| Index: net/data/ssl/blacklist/README.md
|
| diff --git a/net/data/ssl/blacklist/README.md b/net/data/ssl/blacklist/README.md
|
| index 6df165474e2397ae6ac326808b3fbd05e99a999e..9d45f72143fdf15458858f7d5c774a14c90effe1 100644
|
| --- a/net/data/ssl/blacklist/README.md
|
| +++ b/net/data/ssl/blacklist/README.md
|
| @@ -10,108 +10,108 @@ are included.
|
|
|
| ### Comodo
|
|
|
| -For details, see [https://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html],
|
| -[https://blog.mozilla.org/security/2011/03/25/comodo-certificate-issue-follow-up/],
|
| -and [https://technet.microsoft.com/en-us/library/security/2524375.aspx].
|
| +For details, see <https://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html>,
|
| +<https://blog.mozilla.org/security/2011/03/25/comodo-certificate-issue-follow-up/>,
|
| +and <https://technet.microsoft.com/en-us/library/security/2524375.aspx>.
|
|
|
| As the result of a compromise of a partner RA of Comodo, nine certificates were
|
| misissued, for a variety of online services.
|
|
|
| - * [2a3699deca1e9fd099ba45de8489e205977c9f2a5e29d5dd747381eec0744d71.pem]
|
| - * [4bf6bb839b03b72839329b4ea70bb1b2f0d07e014d9d24aa9cc596114702bee3.pem]
|
| - * [79f69a47cfd6c4b4ceae8030d04b49f6171d3b5d6c812f58d040e586f1cb3f14.pem]
|
| - * [8290cc3fc1c3aac3239782c141ace8f88aeef4e9576a43d01867cf19d025be66.pem]
|
| - * [933f7d8cda9f0d7c8bfd3c22bf4653f4161fd38ccdcf66b22e95a2f49c2650f8.pem]
|
| - * [9532e8b504964331c271f3f5f10070131a08bf8ba438978ce394c34feeae246f.pem]
|
| - * [be144b56fb1163c49c9a0e6b5a458df6b29f7e6449985960c178a4744624b7bc.pem]
|
| - * [ead610e6e90b439f2ecb51628b0932620f6ef340bd843fca38d3181b8f4ba197.pem]
|
| - * [f8a5ff189fedbfe34e21103389a68340174439ad12974a4e8d4d784d1f3a0faa.pem]
|
| + * <2a3699deca1e9fd099ba45de8489e205977c9f2a5e29d5dd747381eec0744d71.pem>
|
| + * <4bf6bb839b03b72839329b4ea70bb1b2f0d07e014d9d24aa9cc596114702bee3.pem>
|
| + * <79f69a47cfd6c4b4ceae8030d04b49f6171d3b5d6c812f58d040e586f1cb3f14.pem>
|
| + * <8290cc3fc1c3aac3239782c141ace8f88aeef4e9576a43d01867cf19d025be66.pem>
|
| + * <933f7d8cda9f0d7c8bfd3c22bf4653f4161fd38ccdcf66b22e95a2f49c2650f8.pem>
|
| + * <9532e8b504964331c271f3f5f10070131a08bf8ba438978ce394c34feeae246f.pem>
|
| + * <be144b56fb1163c49c9a0e6b5a458df6b29f7e6449985960c178a4744624b7bc.pem>
|
| + * <ead610e6e90b439f2ecb51628b0932620f6ef340bd843fca38d3181b8f4ba197.pem>
|
| + * <f8a5ff189fedbfe34e21103389a68340174439ad12974a4e8d4d784d1f3a0faa.pem>
|
|
|
| ### DigiNotar
|
|
|
| -For details, see [https://googleonlinesecurity.blogspot.com/2011/08/update-on-attempted-man-in-middle.html]
|
| -and [https://en.wikipedia.org/wiki/DigiNotar].
