TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Symantec caught once again improperly issuing illegitimate HTTPS certificates

114 pointsby ghoshover 8 years ago

9 comments

Titanousover 8 years ago
Previous discussion: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=13449398" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=13449398</a><p>(edited for clarity)
评论 #13464573 未加载
bandramiover 8 years ago
I sometimes wonder why we don&#x27;t just skip the CA layer entirely and let the browsers be the CAs. Buy a &quot;mozilla cert&quot; and an &quot;IE cert&quot; and a &quot;Chrome cert&quot;, and all the derivatives of them can hitch a ride based on that. It would fund browser development and eliminate the steaming pile of misplaced trust that is the PKI system.<p>Sometime last year I deleted my CA certificates because I finally realized I&#x27;m never going to actually audit all of the certs in there, and I <i>know</i> there are confirmed bad actors among them, so I shouldn&#x27;t give myself a false sense of security.
评论 #13464322 未加载
EdHominemover 8 years ago
We&#x27;ve got a real too-big-to-fail going on here. If a little company screwed something up this badly they&#x27;d be dead. But when one the size of Symantec screws up - oh well they&#x27;ve got too many customers for us to revoke their signing privileges.<p>It&#x27;s a ridiculous system and fwiw, it shouldn&#x27;t be the security companies (though that&#x27;s being very polite to Symantec) that grant certificates. It should be notary publics (a business all about assurance of human identity) using a physical appliance.<p>Or, admit we don&#x27;t care and ditch the entire system for something based on bailing wire and chewing gum, because that&#x27;s roughly what we&#x27;ve got now.
评论 #13464238 未加载
评论 #13463824 未加载
评论 #13463818 未加载
finnnover 8 years ago
Source: <a href="https:&#x2F;&#x2F;www.mail-archive.com&#x2F;dev-security-policy@lists.mozilla.org&#x2F;msg05455.html" rel="nofollow">https:&#x2F;&#x2F;www.mail-archive.com&#x2F;dev-security-policy@lists.mozil...</a>
poizan42over 8 years ago
Wouldn&#x27;t a course of action be to forbid Symantec from letting their partners issue certificates using their intermediate CAs? That would probably mean that Symantec would have to pay compensation to their partners for being forced to breach their contract.
SEJeffover 8 years ago
When is Google &#x2F; Mozilla going to just blacklist them as a CA for anything going forward? This seems like a thing where they&#x27;d be lucky to give you a single warning as this could literally get people killed due to oppressive regimes doing MiTM.
HillaryBrissover 8 years ago
i like the wording in Symantec&#x27;s press release: &quot;Symantec has learned of a possible situation...&quot;<p>so, let&#x27;s not be hasty. this isn&#x27;t a security problem. it&#x27;s just a &quot;possible situation&quot;.<p>hell, we&#x27;ve all been in situations before. there&#x27;s nothing inherently wrong with a situation, even if it took place in a location named &quot;test, Korea&quot;. i mean, hey, we&#x27;ve all taken tests. some of us have even been in test situations. it&#x27;s not a problem.<p>you can just go now. this is not the situation you&#x27;re looking for.
axoltlover 8 years ago
Looks like there&#x27;s more:<p><a href="https:&#x2F;&#x2F;crt.sh&#x2F;?id=63552608" rel="nofollow">https:&#x2F;&#x2F;crt.sh&#x2F;?id=63552608</a> with commonName: jotestintermediate.bbtest.net
评论 #13465710 未加载
flarebackover 8 years ago
&quot;Symantec caught once again improperly issuing illegitimate HTTPS certificates&quot;<p>So I wonder what the correct way to issue illegitimate HTTPS certificates is?