally separate Wosign and Startcom and to begin executing personnel reassignments. StartCom’s chairman will be Xiaosheng Tan (Chief Security Officer of Qihoo 360). StartCom’s CEO will be Inigo Barreira (formerly GM of StartCom Europe). Richard Wang will be relieved of his duties as CEO of WoSign.</i><p>There is background on the story from:<p>&quot;WoSign Mis-Issued SHA-1 SSL Certificates [Updated]&quot; (August 24, 2016) <a href="https:&#x2F;&#x2F;www.thesslstore.com&#x2F;blog&#x2F;wosign-mis-issued-sha-1-ssl&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.thesslstore.com&#x2F;blog&#x2F;wosign-mis-issued-sha-1-ssl...</a><p>&quot;Mozilla Ready to Ban WoSign Certificates for One Year After Shady Behavior&quot; (September 26, 2016)<p>The second article details Mozilla&#x27;s issues with WoSign, including purchase of an Israeli CA, StartCom <a href="http:&#x2F;&#x2F;news.softpedia.com&#x2F;news&#x2F;mozilla-ready-to-ban-wosign-certificates-for-one-year-after-shady-behavior-508674.shtml" rel="nofollow">http:&#x2F;&#x2F;news.softpedia.com&#x2F;news&#x2F;mozilla-ready-to-ban-wosign-c...</a><p>I&#x27;m not claiming anything other than a 15 minute familiarity with the situation here. I may have heard earlier rumblings but really haven&#x27;t followed this at all and wasn&#x27;t consciously aware of particulars.
评论 #12666407 未加载
gogopuppygogoover 8 years ago
Mirror of the PDF version of the incident report if they take down the original or it goes down: <a href="http:&#x2F;&#x2F;clicky.strapr.com&#x2F;3g1s1y1k0Y2J" rel="nofollow">http:&#x2F;&#x2F;clicky.strapr.com&#x2F;3g1s1y1k0Y2J</a>
ajdlinuxover 8 years ago
Direct link to PDF report: <a href="https:&#x2F;&#x2F;www.wosign.com&#x2F;report&#x2F;WoSign_Incident_Report_Update_07102016.pdf" rel="nofollow">https:&#x2F;&#x2F;www.wosign.com&#x2F;report&#x2F;WoSign_Incident_Report_Update_...</a>
tarancatoover 8 years ago
So much money they are making and they can&#x27;t hire anybody who can write English properly or write a PDF that is not composed of a handful of font faces and sizes.<p>I also find it funny they have fired the CEO (the PDF does not say he stepped down voluntarily) but he&#x27;s the one sending that link to the mailing list. I call bs.
评论 #12666911 未加载
评论 #12666469 未加载
lifeisstillgoodover 8 years ago
So I am wondering how this mess got started<p>Is it just incredible incompetence on WoSign&#x27;s part or is there a stronger reason why China&#x27;s largest CA is trying to keep issuing weak certificates? Is is tinfoil-hattery to assume that the Chinese government is not ready for SSL to start getting unreadable again?
评论 #12666600 未加载
评论 #12666515 未加载