Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
WoSign and letsencrypt.cn (groups.google.com)
206 points by arthur2e5 on Dec 18, 2016 | hide | past | favorite | 60 comments


For those of you who don't read beyond the subject line, here's the meat:

> It seams that wosign has registered the domains letsencrypt.cn and letsencrypt.com.cn in 2014 after the public announce of Let's Encrypt.

And here's the whois record:

    $ whois letsencrypt.cn
    Domain Name: letsencrypt.cn
    ROID: 20141120s10001s72911711-cn
    Domain Status: clientTransferProhibited
    Registrant ID: k35-n2041486_00
    Registrant: 深圳市沃通电子商务服务有限公司
    Registrant Contact Email: dns@wosign.com
    Sponsoring Registrar: 厦门三五互联科技股份有限公司
    Name Server: ns3.dns-diy.com
    Name Server: ns4.dns-diy.com
    Registration Time: 2014-11-20 09:57:27
    Expiration Time: 2017-11-20 09:57:27
    DNSSEC: unsigned
Unless they registered those domains to "reserve" them for LetsEncrypt (haha right?), this is pretty blatantly deceptive, or at least they planned to be. Then again not exactly the worst thing they've done in the world of SSL.


> Unless they registered those domains to "reserve" them for LetsEncrypt (haha right?)

Which is exactly what WoSign say they did in that same comment thread after noticing that LetsEncrypt didn't register the Chinese domain names themselves.

They also offer to transfer them to LetsEncrypt at no cost.


Then I'm sure they have a copy of the email they sent to Let's Encrypt the day they registered it, letting know they were just doing them a favor...


This is so blatantly abusive that wosign and startcom needs to be pulled from all trusted root CA stores immediately. If their SSL cert clients' websites break, so be it. This is outright malicious behavior.

The internet engineering community would come down like a ton of bricks if somebody registered ripe.cn and decided to impersonate RIPE. Same principle.


They didn't impersonate letsencrypt so that doesn't apply.


It's true that they didn't impersonate letsencrypt, but they did:

1. Assign DNS records to these two domains and remove them after someone exposed these domains. https://groups.google.com/d/msg/mozilla.dev.security.policy/... https://archive.fo/MQwMK; https://archive.fo/0HQZ7

2. Send marketing e-mails that exaggerate threats of using a "foreign CA", such as Let's Encrypt: https://groups.google.com/d/msg/mozilla.dev.security.policy/... (Well, "Percy" has always been bringing it up.)

While (2) has been something too old to keep bringing up, (1) certainly undermines some of Richard Wang's claim.


For anyone who doesn't know the backstory on this already: WoSign (and, after WoSign quietly acquired it, StartCom) were distrusted by Mozilla for mismanagement ranging from backdating certificate to bypass crypto requirements to accidentally mis-issuing certificates.

It is unlikely that WoSign or any CA run by WoSign will ever fully compatible with browsers in the future.


Startcom's certs still show as ok in Firefox for me. Any idea when this kicks in?


Existing certs (those with a notBefore date before Oct 21 [0]) are still trusted by Firefox. New certificates are not.

(WoSign could theoretically backdate the notBefore date on new certs to make them look like existing certs, but Mozilla have said that if they catch WoSign doing this they'll distrust their root totally.)

Other browsers are taking similar measures, but I'm not sure on the details.

[0]: https://blog.mozilla.org/security/2016/10/24/distrusting-new...


Apple are trusting certs WoSign published to Certifitcate transparency server before September [0] and StartCom certs with an notbefore dates of December [1]

[0] https://groups.google.com/forum/m/#!topic/mozilla.dev.securi...

[1] https://groups.google.com/forum/m/#!topic/mozilla.dev.securi...


The Startcom revocation wasn't retroactive. It only affects certificates issued after 2016-10-21.


Thanks for adding this clarification!


Nope; I'm sure the information is out there somewhere. There was a big discussion about grandfathering, too.


Are they distrusted by iOS and macOS?


https://support.apple.com/en-us/HT204132

In the long run: indefinite (likely permanent) distrust by Mozilla is probably the death sentence for any CA.


It looks like WoSign is already back at it, reselling certs from another CA. I understand someone else is doing the issuing, but I'd hoped that they would die a quick death, not hang on bitterly: https://groups.google.com/forum/#!topic/mozilla.dev.security...


