Jump to content

StartCom

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Lonaowna (talk | contribs) at 12:34, 15 January 2017 (website in wikidata). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

StartCom Ltd.
Company typePrivate company
IndustryInternet security, Public key infrastructure
Founded1999; 25 years ago (1999)
FounderEddy Nigg[1]
Headquarters,
Area served
Worldwide
Key people
Iñigo Barreira (CEO), Tan Xiaosheng (Chairman), Yang Qing
OwnerQihoo 360 Group
ParentStartCom CA Ltd. (UK), StartCom CA Ltd. (HK)

StartCom is a certificate authority based in Eilat, Israel, that has three main activities: StartCom Linux Enterprise (Linux distribution), StartSSL (certificate authority) and MediaHost (web hosting). StartCom has set up new branch offices in China, Hong Kong, the United Kingdom and Spain.[2]

StartCom was acquired in secrecy[3] by WoSign Limited (Shenzen, China), through multiple companies,[a] which was revealed by the Mozilla investigation[3] related to the root certificate removal of WoSign and StartCom in 2016. Due to the sanctions of both Mozilla and Apple[4][5] the companies will be restructured (within 2016) by the owner company of WoSign: Qihoo 360 Group (Beijing); the new structure will detach StartCom from the scandal-affected WoSign and put it under Qihoo 360 as a 100% subordinate company.[b][6]

StartSSL

StartCom offers the free Class 1 X.509 SSL certificate "StartSSL Free", which works for webservers (SSL/TLS) as well as for E-mail encryption (S/MIME). It also offers Class 2 and 3 certificates as well as Extended Validation Certificates, where a comprehensive validation (with costs) is mandatory.

In June 2011, the company suffered a network breach which resulted in StartCom suspending issuance of digital certificates and related services for several weeks.[7] The attacker was unable to use this to issue certificates (and StartCom was the only breached provider, of six, where the attacker was blocked from doing so).[8]

Trustworthiness

The StartSSL certificate is included by default in Mozilla Firefox 2.x and higher, in Apple Mac OS X since version 10.5 (Leopard), all Microsoft operating systems since 24 September 2009,[9][10] and Opera since 27 July 2010.[11] Since Google Chrome, Apple Safari and Internet Explorer use the certificate store of the operating system, all major browsers include support for StartSSL certificates.

On 30 September 2016, during the investigation on WoSign, Apple announced that their software will not accept certificates issued by one of the WoSign certificates after 19 September 2016, and said they will take further action on WoSign/StartCom trust anchors as the investigation progresses.[5]

On 24 October 2016, Mozilla announced on its security blog that, following its discovery of the purchase of StartCom by another Certificate Authority called WoSign during its investigation on numerous issues with that CA, and that both have failed to disclose this transaction,[12] Mozilla will stop trusting certificates that are issued after 21 October 2016 starting with Firefox 51.[13] On 1 November 2016, Google announced that it too would stop trusting certificates issued after 21 October 2016 starting with Chrome 56.[14] On 30 November 2016, Apple products will block certificates from WoSign and StartCom root CAs if the "Not Before" date is on or after 1 Dec 2016 00:00:00 GMT/UTC. [15]

Limitations of StartSSL Unlimited Free Certificates

While certificates are free and unlimited for certain uses, there are limitations imposed unless an upgrade is purchased:

  • Three-year certificate validity
  • Certificate revocation requires a fee

Response to Heartbleed

On 13 April 2014, StartCom announced[16] a FAQ page[17] related to Heartbleed, a critical bug in OpenSSL estimated to have left 17% of the Internet's secure web servers vulnerable to data theft.

StartCom's policy is to charge $25 for each revoked certificate, and it refused to waive this fee in lieu of certificates compromised due to Heartbleed, though some paying customers were granted a single free revocation.[18][19][20][21] This caused many to doubt StartCom's status as a certificate authority.[22] When provided with proof of a compromised certificate, StartCom refused to revoke the certificate for free, providing trust even after StartCom had learned that the certificate had been compromised.[23]

Criticism

In August 2016 it was reported that StartCom was sold to WoSign, a Chinese CA.[12][24][25] The original disclosure was taken down for legal reasons.[26] However, repostings of the original articles are still available.[24] The relationship is unclear, but it seems as if the StartCom technical infrastructure was being used by WoSign when they were caught issuing about a hundred[27] improperly validated SSL certificates, including a certificate for github.com.[12][28]

