谷歌将在全线产品(Chrome,安卓)中撤销CNNIC根证书

谷歌在其安全博客上发布声明,经过谷歌对CNNIC证书事件的调查,谷歌将会在旗下所有产品里删除对CNNIC证书的信任,如果用户需要,可以使用白名单方式继续使用CNNIC证书。

Posted by Adam Langley, Security Engineer 

 On Friday, March 20th, we became aware of unauthorized digital certificates for several Google domains. The certificates were issued by an intermediate certificate authority apparently held by a company called MCS Holdings. This intermediate certificate was issued by CNNIC. 


 CNNIC is included in all major root stores and so the misissued certificates would be trusted by almost all browsers and operating systems. Chrome on Windows, OS X, and Linux, ChromeOS, and Firefox 33 and greater would have rejected these certificates because of public-key pinning, although misissued certificates for other sites likely exist.

谷歌安全博客
 We promptly alerted CNNIC and other major browsers about the incident, and we blocked the MCS Holdings certificate in Chrome with a CRLSet push. CNNIC responded on the 22nd to explain that they had contracted with MCS Holdings on the basis that MCS would only issue certificates for domains that they had registered. However, rather than keep the private key in a suitable HSM, MCS installed it in a man-in-the-middle proxy. These devices intercept secure connections by masquerading as the intended destination and are sometimes used by companies to intercept their employees’ secure traffic for monitoring or legal reasons. The employees’ computers normally have to be configured to trust a proxy for it to be able to do this. However, in this case, the presumed proxy was given the full authority of a public CA, which is a serious breach of the CA system. This situation is similar to a failure by ANSSI in 2013.

 This explanation is congruent with the facts. However, CNNIC still delegated their substantial authority to an organization that was not fit to hold it. 

 Chrome users do not need to take any action to be protected by the CRLSet updates. We have no indication of abuse and we are not suggesting that people change passwords or take other action. At this time we are considering what further actions are appropriate.

 This event also highlights, again, that the Certificate Transparency effort is critical for protecting the security of certificates in the future.

 (Details of the certificate chain for software vendors can be found here.)

 Update - April 1: As a result of a joint investigation of the events surrounding this incident by Google and CNNIC, we have decided that the CNNIC Root and EV CAs will no longer be recognized in Google products. This will take effect in a future Chrome update. To assist customers affected by this decision, for a limited time we will allow CNNIC’s existing certificates to continue to be marked as trusted in Chrome, through the use of a publicly disclosed whitelist. While neither we nor CNNIC believe any further unauthorized digital certificates have been issued, nor do we believe the misissued certificates were used outside the limited scope of MCS Holdings’ test network, CNNIC will be working to prevent any future incidents. CNNIC will implement Certificate Transparency for all of their certificates prior to any request for reinclusion. We applaud CNNIC on their proactive steps, and welcome them to reapply once suitable technical and procedural controls are in place. 

可能你对以下的内容也感兴趣:

google号召大家抵制支持某些人限制互联网自由|采取行动?出现了什么严重情况?

谷歌为什么现在好多正常的网站都不能搜索了

谷歌中不能搜索的正常关键字——被国家防火墙给屏蔽的

史记---谷百列传(转载的)

屏蔽百度竞价排名的利器baidu-adblock——这下百度竞价排名麻烦了

火热榜

发表评论

    微笑 大笑 拽 大哭 奸笑 流汗 喷血 生气 囧 不爽 晕 示爱 卖萌 吃惊 迷离 爱你 吓死了 呵呵

      已有2条评论

    1. avatar 机械动画沙发
      以前屏蔽人家,现在人家不认你了。。

      这事儿,逗
      2015-04-07 12:21 回复
      1. 回复了机械动画:9494 2015-04-07 14:35 回复