Has anyone else noticed that Richard Wang has replied on both this linked to thread, and the parent thread now. I thought I had read that he had stepped down as the WoSign CEO?


Business as usual in the dirty cert industry

https://letsencrypt.org/2016/06/23/defending-our-brand.html


fyi, it looks like this may be overblown. Richard Wang, the person who registered the .cn domains, posted this in the thread:

---------------------------

I wish everyone can talk about this case friendly and equally.

It is very common that everyone can register any domain based on the first come and first service rule.

We know Let's Encrypt is released after the public announcement, but two day later, its .cn domain is still not registered, I think maybe it is caused by the strict registration rule in China, so I registered it for protection that not registered by Cornbug.

We don’t use those domains for any WoSign's services that we provide similar service: https://pki.click/index_En.htm (SSL Wizard, StartEncrypt)

Now, if Mozilla or Let’s Encrypt contact me officially and request to transfer the two domains to them, no any problem, we can transfer to them for FREE!

But please notice that this arrangement is for friendship, not for others ......

Best Regards,

Richard


If he registered the domains to 'protect' them he should have contacted LE immediately afterwards to arrange the transfer. Not wait until the world finds out. It's easy to use that form of reasoning ("I only did it for protection") after others find out. But is such a person trustworthy? I have my doubts.


In case anyone is wondering, "Cornbug" is a direct translation of 玉米虫 which in Chinese has the meaning of "domain squatter" in addition to the literal meaning.


This could develop further. Reminds me of TOM Skype: Chinese users are redirected from skype.com to the chinese-characteristics website skype.tom.com which serves a censorship-enabled version of skype, see https://en.greatfire.org/blog/2013/nov/tom-skype-dead-long-l...


Well this is a collaboration b/t Skype and TOM.com. Skype has to do it b/c they don't have license to operate in China. My skype account was registered in China and I have to prove I'm not in China anymore to remove the association..


Skype chooses to do it. They could also simply choose not to cooperate, and be blocked.


The Twit network has some very detailed podcasts about Wosign's sliminess:

https://twit.tv/search/wosign

This is a CA death penalty situation as far as I'm concerned.


+1 wrt to the twit conversations. Leo & Steve Gibson on Security Now have regularly spoken about wosign, and it's the primary reason why my antenna immediately perked up when I saw the headline.

As a general note, the content on the TWiT network is superb. I love the great ethics conversations that are had on TWiG (This Week in Google). I've loved listening to the "coming out of the wilderness" progression of Mary Jo Foley & Paul Thurrott with regards to Microsoft on Windows Weekly. And Security Now is my guilty educational pleasure, as its greatly expanded my knowledge of security issues and topics, which have served me well over the past few years.


Seconded. I highly recommend the two parts interview of Bill Atkinson

https://twit.tv/shows/triangulation/episodes/244?autostart=f...

https://twit.tv/shows/triangulation/episodes/247?autostart=f...

The part about taking pictures of stones and his current venture at the end are less appealing to me but the discussion about the early days of Apple, and generally his view on technology is really interesting. There is a long part about AI.


The only podcast I listened to for years with any consistency was FLOSS Weekly. This later exposed me Security Now, This Week in Enterprise Tech (TWiET on the set! I love the catch phrase), This Week in Law (which zero of my law school and lawyers friends address when I send them good episodes), and recently Triangulation.

In the new era of Software Engineering Daily and Changelog, as I see Leo Laporte as the godfather of podcasting. I disagree with a lot he has to say, but I respect him greatly and dream of meeting him one day. He is one of my heros.

And Leo: I use Emacs, and no so much Perl. I have nothing to interview for, but I can answer to your favorite question with at least half of your favorite answer, if you read this somehow!


Steve Gibson will go into levels of detail that amaze me. The podcast on Rowhammer is a perfect example - down to the minute details of how VMs store memory pages...

Its also can be a great sleep aid.


Crap, I am not even familiar with that episode, and SN is the longest running on TWiT. Link? Is 498 or 576?

https://twit.tv/shows/security-now/episodes/498

https://twit.tv/shows/security-now/episodes/576



A similar name may be enough to fool everyday users, but I don't think they're going to trick Mozilla and Google into trusting then.


