by andygambles on 3/24/17, 9:52 PM with 104 comments
by c3t0 on 3/24/17, 11:20 PM
Problems since Oct 2015 and the action unexpected? see 1)
> We hope it was not calculated to create uncertainty and doubt within the Internet community about our SSL/TLS certificates.
Symantec took no ownership of the issue. Snarky underhanded remarks are not a professional way to address shortcomings in managing their product.
> For example, Google’s claim that we have mis-issued 30,000 SSL/TLS certificates is not true. In the event Google is referring to, 127 certificates – not 30,000 – were identified as mis-issued, and they resulted in no consumer harm.
Per Chrome's team an initial set of reportedly 127 certificates has expanded to include at least 30,000 certificates, issued over a period spanning several years see 2)
Summary: No ownership and no action plan conveyed in Symantec's 421 word message.
1) https://security.googleblog.com/2015/10/sustaining-digital-c...
2) https://groups.google.com/a/chromium.org/forum/#!msg/blink-d...
by Manishearth on 3/25/17, 1:17 AM
Lol.
This is like being court-ordered to do community support and then bragging about all the volunteering you do. Symantec was forced by Google to do CT. See https://security.googleblog.com/2015/10/sustaining-digital-c... , specifically:
> Therefore we are firstly going to require that as of June 1st, 2016, all certificates issued by Symantec itself will be required to support Certificate Transparency.
(By the end of this year, all CAs will be forced to do CT, but Symantec was forced into this last year, because of the stupid shit they keep doing)
by hackcasual on 3/25/17, 12:01 AM
* Root CA practice allows delegating validation to 3rd parties
* However, the Root CA must accept all responsibility for any mis-validation the 3rd parties do. No throwing them under the bus
* Symantec delegates validation to 4 different companies to serve local markets
* Said companies fail to adequately validate domain ownership
* Symantec attempts to throw them under the bus
Further compounding the issue is that there is no way to separate the certificates that had more rigorous validation than the ones validated by these 4 companies
by orless on 3/25/17, 12:27 AM
I also wonder what the exact consequences will be (Symantec post fails to explain this). I mean, which big sites will be hit? When? For how many users?
by leeoniya on 3/24/17, 11:03 PM
What they will vigorously defend is disruption to their reputation and their bottom line. What benefit does a business get from Symantec that they do not get from Let's Encrypt? EV?
by 0x0 on 3/24/17, 11:20 PM
PS: It's funny that Symantec's first google hit for "Encryption Everywhere" prompts for my browser's geolocation unsolicited. If your product is trust, maybe you should think a little bit more about how you present your product.
by robbiet480 on 3/24/17, 11:25 PM
[1]: https://groups.google.com/a/chromium.org/d/msg/blink-dev/eUA...
by dionysianstanza on 3/25/17, 12:46 AM
Their response speaks volumes.
by angry_octet on 3/25/17, 12:15 AM
by ganfortran on 3/25/17, 7:39 AM
"We are not the only one doing this, why us Google, why us?"
What a shitty excuse. Laughable. Big F to Symantec and wish you bankrupt :)
by guelo on 3/24/17, 11:24 PM
by jwilk on 3/24/17, 11:21 PM
by draw_down on 3/25/17, 1:05 AM
by apecat on 3/25/17, 10:07 PM
With this history of mis-issued certs in mind, Symantec's CA business should be kicked to the ground, left bleeding and never be trusted again.
by natch on 3/25/17, 3:07 AM
They aren't helping themselves any with this kind of post, imho.
by sparkling on 3/24/17, 11:39 PM
by Animats on 3/25/17, 4:16 AM
by wav-part on 3/25/17, 1:53 AM
Regarding TLDs coming under control of Govts, Its solved by independent mirror nameservers run by app devs (Firefox/Chrome/etc) and NGOs (EFF/etc).
by korzun on 3/25/17, 3:10 AM
by Grue3 on 3/25/17, 7:49 AM