Google Guillotine Falls on Certificate Authorities WoSign, StartCom (zdnet.com) 57
Google has warned that all certificates issued by Chinese company WoSign and subsidiary StartCom will be distrusted with the release of Chrome 61. From a report: According to a Google Groups post published by Chrome security engineer Devon O'Brien, due to "several incidents" involving the certificate authority which has "not [been] in keeping with the high standards expected of CAs," Google Chrome has already begun phasing out WoSign and StartCom by only trusting certificates issued prior to October 21, 2016. The tech giant is soon to go further and will completely distrust any certificate issued by the companies within a matter of months. The Chrome development team have restricted trust through a whitelist of hostnames which are based on the Alexa Top one million sites, and this list has been pruned down over the course of Chrome releases. Once version 61 is ready for public release, this will fully distrust any existing WoSign and StartCom root certificates and all certificates they have issued.
Re: (Score:1)
Let's be honest: You shouldn't trust a certificate issues by anyone other than yourself. You don't think the U.S. government has ever colluded with a CA to set up a MITM attack before?
Re: (Score:2, Insightful)
Your position is actually a very reasonable. You don't know any of the certificate issuers. It is impossible for you to fully trust any of them. At most, you have some "policy" that supposedly tells you what some faceless corporation is doing.
Fortunately, people implemented solutions to this problem about a quarter century ago. "Moderately trust" your CAs. And if an identity is signed by (say) three moderately-trusted CAs then you consider it fairly trustworthy. You could even work in scoring rules for whe
Re: (Score:3)
Why anyone should trust any cert not issued by a cert authority they personally control or vet and trust is beyond me.
The whole CA game is about a half step more legitimate than the TSA.
Re: (Score:2)
we're nerd laughing with you
Good (Score:2)
I'm glad there are people willing to stand up to corporate misbehavior. Now if only we could get some better way of doing revocation checks.
Re: (Score:2)
It's called Let's Encrypt. Use it, love it. 90 Day certs, full automatic signing and updating. Built-in support in most distributions (even pfsense has a package now).
If you are paying for anything other than an EV certificate you're an idiot.
Re: (Score:2)
Just a thumbs-up for Let's Encrypt. Fantastic service and super easy to set up and have it fully automated, so the short-lived certs are not an issue. It automatically takes care of itself if configured properly.
Re: (Score:3)
I use Let's Encrypt, too. HATE it.
Re: (Score:2)
Sorry, but you are an idiot. There are plenty of alternative clients for the ACME protocol, plenty of them run without root access. I have never needed to run as root and the LE client also doesn't modify my web server configs. All the client does is update the certificate every so often and then tests the configuration before deploying it. It took me all of ~10 lines to get it to work the way I want it.
Your Apache scripts shouldn't be so complex that they become un-editable, do you even know what they do?
Re: (Score:2)
Re: (Score:3)
You're kidding, right? The certificate location doesn't change. Once you setup the certificate, you just run letsencrypt-auto renew once a week and when it's done do an apachectl reload. I run over a hundred websites across 10 servers and haven't had any issues integrating LE into my flow. I will admit I use nginx and not apache, but given that the path to the certificate, chain and key don't change and are all symlinks, I fail to see how it's "complicated".
Re: Good (Score:1)
Re: (Score:2)
It gets much more complicated once there is a load balancer involved. I end up redirecting the acme-challenge directory to a subdomain that gets hosted without a load balancer, generating the certificate there, and then having scripts push it to the load balancer.
The other problem I have is that certbot is not idempotent. Certbot doesn't check if the deploy scripts actually succeed or not, it just assumes they did. If they didn't, they will never get called again. Just running certbot auto-renew is
Re: (Score:3)
The default client has command line options to simply output the cert to a file and NOT touch Apache or any other HTTPD at all. In fact, in my setup, I have a 100% dedicated VM for generating certs. It does nothing else. That's it. From there, the cert files are moved via SSH to their respective web servers. But in no way shape or form does the LetsEncrypt VM have any sort of access to any infrastructure to modify it at all.
Re: (Score:2)
Very interesting way of handling this. You just gave me an idea, thanks :)
Re: (Score:2)
I was put off Let's Encrypt too, also purely because the letsencrypt program makes a severe mess of the system. However, there are many other ACME clients, and even letsencrypt.org itself no longer recommends letsencrypt (it recommends certbot at the moment, and also has around 73 other suggested clients if certbot isn't what you want).
Re: (Score:2)
Actually, certbot is the nightmare I was referring to.
Re: (Score:2)
Thanks, good to know. I haven't actually tried that one myself. I was planning to give Let's Encrypt another shot with some of the other clients, and happened to be looking through the list just before this story hit.