|
| +For details, see <https://googleonlinesecurity.blogspot.com/2011/08/update-on-attempted-man-in-middle.html>
|
| +and <https://en.wikipedia.org/wiki/DigiNotar>.
|
|
|
| As a result of a complete CA compromise, the following certificates (and
|
| their associated public keypairs) are revoked.
|
|
|
| - * [0d136e439f0ab6e97f3a02a540da9f0641aa554e1d66ea51ae2920d51b2f7217.pem]
|
| - * [294f55ef3bd7244c6ff8a68ab797e9186ec27582751a791515e3292e48372d61.pem]
|
| - * [31c8fd37db9b56e708b03d1f01848b068c6da66f36fb5d82c008c6040fa3e133.pem]
|
| - * [3946901f46b0071e90d78279e82fababca177231a704be72c5b0e8918566ea66.pem]
|
| - * [450f1b421bb05c8609854884559c323319619e8b06b001ea2dcbb74a23aa3be2.pem]
|
| - * [4fee0163686ecbd65db968e7494f55d84b25486d438e9de558d629d28cd4d176.pem]
|
| - * [8a1bd21661c60015065212cc98b1abb50dfd14c872a208e66bae890f25c448af.pem]
|
| - * [9ed8f9b0e8e42a1656b8e1dd18f42ba42dc06fe52686173ba2fc70e756f207dc.pem]
|
| - * [a686fee577c88ab664d0787ecdfff035f4806f3de418dc9e4d516324fff02083.pem]
|
| - * [b8686723e415534bc0dbd16326f9486f85b0b0799bf6639334e61daae67f36cd.pem]
|
| - * [fdedb5bdfcb67411513a61aee5cb5b5d7c52af06028efc996cc1b05b1d6cea2b.pem]
|
| + * <0d136e439f0ab6e97f3a02a540da9f0641aa554e1d66ea51ae2920d51b2f7217.pem>
|
| + * <294f55ef3bd7244c6ff8a68ab797e9186ec27582751a791515e3292e48372d61.pem>
|
| + * <31c8fd37db9b56e708b03d1f01848b068c6da66f36fb5d82c008c6040fa3e133.pem>
|
| + * <3946901f46b0071e90d78279e82fababca177231a704be72c5b0e8918566ea66.pem>
|
| + * <450f1b421bb05c8609854884559c323319619e8b06b001ea2dcbb74a23aa3be2.pem>
|
| + * <4fee0163686ecbd65db968e7494f55d84b25486d438e9de558d629d28cd4d176.pem>
|
| + * <8a1bd21661c60015065212cc98b1abb50dfd14c872a208e66bae890f25c448af.pem>
|
| + * <9ed8f9b0e8e42a1656b8e1dd18f42ba42dc06fe52686173ba2fc70e756f207dc.pem>
|
| + * <a686fee577c88ab664d0787ecdfff035f4806f3de418dc9e4d516324fff02083.pem>
|
| + * <b8686723e415534bc0dbd16326f9486f85b0b0799bf6639334e61daae67f36cd.pem>
|
| + * <fdedb5bdfcb67411513a61aee5cb5b5d7c52af06028efc996cc1b05b1d6cea2b.pem>
|
|
|
| ### India CCA
|
|
|
| -For details, see [https://googleonlinesecurity.blogspot.com/2014/07/maintaining-digital-certificate-security.html]
|
| -and [https://technet.microsoft.com/en-us/library/security/2982792.aspx]
|
| +For details, see <https://googleonlinesecurity.blogspot.com/2014/07/maintaining-digital-certificate-security.html>
|
| +and <https://technet.microsoft.com/en-us/library/security/2982792.aspx>
|
|
|
| An unknown number of misissued certificates were issued by a sub-CA of
|
| India CCA, the India NIC. Due to the scope of the misissuance, the sub-CA
|
| was wholly revoked, and India CCA was constrained to a subset of India's
|
| ccTLD namespace.
