This is simply to acknowledge to the Mozilla team and the wider security
policy mailing list that GlobalSign has been specifically mentioned by the
hacker in his latest pastebin message. We are currently investigating all
our systems in detail and looking at ways to avoid being his next victim.
It seems that other CAs may also have issues according to the posting
http://pastebin.com/1AxH30em
Kind Regards
Steve Roylance
Business Development Director
GlobalSign
>This is simply to acknowledge to the Mozilla team and the wider security
>policy mailing list that GlobalSign has been specifically mentioned by the
>hacker in his latest pastebin message. We are currently investigating all our
>systems in detail and looking at ways to avoid being his next victim.
Interesting to note too that we now know, thanks to the hacker that
(apparently) 0wned them, what went wrong at StartSSL.
Peter.
Errr...what's the new information exactly that wasn't known before?
I know, I know...it's such a shame that he didn't got us, right Peter?
It would have made your day, but ouuups, Eddy was on top of it. Have Fun!
--
Regards
Signer: Eddy Nigg, StartCom Ltd.
XMPP: star...@startcom.org
Blog: http://blog.startcom.org/
Twitter: http://twitter.com/eddy_nigg
Before, we knew pretty much nothing ("something happened but we won't tell you
what it was, move along, nothing to see"). Now we at least know a bit about
what did happen.
>I know, I know...it's such a shame that he didn't got us, right Peter? It
>would have made your day, but ouuups, Eddy was on top of it. Have Fun!
Actually I'm really not at all fussed about that. In any case once you own
one CA, the whole browser-PKI house of cards collapses, so it doesn't really
matter who gets owned. The real significance in this case is that the
attacker has demonstrated repeatability, so it's not longer possible to shrug
it off with "it was a one-off event".
Peter.
It was widely published by us that we suffered a security breach and
that no relying party was affected in any form. And this exactly what
you know now as well, there is nothing new.
http://www.theregister.co.uk/2011/06/21/startssl_security_breach/
Here something for you:
Security should always be designed on the assumption that a breach will
occur:
http://countermeasures.trendmicro.eu/diginotar-iran-certificates-and-you/
Eddy, do you always sleep next to your HSMs? :)
Eddy, do you always sleep next to your HSMs? :)
LOL - I said on top, not next to it ;-)
But no - I wasn't even in the office at that time, but took charge after
detection of the attempts were reported to me. Neither was this really
an HSM, but a unit we call HSM internally. But who cares really...
Would SSL suddenly no longer work?
Why do people rely on SSL to keep their connection secure from the
prying eyes of attackers but its ok to leave that connection open to the
prying eyes of the likes of google, facebook and any other CA authority.
Someone earlier on another news group was over heard saying "Whats wrong
with using paper and envelopes with a stamp these days?"
I'm inclined to agree at least then you can see when they've tried to
steam the envelope open!
Scott