Re: (Score:2)
Re: (Score:2)
like because like fema camps like have like nothing to do with like guillotines like.
The government routinely orders guillotines (paper cutters). If you print out your certificate, you can cut it up with an office guillotine.
Re: (Score:2)
It's the browsers that got us in the mess we're in. Browsers do the wrong thing with TLS in almost every situation.
We have really good crypto algorithms and protocols, and the implementations we have are confusing, misleading, and negate a lot of that functionality.
Pretty sure what you're describing has nothing to do with browsers. TLS is governed by the server, not the browser. Server dictates what crypto methods and hashing methods are permitted to be used. Browser has to comply with the server or get lost.
Re: (Score:2)
Us lowly commoners have to pay someone to sign our certs.
I don't pay for my cert. Let's Encrypt is free.
What's the motive for wosign? (Score:3)
Re: (Score:3)
Re: (Score:2)
That was Symantec issuing google.com certificates for their test environment, not WoSign. The thing everyone jumped on WoSign for was doing a customer a favour. Some significant Australian customer wasn't ready for SHA1 certificates being phased out and asked if WoSign could help them out. WoSign issued back-dated SHA1 certificates for the customer.
IMO, Symantec was worse yet they haven't been punished anywhere near as hard, and the timing seemed rather "convenient" in that it coincided with the launch o
Re: (Score:2)
The thing everyone jumped on WoSign for was doing a customer a favour. Some significant Australian customer wasn't ready for SHA1 certificates being phased out and asked if WoSign could help them out. WoSign issued back-dated SHA1 certificates for the customer.
Yep - and I'm pretty sure we know who that customer was. There are still major institutions still using SHA1 certs internally - and if they get moved to newer ones by the end of the year then I'd be shocked. The reality is, this stinks of a scapegoat - the industry in question would face *MASSIVE* disruption for the everyday Australian because of the relatively quick move to higher level certs. A lot of these are still contained within embedded devices that cannot upgrade so easily.
Instead, let's execute th
WoSign's issues not just political... (Score:3)
The thing everyone jumped on WoSign for was doing a customer a favour. Some significant Australian customer wasn't ready for SHA1 certificates being phased out and asked if WoSign could help them out. WoSign issued back-dated SHA1 certificates for the customer.
Yep - and I'm pretty sure we know who that customer was. There are still major institutions still using SHA1 certs internally - and if they get moved to newer ones by the end of the year then I'd be shocked. The reality is, this stinks of a scapegoat - the industry in question would face *MASSIVE* disruption for the everyday Australian because of the relatively quick move to higher level certs. A lot of these are still contained within embedded devices that cannot upgrade so easily.
Instead, let's execute the CA for political reasons. Don't pretend its anything else.
Looking through the list on Mozilla's list of WoSign Issues [mozilla.org] it looks like WoSign not just issued
but their setup also violated a number of other best practices and security measures too (such as unpatched servers). However I'll note that on the political front folks were unhappy that the Startcom acquisition wasn't made public
Re: (Score:2)
But did you notice that most listings there are "its not against the rules - but we don't like it anyway".
Yes, there have been some screwups, bugs and other problems that they seem to have fixed - but show me one CA that hasn't had a number of issues in their history...
Re: (Score:2)
If your approach to 'customer service' involves a willingness to forge certs for them; it may start with a few extra sales to admins trying to dodge deadlines; but criminals will have an obvious interest in someone willing to issue dodgy certs for a few extra
It's tied to the version? (Score:2)
Anyone else find it odd that the whitelist depends on the version? Like they hardcoded it?
Re: (Score:2)
How would you securely download the a list of CAs to trust without a list of CAs to trust?
Google Guillotine? (Score:5, Funny)
Oh great, another Google service that will probably be cancelled within a year
List of Issues (Score:2)
It wasn't just a few bad certs, there was a whole set of issues. Here is Mozilla's list: https://wiki.mozilla.org/CA:Wo... [mozilla.org]
Check out issue N, it is particularly bad.
This really sucks for StartSSL customers (Score:2)
This really sucks for customers of StartCom (StartSSL):
Basically Google (and to a lesser extent Firefox) have handled this really badly. I found out about this issue when I got a new certificate and it wouldn't work: StartSSL certificate gives SEC_ERROR_REVOKED_CERTIFICATE in Firefox and ERR_CERT_AUTHORITY_INVALID in Chrome [stackexchange.com]
Re: (Score:2)
You got taken by scammers. Sucks to be you. However, you can't expect the rest of the world to let the scammers continue, despite the inconvenience it is for you.
Re: This really sucks for StartSSL customers (Score:1)