The recommendation is that all affected root certificates be revoked and
replaced. The question is whether any of the root certificates
installed in the past two years or are approved or under review are
affected.
--
David E. Ross
<http://www.rossde.com/>
Go to Mozdev at <http://www.mozdev.org/> for quick access to
extensions for Firefox, Thunderbird, SeaMonkey, and other
Mozilla-related applications. You can access Mozdev much
more quickly than you can Mozilla Add-Ons.
I presume that by "affected root certificates" you mean "root
certificates with key pairs generated using OpenSSL on Debian-based
systems", correct? The only CA I can think of that would possibly be in
this situation is CAcert, and of course it's not even applying for
inclusion at this point. Maybe I'm naive, but I can't imagine any
commercial CAs are using OpenSSL for CA functions -- but in any case we
can certainly ask CAs about this. Could you please file a bug on this
against mozilla.org / CA certificates and assign it to me?
Frank
--
Frank Hecker
hec...@mozillafoundation.org
Correct. But also CA operation may be affected by any system/component
the CA is deploying in its operational context (think of OpenSSH,
Apache/mod_ssl, VPN-software etc.).
> Maybe I'm naive, but I can't imagine any commercial CAs are using
> OpenSSL for CA functions
I'd guess OpenSSL is indeed used in some commercial PKI(-enabled)
packages. I know of at least one.
Ciao, Michael.
I presume that by "affected root certificates" you mean "root certificates with key pairs generated using OpenSSL on Debian-based systems", correct? The only CA I can think of that would possibly be in this situation is CAcert, and of course it's not even applying for inclusion at this point. Maybe I'm naive, but I can't imagine any commercial CAs are using OpenSSL for CA functions -- but in any case we can certainly ask CAs about this.
| Regards | |
| Signer: | Eddy Nigg, StartCom Ltd. |
| Jabber: | star...@startcom.org |
| Blog: | Join the Revolution! |
| Phone: | +1.213.341.0390 |
You're right, my comment was a bit snarky in a way I didn't really
intend, and I apologize for that. I agree that OpenSSL is a good product
(and one that the Mozilla Foundation has helped fund some development
for, BTW), and in any case the present problem is really an OpenSSL on
Debian problem, not an OpenSSL problem per se.
However it's still unclear to me how many public commercial CAs have
incorporated OpenSSL+Debian, or even just OpenSSL, as a core part of
their infrastructure. You're willing and able at Startcom to "hand
build" large parts of your CA system, but I'm not sure if that's common
among public commercial CAs, or whether Startcom is unusual in this
regard. I'd rather guess that most public commercial CAs are deploying
off-the-shelf commercial CA software bought from a third party.
Frank
P.S. Since we're talking about hackable CA software, I'll also mention
the Dogtag project out of Red Hat, the open source version of the
commercial Red Hat Certificate System.
--
Frank Hecker
hec...@mozillafoundation.org
Please note that the problem is only with Debian-based implementations
of OpenSSL. Other Linux and also UNIX implementations of OpenSSL are
not affected.
Per Hecker's reply, I have opened bug report #434128.
Eddy Nigg (StartCom Ltd.) wrote:
Therefore I think it's wrong to categorically deny OpenSSL as a useless piece of code not worthy to be used by CAs - just because some code-hero (or script-kiddy) had it wrong. That's certainly not the case!
I agree that OpenSSL is a good product (and one that the Mozilla Foundation has helped fund some development for, BTW), and in any case the present problem is really an OpenSSL on Debian problem, not an OpenSSL problem per se.
However it's still unclear to me how many public commercial CAs have incorporated OpenSSL+Debian, or even just OpenSSL, as a core part of their infrastructure.
You're willing and able at Startcom to "hand build" large parts of your CA system, but I'm not sure if that's common among public commercial CAs, or whether Startcom is unusual in this regard.
I'd rather guess that most public commercial CAs are deploying off-the-shelf commercial CA software bought from a third party.
P.S. Since we're talking about hackable CA software, I'll also mention the Dogtag project out of Red Hat, the open source version of the commercial Red Hat Certificate System.
Dogtag is based on the former Netscape Certificate Management
System.
Fedora Directory Server is based on the former Netscape Directory
Server.
Wan-Teh