Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(387)

Side by Side Diff: net/data/ssl/blacklist/README.md

Issue 1639613002: Block two retired DigiCert intermediates (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Missing comma Created 4 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 # Certificate Blacklist 1 # Certificate Blacklist
2 2
3 This directory contains a number of certificates and public keys which are 3 This directory contains a number of certificates and public keys which are
4 considered blacklisted within Chromium-based products. 4 considered blacklisted within Chromium-based products.
5 5
6 When applicable, additional information and the full certificate or key 6 When applicable, additional information and the full certificate or key
7 are included. 7 are included.
8 8
9 ## Compromises & Misissuances 9 ## Compromises & Misissuances
10 10
11 ### Comodo 11 ### Comodo
12 12
13 For details, see [https://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html], 13 For details, see <https://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html>,
14 [https://blog.mozilla.org/security/2011/03/25/comodo-certificate-issue-follow-up /], 14 <https://blog.mozilla.org/security/2011/03/25/comodo-certificate-issue-follow-up />,
15 and [https://technet.microsoft.com/en-us/library/security/2524375.aspx]. 15 and <https://technet.microsoft.com/en-us/library/security/2524375.aspx>.
16 16
17 As the result of a compromise of a partner RA of Comodo, nine certificates were 17 As the result of a compromise of a partner RA of Comodo, nine certificates were
18 misissued, for a variety of online services. 18 misissued, for a variety of online services.
19 19
20 * [2a3699deca1e9fd099ba45de8489e205977c9f2a5e29d5dd747381eec0744d71.pem] 20 * <2a3699deca1e9fd099ba45de8489e205977c9f2a5e29d5dd747381eec0744d71.pem>
21 * [4bf6bb839b03b72839329b4ea70bb1b2f0d07e014d9d24aa9cc596114702bee3.pem] 21 * <4bf6bb839b03b72839329b4ea70bb1b2f0d07e014d9d24aa9cc596114702bee3.pem>
22 * [79f69a47cfd6c4b4ceae8030d04b49f6171d3b5d6c812f58d040e586f1cb3f14.pem] 22 * <79f69a47cfd6c4b4ceae8030d04b49f6171d3b5d6c812f58d040e586f1cb3f14.pem>
23 * [8290cc3fc1c3aac3239782c141ace8f88aeef4e9576a43d01867cf19d025be66.pem] 23 * <8290cc3fc1c3aac3239782c141ace8f88aeef4e9576a43d01867cf19d025be66.pem>
24 * [933f7d8cda9f0d7c8bfd3c22bf4653f4161fd38ccdcf66b22e95a2f49c2650f8.pem] 24 * <933f7d8cda9f0d7c8bfd3c22bf4653f4161fd38ccdcf66b22e95a2f49c2650f8.pem>
25 * [9532e8b504964331c271f3f5f10070131a08bf8ba438978ce394c34feeae246f.pem] 25 * <9532e8b504964331c271f3f5f10070131a08bf8ba438978ce394c34feeae246f.pem>
26 * [be144b56fb1163c49c9a0e6b5a458df6b29f7e6449985960c178a4744624b7bc.pem] 26 * <be144b56fb1163c49c9a0e6b5a458df6b29f7e6449985960c178a4744624b7bc.pem>
27 * [ead610e6e90b439f2ecb51628b0932620f6ef340bd843fca38d3181b8f4ba197.pem] 27 * <ead610e6e90b439f2ecb51628b0932620f6ef340bd843fca38d3181b8f4ba197.pem>
28 * [f8a5ff189fedbfe34e21103389a68340174439ad12974a4e8d4d784d1f3a0faa.pem] 28 * <f8a5ff189fedbfe34e21103389a68340174439ad12974a4e8d4d784d1f3a0faa.pem>
29 29
30 ### DigiNotar 30 ### DigiNotar
31 31
32 For details, see [https://googleonlinesecurity.blogspot.com/2011/08/update-on-at tempted-man-in-middle.html] 32 For details, see <https://googleonlinesecurity.blogspot.com/2011/08/update-on-at tempted-man-in-middle.html>
33 and [https://en.wikipedia.org/wiki/DigiNotar]. 33 and <https://en.wikipedia.org/wiki/DigiNotar>.