|
|
|
| - * [67ed4b703d15dc555f8c444b3a05a32579cb7599bd19c9babe10c584ea327ae0.pem]
|
| - * [a8e1dfd9cd8e470aa2f443914f931cfd61c323e94d75827affee985241c35ce5.pem]
|
| - * [e4f9a3235df7330255f36412bc849fb630f8519961ec3538301deb896c953da5.pem]
|
| + * <67ed4b703d15dc555f8c444b3a05a32579cb7599bd19c9babe10c584ea327ae0.pem>
|
| + * <a8e1dfd9cd8e470aa2f443914f931cfd61c323e94d75827affee985241c35ce5.pem>
|
| + * <e4f9a3235df7330255f36412bc849fb630f8519961ec3538301deb896c953da5.pem>
|
|
|
| ### Trustwave
|
|
|
| -For details, see [https://www.trustwave.com/Resources/SpiderLabs-Blog/Clarifying-The-Trustwave-CA-Policy-Update/]
|
| -and [https://bugzilla.mozilla.org/show_bug.cgi?id=724929]
|
| +For details, see <https://www.trustwave.com/Resources/SpiderLabs-Blog/Clarifying-The-Trustwave-CA-Policy-Update/>
|
| +and <https://bugzilla.mozilla.org/show_bug.cgi?id=724929>
|
|
|
| Two certificates were issued by Trustwave for use in enterprise
|
| Man-in-the-Middle. The following public key was used for both certificates,
|
| and is revoked.
|
|
|
| - * [32ecc96f912f96d889e73088cd031c7ded2c651c805016157a23b6f32f798a3b.key]
|
| + * <32ecc96f912f96d889e73088cd031c7ded2c651c805016157a23b6f32f798a3b.key>
|
|
|
| ### TurkTrust
|
|
|
| -For details, see [https://googleonlinesecurity.blogspot.com/2013/01/enhancing-digital-certificate-security.html]
|
| -and [https://web.archive.org/web/20130326152502/http://turktrust.com.tr/kamuoyu-aciklamasi.2.html]
|
| +For details, see <https://googleonlinesecurity.blogspot.com/2013/01/enhancing-digital-certificate-security.html>
|
| +and <https://web.archive.org/web/20130326152502/http://turktrust.com.tr/kamuoyu-aciklamasi.2.html>
|
|
|
| As a result of a software configuration issue, two certificates were misissued
|
| by Turktrust that failed to properly set the basicConstraints extension.
|
| Because these certificates can be used to issue additional certificates, they
|
| have been revoked.
|
|
|
| - * [372447c43185c38edd2ce0e9c853f9ac1576ddd1704c2f54d96076c089cb4227.pem]
|
| - * [42187727be39faf667aeb92bf0cc4e268f6e2ead2cefbec575bdc90430024f69.pem]
|
| + * <372447c43185c38edd2ce0e9c853f9ac1576ddd1704c2f54d96076c089cb4227.pem>
|
| + * <42187727be39faf667aeb92bf0cc4e268f6e2ead2cefbec575bdc90430024f69.pem>
|
|
|
| ## Private Key Leakages
|
|
|
| ### Cyberoam
|
|
|
| -For details, see [https://blog.torproject.org/blog/security-vulnerability-found-cyberoam-dpi-devices-cve-2012-3372]
|
| +For details, see <https://blog.torproject.org/blog/security-vulnerability-found-cyberoam-dpi-devices-cve-2012-3372>
|
|
|
| Device manufacturer Cyberoam used the same private key for all devices by
|
| default, which subsequently leaked and is included below. The associated
|
| public key is blacklisted.