Why would that matter? They can set up a similar service and use the wosign ca and Mozilla/google wouldn't know anything is amiss



Previous discussion: https://news.ycombinator.com/item?id=12582534

tl;dr - WoSign/StartCom are no longer trusted as a CA (at least by Firefox)


However, previously issued certs are still trusted. For instance, Firefox doesn't complain about this site's WoSign cert: https://www.checkmyping.com/


Existing certs are still trusted.

Mozilla stated that they will not distrust certs issued with notBefore till December, so theoretically this cert is good for as long as it's still valid, only after that they need to worry.


It's really difficult to understand why anyone would want to do this. Unless they were working with Let's Encrypt directly I really don't see how this could ever be acceptable.

Why would anyone do such an obviously bad thing and slap their company information in the whois?


Because they thought they could get away with it - just like all of the other stuff they've done. And they did get away with it for a while.


What's the motivation though? It doesn't seem like they've really ever used the domain. Right now this all just seems utterly pointless and stupid on their part, but I guess that's really nothing new.


To me, the most obvious motivation for registering the domain would be to basically make a domain squat. Redirect anyone visiting "letsencrypt.cn" to their own, similarly named (and now defunct as far as I know) service "StartEncrypt" [1]. Like any other domain squat, it would probably allow them to profit to some degree from the buzz Let's Encrypt was generating.

[1] https://news.ycombinator.com/item?id=11903513


Except that they weren't doing that.


A "win at all costs" mentality, "winning" being defined as "whatever I feel like doing." You see a lot of this trait in the criminal justice system, if you've never been through it.


Modern Chinese culture in a nutshell.


I don't know about that.


As a frequent user of the Chinternet, a .cn counterpart of a famous project is an alarm sign of non-affiliated copy of the original project or simply just someone wants to build a Chinese version (still not affiliated) community for that project.

After all these dramas with .cn, a wary user should reject .cn on the first sight. Too sad for Chinese/Non-technical users, as they have no choice. There's nothing can be done about the situation.


Do we have to run certbot every few months to update the certs? Can we set up a cron to do it? Thoughts welcome.


Yes - you can add it to a cronjob, as well as add a `--renew-hook` option that tells it to do something post renewal, such as restart your webserver.

See https://certbot.eff.org/docs/using.html#renewing-certificate...


The documentation recommends using a cron job[0] - the renew subcommand will renew all certificates you have in plenty of time automatically. Set it to run once a week or so, and it'll figure out what to renew and when.

[0] https://certbot.eff.org/docs/using.html#renewing-certificate...


I just use a cron:

/path/to/letsencrypt/letsencrypt-auto -d domain.con certonly && service nginx reload


I've been using certbot to automatically update my cert for about a year now with cron. It automatically checks the cert's expiration date and starts trying to renew a couple of weeks before it runs out, and for nginx at least you don't even have to reload.


Has Richard Wang left WoSign as CEO or not?


During last-chance negotiations with Mozilla, they claimed he was stepping down immediately. However, Mozilla moved against them anyway, so presumably they immediately went back on that pledge once it became clear that it wasn't helping. Apart from the time of the negotiations, there haven't been any other claims that he had stepped down as far as I know.



I don't see how it's a security problem. Just because the domains are similar doesn't mean browsers will accidentally start trusting the CA.


This is how these sort of attacks have always worked. Get something that's just close enough so that it passes the glance attack. If someone doesn't notice anything in the first few seconds, you've done half your work right there.


What is going to happen in a quick glance? Including a CA in a browser is an extremely long and drawn out processing involving third party audits and many other things costing hundreds of thousands of dollars. There is zero chance that no one along that whole process will notice that the TLD is actually .cn .


Obviously, but that's not the concern. The concern is that someone would visit letsencrypt.cn and end up getting a certificate from a provider that is not Let's Encrypt without really understanding that. Imagine a busy, non-SSL-expert user who just hears "Let's Encrypt is good, you should use it".

Since the domains aren't being used, we can't say what the intention was, but it's being judged as part of a pattern of behavior by Wosign.


Ok, but that's not really a security problem. You don't give out your private key when getting a certificate.


Actually many customers let the CA generate the private key and copy it onto their servers, but that's not the point.

It's a trust problem because of the pattern of this particular CA. Whether you call that a security problem or not is semantics. If not for the existing pattern of behavior, people would be a little more willing to look charitably on this as an honest mistake or trying to help, but given the history the assumption of good faith has been considerably weakened.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: