|
此文章由 malazhumao 原创或转贴,不代表本站立场和观点,版权归 oursteps.com.au 和作者 malazhumao 所有!转贴必须注明作者、出处和本声明,并保持内容完整
Mozilla也吊销CNNIC,哈哈哈
wzyboy: https://t.co/ruQ8ja3dJu 2010 年要求移除 CNNIC ROOT 的那个 ticket 沉寂了几年,现在 Mozilla 自己发博客打脸了,下面多了一堆「I told you so」的评论… http://t.co/6pOiNo0mvV
Distrusting New CNNIC Certificates
kwilson
70
APR
2
2015
Last week, Mozilla was notified that a Certificate Authority (CA) called CNNIC had issued an unconstrained intermediate certificate, which was subsequently used by the recipient to issue certificates for domain names the holder did not own or control (i.e., for MitM). We added the intermediate certificate in question to Firefox’s direct revocation system, called OneCRL, and have been further investigating the incident.
After reviewing the circumstances and a robust discussion on our public mailing list, we have concluded that CNNIC’s behaviour in issuing an unconstrained intermediate certificate to a company with no documented PKI practices and with no oversight of how the private key was stored or controlled was an ‘egregious practice’ as per Mozilla’s CA Certificate Enforcement Policy. Therefore, after public discussion and consideration of the scope and impact of a range of options, we have decided to update our code so that Mozilla products will no longer trust any certificate issued by CNNIC’s roots with a notBefore date on or after 1st April 2015. We have put together a longer document with more details on the incident and how we arrived at the conclusion we did.
CNNIC may, if they wish, re-apply for full inclusion in the Mozilla root store and the removal of this restriction, by going through Mozilla’s inclusion process after completing additional steps that the Mozilla community may require as a result of this incident. This will be discussed in the mozilla.dev.security.policy forum.
The notBefore date that will be checked is inserted into the certificate by CNNIC. We will therefore be asking CNNIC for a comprehensive list of their currently-valid certificates, and publishing it. After the list has been provided, if a certificate not on the list, with a notBefore date before 1 April 2015, is detected on the public Internet by us or anyone else, we reserve the right to take further action.
We believe that this response is consistent with Mozilla policy and is one which we could apply to any other CA in the same situation.
Mozilla Security Team |
|