|
|
|
| - * [1af56c98ff043ef92bebff54cebb4dd67a25ba956c817f3e6dd3c1e52eb584c1.key]
|
| + * <1af56c98ff043ef92bebff54cebb4dd67a25ba956c817f3e6dd3c1e52eb584c1.key>
|
|
|
| ### Dell
|
|
|
| -For details, see [http://www.dell.com/support/article/us/en/19/SLN300321]
|
| -and [http://en.community.dell.com/dell-blogs/direct2dell/b/direct2dell/archive/2015/11/23/response-to-concerns-regarding-edellroot-certificate]
|
| +For details, see <http://www.dell.com/support/article/us/en/19/SLN300321>
|
| +and <http://en.community.dell.com/dell-blogs/direct2dell/b/direct2dell/archive/2015/11/23/response-to-concerns-regarding-edellroot-certificate>
|
|
|
| The private keys for both the eDellRoot and DSDTestProvider certificates were
|
| trivially extracted, and thus their associated public keys are
|
| blacklisted.
|
|
|
| - * [0f912fd7be760be25afbc56bdc09cd9e5dcc9c6f6a55a778aefcb6aa30e31554.pem]
|
| - * [ec30c9c3065a06bb07dc5b1c6b497f370c1ca65c0f30c08e042ba6bcecc78f2c.pem]
|
| + * <0f912fd7be760be25afbc56bdc09cd9e5dcc9c6f6a55a778aefcb6aa30e31554.pem>
|
| + * <ec30c9c3065a06bb07dc5b1c6b497f370c1ca65c0f30c08e042ba6bcecc78f2c.pem>
|
|
|
| ### sslip.io
|
|
|
| -For details, see [https://blog.pivotal.io/labs/labs/sslip-io-a-valid-ssl-certificate-for-every-ip-address]
|
| +For details, see <https://blog.pivotal.io/labs/labs/sslip-io-a-valid-ssl-certificate-for-every-ip-address>
|
|
|
| A subscriber of Comodo's acquired a wildcard certificate for sslip.io, and
|
| then subsequently published the private key, as a means for developers
|
| @@ -120,31 +120,42 @@ to avoid having to acquire certificates.
|
| As the private key could be used to intercept all communications to this
|
| domain, the associated public key was blacklisted.
|
|
|
| - * [f3bae5e9c0adbfbfb6dbf7e04e74be6ead3ca98a5604ffe591cea86c241848ec.pem]
|
| + * <f3bae5e9c0adbfbfb6dbf7e04e74be6ead3ca98a5604ffe591cea86c241848ec.pem>
|
|
|
| ### xs4all.nl
|
|
|
| -For details, see [https://raymii.org/s/blog/How_I_got_a_valid_SSL_certificate_for_my_ISPs_main_website.html]
|
| +For details, see <https://raymii.org/s/blog/How_I_got_a_valid_SSL_certificate_for_my_ISPs_main_website.html>
|
|
|
| A user of xs4all was able to register a reserved email address that can be
|
| used to cause certificate issuance, as described in the CA/Browser Forum's
|
| Baseline Requirements, and then subsequently published the private key.
|
|
|
| - * [83618f932d6947744d5ecca299d4b2820c01483947bd16be814e683f7436be24.pem]
|
| + * <83618f932d6947744d5ecca299d4b2820c01483947bd16be814e683f7436be24.pem>
|
|
|
| ## Miscellaneous
|
|
|
| +### DigiCert
|
| +
|
| +For details, see <https://bugzilla.mozilla.org/show_bug.cgi?id=1242758> and
|
| +<https://bugzilla.mozilla.org/show_bug.cgi?id=1224104>
|
| +
|
| +These two intermediates were retired by DigiCert, and blacklisted for
|
| +robustness at their request.
|
| +
|
| + * <159ca03a88897c8f13817a212629df84ce824709492b8c9adb8e5437d2fc72be.pem>
|
| + * <b8c1b957c077ea76e00b0f45bff5ae3acb696f221d2e062164fe37125e5a8d25.pem>
|
| +
|
| ### Hacking Team
|
|
|
| The following keys were reported as used by Hacking Team to compromise users,
|
| and are blacklisted for robustness.
