You may have heard in the news that the Chinese Certificate Authority, WoSign, was caught backdating SHA-1 certificates to make it look like they were issued before the December 31, 2015 deadline. Why is this newsworthy?  For web-based security to remain an integral part of an ecosystem used every day by millions of people around the world, it all comes down to Trust; trust in the organization issuing the certificates, trust in the browsers that validate and display certificate information to the user, and trust by relying parties browsing web pages secured by certificates. Without trust, worldwide commerce and security on the web are at risk.

Initially, WoSign denied these allegations but later, after Mozilla uncovered forensic evidence, they admitted in a published report that they had indeed backdated 64 certificates. In addition, WoSign mis-issued several certificates for unauthorized domains. Lastly, WoSign purchased Startcom, an Israeli CA, without notifying the browsers of this transaction. These and other faults have been discussed in a Mozilla document where community input was taken into account before a proposed plan of action was produced.

Mozilla has decided to distrust 4 WoSign roots and 2 Startcom roots as well as require Certificate Transparency (CT) for all new certificates going forward. CT has proven itself as an effective means for monitoring all certificates issued by Certificate Authorities. Existing WoSign/Startcom certificates will be trusted, but any certificate issued after October 21, 2016 will not show up as trusted starting with Firefox version 51. WoSign/Startcom are free to apply for inclusion of new roots after June 1, 2017, but must also make certain changes to their operations, policies and audits. Mozilla has outlined these changes in a bug report for WoSign and a separate one for Startcom. These are more concisely summarized in Mozilla’s Blog.

In addition, Apple has stated they will no longer trust the WoSign CA Free SSL Certificate G2 intermediate CA certificate that issues certificates after September 19, 2016. Lastly, Google announced that starting with Chrome version 56, Google will phase out trust for WoSign and Startcom root certificates.

In practicality, what does this all mean? WoSign have already announced they will still sell certificates — presumably by either reselling another public CA’s certificates or by licensing a subCA from a publicly trusted root.  The management of WoSign is being changed.  Mozilla, Google, and Apple’s actions are the first step in restoring trust in the ecosystem from an ecosystem participant caught not playing by the rules. Other browsers have yet to announce their plans, but we expect similar actions to follow.

Owners of certificates from these entities should likely seek to replace them with new providers due to the uncertainty with the trustworthiness of their current CA.

  • Imagina Colombia

    It’s a shame! Startssl was a good and honest provider with a very good offer for EV and wildcard certificates and fall in the hands of this Wosign cheaters.

    We started to change every certificate from StartSSL, tedious process: http://www.imaginacolombia.com