34 34
35 As a result of a complete CA compromise, the following certificates (and 35 As a result of a complete CA compromise, the following certificates (and
36 their associated public keypairs) are revoked. 36 their associated public keypairs) are revoked.
37 37
38 * [0d136e439f0ab6e97f3a02a540da9f0641aa554e1d66ea51ae2920d51b2f7217.pem] 38 * <0d136e439f0ab6e97f3a02a540da9f0641aa554e1d66ea51ae2920d51b2f7217.pem>
39 * [294f55ef3bd7244c6ff8a68ab797e9186ec27582751a791515e3292e48372d61.pem] 39 * <294f55ef3bd7244c6ff8a68ab797e9186ec27582751a791515e3292e48372d61.pem>
40 * [31c8fd37db9b56e708b03d1f01848b068c6da66f36fb5d82c008c6040fa3e133.pem] 40 * <31c8fd37db9b56e708b03d1f01848b068c6da66f36fb5d82c008c6040fa3e133.pem>
41 * [3946901f46b0071e90d78279e82fababca177231a704be72c5b0e8918566ea66.pem] 41 * <3946901f46b0071e90d78279e82fababca177231a704be72c5b0e8918566ea66.pem>
42 * [450f1b421bb05c8609854884559c323319619e8b06b001ea2dcbb74a23aa3be2.pem] 42 * <450f1b421bb05c8609854884559c323319619e8b06b001ea2dcbb74a23aa3be2.pem>
43 * [4fee0163686ecbd65db968e7494f55d84b25486d438e9de558d629d28cd4d176.pem] 43 * <4fee0163686ecbd65db968e7494f55d84b25486d438e9de558d629d28cd4d176.pem>
44 * [8a1bd21661c60015065212cc98b1abb50dfd14c872a208e66bae890f25c448af.pem] 44 * <8a1bd21661c60015065212cc98b1abb50dfd14c872a208e66bae890f25c448af.pem>
45 * [9ed8f9b0e8e42a1656b8e1dd18f42ba42dc06fe52686173ba2fc70e756f207dc.pem] 45 * <9ed8f9b0e8e42a1656b8e1dd18f42ba42dc06fe52686173ba2fc70e756f207dc.pem>
46 * [a686fee577c88ab664d0787ecdfff035f4806f3de418dc9e4d516324fff02083.pem] 46 * <a686fee577c88ab664d0787ecdfff035f4806f3de418dc9e4d516324fff02083.pem>
47 * [b8686723e415534bc0dbd16326f9486f85b0b0799bf6639334e61daae67f36cd.pem] 47 * <b8686723e415534bc0dbd16326f9486f85b0b0799bf6639334e61daae67f36cd.pem>
48 * [fdedb5bdfcb67411513a61aee5cb5b5d7c52af06028efc996cc1b05b1d6cea2b.pem] 48 * <fdedb5bdfcb67411513a61aee5cb5b5d7c52af06028efc996cc1b05b1d6cea2b.pem>
49 49
50 ### India CCA 50 ### India CCA
51 51
52 For details, see [https://googleonlinesecurity.blogspot.com/2014/07/maintaining- digital-certificate-security.html] 52 For details, see <https://googleonlinesecurity.blogspot.com/2014/07/maintaining- digital-certificate-security.html>
53 and [https://technet.microsoft.com/en-us/library/security/2982792.aspx] 53 and <https://technet.microsoft.com/en-us/library/security/2982792.aspx>
54 54
55 An unknown number of misissued certificates were issued by a sub-CA of 55 An unknown number of misissued certificates were issued by a sub-CA of
56 India CCA, the India NIC. Due to the scope of the misissuance, the sub-CA 56 India CCA, the India NIC. Due to the scope of the misissuance, the sub-CA
57 was wholly revoked, and India CCA was constrained to a subset of India's 57 was wholly revoked, and India CCA was constrained to a subset of India's
58 ccTLD namespace. 58 ccTLD namespace.