|
|
|
| - * [c4387d45364a313fbfe79812b35b815d42852ab03b06f11589638021c8f2cb44.key]
|
| - * [ea08c8d45d52ca593de524f0513ca6418da9859f7b08ef13ff9dd7bf612d6a37.key]
|
| + * <c4387d45364a313fbfe79812b35b815d42852ab03b06f11589638021c8f2cb44.key>
|
| + * <ea08c8d45d52ca593de524f0513ca6418da9859f7b08ef13ff9dd7bf612d6a37.key>
|
|
|
| ### live.fi
|
|
|
| -For details, see [https://technet.microsoft.com/en-us/library/security/3046310.aspx]
|
| +For details, see <https://technet.microsoft.com/en-us/library/security/3046310.aspx>
|
|
|
| A user of live.fi was able to register a reserved email address that can be
|
| used to cause certificate issuance, as described in the CA/Browser Forum's
|
| @@ -152,33 +163,33 @@ Baseline Requirements. This was not intended by Microsoft, the operators of
|
| live.fi, but conformed to the Baseline Requirements. It was blacklisted for
|
| robustness.
|
|
|
| - * [c67d722c1495be02cbf9ef1159f5ca4aa782dc832dc6aa60c9aa076a0ad1e69d.pem]
|
| + * <c67d722c1495be02cbf9ef1159f5ca4aa782dc832dc6aa60c9aa076a0ad1e69d.pem>
|
|
|
| ### SECOM
|
|
|
| -For details, see [https://bugzilla.mozilla.org/show_bug.cgi?id=1188582]
|
| +For details, see <https://bugzilla.mozilla.org/show_bug.cgi?id=1188582>
|
|
|
| This intermediate certificate was retired by SECOM, and blacklisted for
|
| robustness at their request.
|
|
|
| - * [817d4e05063d5942869c47d8504dc56a5208f7569c3d6d67f3457cfe921b3e29.pem]
|
| + * <817d4e05063d5942869c47d8504dc56a5208f7569c3d6d67f3457cfe921b3e29.pem>
|
|
|
| ### Symantec
|
|
|
| -For details, see [https://bugzilla.mozilla.org/show_bug.cgi?id=966060]
|
| +For details, see <https://bugzilla.mozilla.org/show_bug.cgi?id=966060>
|
|
|
| These three intermediate certificates were retired by Symantec, and
|
| blacklisted for robustness at their request.
|
|
|
| - * [1f17f2cbb109f01c885c94d9e74a48625ae9659665d6d7e7bc5a10332976370f.pem]
|
| - * [3e26492e20b52de79e15766e6cb4251a1d566b0dbfb225aa7d08dda1dcebbf0a.pem]
|
| - * [7abd72a323c9d179c722564f4e27a51dd4afd24006b38a40ce918b94960bcf18.pem]
|
| + * <1f17f2cbb109f01c885c94d9e74a48625ae9659665d6d7e7bc5a10332976370f.pem>
|
| + * <3e26492e20b52de79e15766e6cb4251a1d566b0dbfb225aa7d08dda1dcebbf0a.pem>
|
| + * <7abd72a323c9d179c722564f4e27a51dd4afd24006b38a40ce918b94960bcf18.pem>
|
|
|
| ### T-Systems
|
|
|
| -For details, see [https://bugzilla.mozilla.org/show_bug.cgi?id=1076940]
|
| +For details, see <https://bugzilla.mozilla.org/show_bug.cgi?id=1076940>
|
|
|
| This intermediate certificate was retired by T-Systems, and blacklisted
|
| for robustness at their request.
|
|
|
| - * [f4a5984324de98bd979ef181a100cf940f2166173319a86a0d9d7c8fac3b0a8f.pem]
|
| + * <f4a5984324de98bd979ef181a100cf940f2166173319a86a0d9d7c8fac3b0a8f.pem>
|
|
|