See also

Footnotes

  1. ^ Structure as of October 2016: WoSign CA Limited Hong-Kong → StartCom CA Limited (HK) → StartCom CA Limited (UK))
  2. ^ Planned restructure as of October 2016, o be implemented throughout the end of 2016: through the company chain Qihoo 360 → Qifei Int'l Development Ltd. (HK) → StartCom CA Ltd. (HK), which owns 100% of StartCom (CH) and StartCom CA Ltd. (UK), which in turn owns StartCom Ltd. (Israel) and StartCom CA Ltd. (Spain)

References

  1. ^ Chirgwin, Richard (10 Oct 2016). "Heads roll as Qihoo 360 moves to end WoSign, StartCom certificate row". The Register. Retrieved 2016-12-10.
  2. ^ "About StartCom". The Register. Apr 26, 2016. Retrieved June 7, 2016.
  3. ^ a b Mozilla (2016-10-10). "WoSign and StartCom". Retrieved 2016-10-25.
  4. ^ apple (2016-09-30). "Blocking Trust for WoSign CA Free SSL Certificate G2 (IOS)".
  5. ^ a b apple (2016-09-30). "Blocking Trust for WoSign CA Free SSL Certificate G2 (MacOS)".
  6. ^ Qihoo 360 Group (2016-10-14). "StartCom Remediation Plan" (PDF). Retrieved 2016-10-25.{{cite web}}: CS1 maint: numeric names: authors list (link)
  7. ^ "Web authentication authority suffers security breach". The Register. June 26, 2011. Retrieved January 14, 2012.
  8. ^ "How StartCom Foiled Comodohacker: 4 Lessons". InformationWeek. September 8, 2011. Retrieved December 20, 2012.
  9. ^ "Microsoft Adds Support for StartCom Certificates" (Press release). StartCom.org. September 24, 2009. Retrieved 2011-01-14.
  10. ^ "Microsoft updates trusted root certs to include StartCom". Sophos.com Naked Security blog. September 27, 2009.
  11. ^ "New Roots, new EV, and a new Public Suffix file". Opera.com Rootstore blog.
  12. ^ a b c "CA:WoSign Issues - MozillaWiki". Retrieved 2016-10-25.
  13. ^ "Distrusting New WoSign and StartCom Certificates". October 24, 2016. Retrieved 2016-10-25.
  14. ^ "Distrusting WoSign and StartCom Certificates". Google Online Security Blog. Retrieved 2016-11-02.
  15. ^ "Lists of available trusted root certificates in iOS". Apple Support Web Site. Retrieved 2016-12-01.
  16. ^ "Twitter / startssl: We released a small FAQ page ..." StartCom. 13 April 2014.
  17. ^ "Heartbleed F.A.Q." StartCom. 13 April 2014.
  18. ^ "I use StartCom, and I revoked and re-keyed yesterday. In the revocation reason, ... Hacker News". Geoff. 9 April 2014.
  19. ^ "Twitter / codeawe: @tonylampada @startssl ..." J. Breitsprecher. 11 April 2014.
  20. ^ "Re: OpenSSL CVE-2014-0160 (aka "Heartbleed")". Jan. 9 April 2014.[dead link]
  21. ^ "Re: OpenSSL CVE-2014-0160 (aka "Heartbleed")". arnowelzel. 10 April 2014.[dead link]
  22. ^ "Most StartSSL certs will stay compromised". 9 April 2014.
  23. ^ "StartSSL, please revoke me!". 12 April 2014. Archived from the original on April 12, 2014. {{cite web}}: Unknown parameter |deadurl= ignored (|url-status= suggested) (help)
  24. ^ a b "Thoughts and Observations: WoSign's secret purchase of StartCom; WoSign threatened legal actions over the disclosure". www.percya.com. Retrieved 2016-09-08.
  25. ^ "Thoughts and Observations: StartCom operated solely by WoSign in China - an analysis of the new StartCom website". www.percya.com. Retrieved 2016-09-08.
  26. ^ https://letsphish.org
  27. ^ https://groups.google.com/d/topic/mozilla.dev.security.policy/k9PBmyLCi8I/discussion
  28. ^ "The story of how WoSign gave me an SSL certificate for GitHub.com".