59 59
60 * [67ed4b703d15dc555f8c444b3a05a32579cb7599bd19c9babe10c584ea327ae0.pem] 60 * <67ed4b703d15dc555f8c444b3a05a32579cb7599bd19c9babe10c584ea327ae0.pem>
61 * [a8e1dfd9cd8e470aa2f443914f931cfd61c323e94d75827affee985241c35ce5.pem] 61 * <a8e1dfd9cd8e470aa2f443914f931cfd61c323e94d75827affee985241c35ce5.pem>
62 * [e4f9a3235df7330255f36412bc849fb630f8519961ec3538301deb896c953da5.pem] 62 * <e4f9a3235df7330255f36412bc849fb630f8519961ec3538301deb896c953da5.pem>
63 63
64 ### Trustwave 64 ### Trustwave
65 65
66 For details, see [https://www.trustwave.com/Resources/SpiderLabs-Blog/Clarifying -The-Trustwave-CA-Policy-Update/] 66 For details, see <https://www.trustwave.com/Resources/SpiderLabs-Blog/Clarifying -The-Trustwave-CA-Policy-Update/>
67 and [https://bugzilla.mozilla.org/show_bug.cgi?id=724929] 67 and <https://bugzilla.mozilla.org/show_bug.cgi?id=724929>
68 68
69 Two certificates were issued by Trustwave for use in enterprise 69 Two certificates were issued by Trustwave for use in enterprise
70 Man-in-the-Middle. The following public key was used for both certificates, 70 Man-in-the-Middle. The following public key was used for both certificates,
71 and is revoked. 71 and is revoked.
72 72
73 * [32ecc96f912f96d889e73088cd031c7ded2c651c805016157a23b6f32f798a3b.key] 73 * <32ecc96f912f96d889e73088cd031c7ded2c651c805016157a23b6f32f798a3b.key>
74 74
75 ### TurkTrust 75 ### TurkTrust
76 76
77 For details, see [https://googleonlinesecurity.blogspot.com/2013/01/enhancing-di gital-certificate-security.html] 77 For details, see <https://googleonlinesecurity.blogspot.com/2013/01/enhancing-di gital-certificate-security.html>
78 and [https://web.archive.org/web/20130326152502/http://turktrust.com.tr/kamuoyu- aciklamasi.2.html] 78 and <https://web.archive.org/web/20130326152502/http://turktrust.com.tr/kamuoyu- aciklamasi.2.html>
79 79
80 As a result of a software configuration issue, two certificates were misissued 80 As a result of a software configuration issue, two certificates were misissued
81 by Turktrust that failed to properly set the basicConstraints extension. 81 by Turktrust that failed to properly set the basicConstraints extension.
82 Because these certificates can be used to issue additional certificates, they 82 Because these certificates can be used to issue additional certificates, they
83 have been revoked. 83 have been revoked.
84 84
85 * [372447c43185c38edd2ce0e9c853f9ac1576ddd1704c2f54d96076c089cb4227.pem] 85 * <372447c43185c38edd2ce0e9c853f9ac1576ddd1704c2f54d96076c089cb4227.pem>
86 * [42187727be39faf667aeb92bf0cc4e268f6e2ead2cefbec575bdc90430024f69.pem] 86 * <42187727be39faf667aeb92bf0cc4e268f6e2ead2cefbec575bdc90430024f69.pem>
87 87
88 ## Private Key Leakages 88 ## Private Key Leakages
89 89
90 ### Cyberoam 90 ### Cyberoam
91 91
92 For details, see [https://blog.torproject.org/blog/security-vulnerability-found- cyberoam-dpi-devices-cve-2012-3372] 92 For details, see <https://blog.torproject.org/blog/security-vulnerability-found- cyberoam-dpi-devices-cve-2012-3372>
93 93
94 Device manufacturer Cyberoam used the same private key for all devices by 94 Device manufacturer Cyberoam used the same private key for all devices by
95 default, which subsequently leaked and is included below. The associated 95 default, which subsequently leaked and is included below. The associated
96 public key is blacklisted. 96 public key is blacklisted.
97 97
98 * [1af56c98ff043ef92bebff54cebb4dd67a25ba956c817f3e6dd3c1e52eb584c1.key] 98 * <1af56c98ff043ef92bebff54cebb4dd67a25ba956c817f3e6dd3c1e52eb584c1.key>
99 99
100 ### Dell 100 ### Dell
101 101
102 For details, see [http://www.dell.com/support/article/us/en/19/SLN300321] 102 For details, see <http://www.dell.com/support/article/us/en/19/SLN300321>
103 and [http://en.community.dell.com/dell-blogs/direct2dell/b/direct2dell/archive/2 015/11/23/response-to-concerns-regarding-edellroot-certificate] 103 and <http://en.community.dell.com/dell-blogs/direct2dell/b/direct2dell/archive/2 015/11/23/response-to-concerns-regarding-edellroot-certificate>
104 104
105 The private keys for both the eDellRoot and DSDTestProvider certificates were 105 The private keys for both the eDellRoot and DSDTestProvider certificates were
106 trivially extracted, and thus their associated public keys are 106 trivially extracted, and thus their associated public keys are
107 blacklisted. 107 blacklisted.
