[О блоге] [наверх] [пред] [2017-07-13 11:07:19+03:00] [d722fb300a046783c9bf7bec055c18dcb828f8ee]
Темы: [crypto]

Компрометация известных не китайских CA

Недавно были новости о том что WoSign и StartCom все из себя плохие CA и
их отзывают и не доверяют (c1d991e20528f6b0e84b06cda975543a69a502d2).
Вот тут кое какой список нашёл о том что куда более крупные и известные
CA совершали куда более серьёзные нарушения и факапы, но им ничего за
это не было:

https://www.eff.org/deeplinks/2015/09/symantec-issues-rogue-ev-certificate-googlecom
Symantec Issues Rogue EV Certificate for Google.com

https://threatpost.com/fraudulent-certificate-google-domains-found-after-mistake-turkish-ca-010313/77361/
Fraudulent certificate for Google domains found after mistake by turkish CA

https://defcon.org/images/defcon-17/dc-17-presentations/defcon-17-zusman-hacking_pki.pdf

https://www.cnet.com/news/microsoft-warns-of-hijacked-certificates/
VeriSign issues two digital certificates in the software giant's name...

https://en.wikipedia.org/wiki/Diginotar#Issuance_of_fraudulent_certificates
On July 10, 2011, an attacker with access to DigiNotar's systems issued
a wildcard certificate for Google.

https://en.wikipedia.org/wiki/Comodo_Group#2011_breach_incident
In 2009 Microsoft MVP Michael Burgess accused Comodo of issuing digital
certificates to known malware.

https://en.wikipedia.org/wiki/Comodo_Group#2011_breach_incident
On March 23, 2011, Comodo posted a report that 8 days earlier, on 15
March 2011, a user account with an affiliate registration authority had
been compromised and was used to create a new user account that issued
nine certificate signing requests.

    [оставить комментарий]