108 108
109 * [0f912fd7be760be25afbc56bdc09cd9e5dcc9c6f6a55a778aefcb6aa30e31554.pem] 109 * <0f912fd7be760be25afbc56bdc09cd9e5dcc9c6f6a55a778aefcb6aa30e31554.pem>
110 * [ec30c9c3065a06bb07dc5b1c6b497f370c1ca65c0f30c08e042ba6bcecc78f2c.pem] 110 * <ec30c9c3065a06bb07dc5b1c6b497f370c1ca65c0f30c08e042ba6bcecc78f2c.pem>
111 111
112 ### sslip.io 112 ### sslip.io
113 113
114 For details, see [https://blog.pivotal.io/labs/labs/sslip-io-a-valid-ssl-certifi cate-for-every-ip-address] 114 For details, see <https://blog.pivotal.io/labs/labs/sslip-io-a-valid-ssl-certifi cate-for-every-ip-address>
115 115
116 A subscriber of Comodo's acquired a wildcard certificate for sslip.io, and 116 A subscriber of Comodo's acquired a wildcard certificate for sslip.io, and
117 then subsequently published the private key, as a means for developers 117 then subsequently published the private key, as a means for developers
118 to avoid having to acquire certificates. 118 to avoid having to acquire certificates.
119 119
120 As the private key could be used to intercept all communications to this 120 As the private key could be used to intercept all communications to this
121 domain, the associated public key was blacklisted. 121 domain, the associated public key was blacklisted.
122 122
123 * [f3bae5e9c0adbfbfb6dbf7e04e74be6ead3ca98a5604ffe591cea86c241848ec.pem] 123 * <f3bae5e9c0adbfbfb6dbf7e04e74be6ead3ca98a5604ffe591cea86c241848ec.pem>
124 124
125 ### xs4all.nl 125 ### xs4all.nl
126 126
127 For details, see [https://raymii.org/s/blog/How_I_got_a_valid_SSL_certificate_fo r_my_ISPs_main_website.html] 127 For details, see <https://raymii.org/s/blog/How_I_got_a_valid_SSL_certificate_fo r_my_ISPs_main_website.html>
128 128
129 A user of xs4all was able to register a reserved email address that can be 129 A user of xs4all was able to register a reserved email address that can be
130 used to cause certificate issuance, as described in the CA/Browser Forum's 130 used to cause certificate issuance, as described in the CA/Browser Forum's
131 Baseline Requirements, and then subsequently published the private key. 131 Baseline Requirements, and then subsequently published the private key.
132 132
133 * [83618f932d6947744d5ecca299d4b2820c01483947bd16be814e683f7436be24.pem] 133 * <83618f932d6947744d5ecca299d4b2820c01483947bd16be814e683f7436be24.pem>
134 134
135 ## Miscellaneous 135 ## Miscellaneous
136 136
137 ### DigiCert
138
139 For details, see <https://bugzilla.mozilla.org/show_bug.cgi?id=1242758> and
140 <https://bugzilla.mozilla.org/show_bug.cgi?id=1224104>
141
142 These two intermediates were retired by DigiCert, and blacklisted for
143 robustness at their request.
144
145 * <159ca03a88897c8f13817a212629df84ce824709492b8c9adb8e5437d2fc72be.pem>
146 * <b8c1b957c077ea76e00b0f45bff5ae3acb696f221d2e062164fe37125e5a8d25.pem>
147
137 ### Hacking Team 148 ### Hacking Team
138 149
139 The following keys were reported as used by Hacking Team to compromise users, 150 The following keys were reported as used by Hacking Team to compromise users,
140 and are blacklisted for robustness. 151 and are blacklisted for robustness.
141 152
142 * [c4387d45364a313fbfe79812b35b815d42852ab03b06f11589638021c8f2cb44.key] 153 * <c4387d45364a313fbfe79812b35b815d42852ab03b06f11589638021c8f2cb44.key>
143 * [ea08c8d45d52ca593de524f0513ca6418da9859f7b08ef13ff9dd7bf612d6a37.key] 154 * <ea08c8d45d52ca593de524f0513ca6418da9859f7b08ef13ff9dd7bf612d6a37.key>
144 155
145 ### live.fi 156 ### live.fi
146 157
147 For details, see [https://technet.microsoft.com/en-us/library/security/3046310.a spx] 158 For details, see <https://technet.microsoft.com/en-us/library/security/3046310.a spx>
148 159
149 A user of live.fi was able to register a reserved email address that can be 160 A user of live.fi was able to register a reserved email address that can be
150 used to cause certificate issuance, as described in the CA/Browser Forum's 161 used to cause certificate issuance, as described in the CA/Browser Forum's
151 Baseline Requirements. This was not intended by Microsoft, the operators of 162 Baseline Requirements. This was not intended by Microsoft, the operators of
152 live.fi, but conformed to the Baseline Requirements. It was blacklisted for 163 live.fi, but conformed to the Baseline Requirements. It was blacklisted for
153 robustness. 164 robustness.
154 165
155 * [c67d722c1495be02cbf9ef1159f5ca4aa782dc832dc6aa60c9aa076a0ad1e69d.pem] 166 * <c67d722c1495be02cbf9ef1159f5ca4aa782dc832dc6aa60c9aa076a0ad1e69d.pem>
156 167
157 ### SECOM 168 ### SECOM
158 169
159 For details, see [https://bugzilla.mozilla.org/show_bug.cgi?id=1188582] 170 For details, see <https://bugzilla.mozilla.org/show_bug.cgi?id=1188582>
160 171
161 This intermediate certificate was retired by SECOM, and blacklisted for 172 This intermediate certificate was retired by SECOM, and blacklisted for
162 robustness at their request. 173 robustness at their request.
163 174
164 * [817d4e05063d5942869c47d8504dc56a5208f7569c3d6d67f3457cfe921b3e29.pem] 175 * <817d4e05063d5942869c47d8504dc56a5208f7569c3d6d67f3457cfe921b3e29.pem>
165 176
166 ### Symantec 177 ### Symantec
167 178
168 For details, see [https://bugzilla.mozilla.org/show_bug.cgi?id=966060] 179 For details, see <https://bugzilla.mozilla.org/show_bug.cgi?id=966060>
169 180
170 These three intermediate certificates were retired by Symantec, and 181 These three intermediate certificates were retired by Symantec, and
171 blacklisted for robustness at their request. 182 blacklisted for robustness at their request.
172 183
173 * [1f17f2cbb109f01c885c94d9e74a48625ae9659665d6d7e7bc5a10332976370f.pem] 184 * <1f17f2cbb109f01c885c94d9e74a48625ae9659665d6d7e7bc5a10332976370f.pem>
174 * [3e26492e20b52de79e15766e6cb4251a1d566b0dbfb225aa7d08dda1dcebbf0a.pem] 185 * <3e26492e20b52de79e15766e6cb4251a1d566b0dbfb225aa7d08dda1dcebbf0a.pem>
175 * [7abd72a323c9d179c722564f4e27a51dd4afd24006b38a40ce918b94960bcf18.pem] 186 * <7abd72a323c9d179c722564f4e27a51dd4afd24006b38a40ce918b94960bcf18.pem>
176 187
177 ### T-Systems 188 ### T-Systems
178 189
179 For details, see [https://bugzilla.mozilla.org/show_bug.cgi?id=1076940] 190 For details, see <https://bugzilla.mozilla.org/show_bug.cgi?id=1076940>
180 191
181 This intermediate certificate was retired by T-Systems, and blacklisted 192 This intermediate certificate was retired by T-Systems, and blacklisted
182 for robustness at their request. 193 for robustness at their request.
183 194
184 * [f4a5984324de98bd979ef181a100cf940f2166173319a86a0d9d7c8fac3b0a8f.pem] 195 * <f4a5984324de98bd979ef181a100cf940f2166173319a86a0d9d7c8fac3b0a8f.pem>
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698