StartCom

Last updated
StartCom Ltd.
Company type Private company
Industry Internet security, Public key infrastructure
Founded1999;25 years ago (1999)
FounderEddy Nigg [1]
DefunctJanuary 1, 2018 (2018-01-01)
Headquarters,
Area served
Worldwide
Key people
Iñigo Barreira (CEO), Tan Xiaosheng (Chairman), Yang Qing
OwnerQihoo 360 Group
Parent StartCom CA Ltd. (UK), StartCom CA Ltd. (HK)

StartCom was a certificate authority founded in Eilat, Israel, and later based in Beijing, China, that had three main activities: StartCom Enterprise Linux (Linux distribution), StartSSL (certificate authority) and MediaHost (web hosting). StartCom set up branch offices in China, Hong Kong, the United Kingdom and Spain. [2] Due to multiple faults on the company's end, all StartCom certificates were removed from Mozilla Firefox in October 2016 [3] and Google Chrome in March 2017, including certificates previously issued, with similar removals from other browsers expected to follow. [4]

Contents

StartCom was acquired in secrecy [5] by WoSign Limited (Shenzhen, Guangdong, China), through multiple companies, [lower-alpha 1] which was revealed by the Mozilla investigation [5] related to the root certificate removal of WoSign and StartCom in 2016. Due to the sanctions of both Mozilla and Apple, [6] [7] the company announced it would be restructured during 2016 by WoSign parent Qihoo 360 Group, detaching StartCom from the scandal-affected WoSign and making it a subsidiary of Qihoo. [lower-alpha 2] [8]

Despite attempts to distance itself from the controversy, on November 16, 2017, StartCom announced termination of business, and on January 1, 2018, stopped serving new certificates, effectively closing the company. [9] [10] The StartSSL, StartCom, and StartCom CA websites now redirect to WoSign's shop page.

StartSSL

StartCom offered the free Class 1 X.509 SSL certificate "StartSSL Free", which works for webservers (SSL/TLS) as well as for E-mail encryption (S/MIME). It also offered Class 2 and 3 certificates as well as Extended Validation Certificates, where a comprehensive validation (with costs) was mandatory.

While certificates were free and unlimited for certain uses, there were limitations imposed unless an upgrade is purchased:

In June 2011, the company suffered a network breach which resulted in StartCom suspending issuance of digital certificates and related services for several weeks. [11] The attacker was unable to use this to issue certificates (and StartCom was the only breached provider, of six, where the attacker was blocked from doing so). [12]

Trustworthiness

The StartSSL certificate was included by default in Mozilla Firefox 2.x and higher, in Apple Mac OS X since version 10.5 (Leopard), all Microsoft operating systems since 24 September 2009, [13] [14] and Opera since 27 July 2010. [15] Since Google Chrome, Apple Safari and Internet Explorer use the certificate store of the operating system, all major browsers previously included support for StartSSL certificates.

On 30 September 2016, during the investigation on WoSign, Apple announced that their software will not accept certificates issued by one of the WoSign certificates after 19 September 2016, and said they will take further action on WoSign/StartCom trust anchors as the investigation progresses. [7]

On 24 October 2016, Mozilla announced on its security blog that, following its discovery of the purchase of StartCom by another Certificate Authority called WoSign during its investigation on numerous issues with that CA, and that both have failed to disclose this transaction, [16] Mozilla will stop trusting certificates that are issued after 21 October 2016 starting with Firefox 51. [17] On 1 November 2016, Google announced that it too would stop trusting certificates issued after 21 October 2016 starting with Chrome 56. Certificates issued before this date may continue to be trusted, for a time, but in subsequent Chrome releases, these exceptions will be reduced and ultimately removed. [18] On 30 November 2016, Apple products will block certificates from WoSign and StartCom root CAs if the "Not Before" date is on or after 1 Dec 2016 00:00:00 GMT/UTC. [19]

As of Version 57, Google Chrome will only trust WoSign/StartCom certificates that were issued to sites in the Alexa Top 1M list, and Chrome 58 will only trust those in the Alexa Top 500k. [20]

On 8 August 2017, Microsoft announced on its Windows Security blog that Windows 10 will not trust any new certificates from WoSign and StartCom after September 2017. [21]

Despite changes to the company's structure, StartCom did not see "any clear indication from the browsers that StartCom would be able to regain the trust" by the browser companies. Therefore, StartCom has halted the issuing of all certificates since January 1, 2018 and will terminate business completely by 2020 by revoking all issued certificates. [22]

Response to Heartbleed

On 13 April 2014, StartCom announced [23] a FAQ page [24] related to Heartbleed, a critical bug in OpenSSL estimated to have left 17% of the Internet's secure web servers vulnerable to data theft.

StartCom's policy was to charge $25 for each revoked certificate, and it refused to waive this fee in the case of certificates compromised due to Heartbleed, though some paying customers were granted a single free revocation. [25] [26] [27] This caused many to doubt StartCom's status as a certificate authority. [28] When provided with proof of a compromised certificate, StartCom refused to revoke the certificate for free, providing trust even after StartCom had learned that the certificate had been compromised. [29]

Controversies

In August 2016 it was reported that StartCom was sold to WoSign, a Chinese CA. [16] [30] [31] The original disclosure was taken down for legal reasons. [32] However, repostings of the original articles are still available. [30] The relationship is unclear, but it seems as if the StartCom technical infrastructure was being used by WoSign when they were caught issuing about a hundred [33] improperly validated SSL certificates, including a certificate for github.com. [16] [34]

An investigation by Google and Mozilla found that WoSign knowingly and intentionally mis-issued certificates in order to circumvent browser restrictions and CA requirements. As a result, Google joined Mozilla and Apple and planned to distrust all WoSign and StartCom certificates beginning in 2017. [35] On July 17, 2017, an announcement was made about the restructuring of the company. It was announced that StartCom is now 100% managed by Qihoo 360, no StartCom employees are working on WoSign premises, audits have been made by external pen testers, and a new CMS system was developed. [36]

See also

Footnotes

  1. Structure as of October 2016: WoSign CA Limited Hong-Kong → StartCom CA Limited (HK) → StartCom CA Limited (UK)
  2. Planned restructure as of October 2016, to be implemented throughout the end of 2016: through the company chain Qihoo 360 → Qifei Int'l Development Ltd. (HK) → StartCom CA Ltd. (HK), which owns 100% of StartCom (CH) and StartCom CA Ltd. (UK), which in turn owns StartCom Ltd. (Israel) and StartCom CA Ltd. (Spain)

Related Research Articles

<span class="mw-page-title-main">HTTPS</span> Extension of the HTTP communications protocol to support TLS encryption

Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It uses encryption for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security (TLS) or, formerly, Secure Sockets Layer (SSL). The protocol is therefore also referred to as HTTP over TLS, or HTTP over SSL.

Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in securing HTTPS remains the most publicly visible.

<span class="mw-page-title-main">Public key infrastructure</span> System that can issue, distribute and verify digital certificates

A public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email. It is required for activities where simple passwords are an inadequate authentication method and more rigorous proof is required to confirm the identity of the parties involved in the communication and to validate the information being transferred.

In cryptography, a public key certificate, also known as a digital certificate or identity certificate, is an electronic document used to prove the validity of a public key. The certificate includes the public key and information about it, information about the identity of its owner, and the digital signature of an entity that has verified the certificate's contents. If the device examining the certificate trusts the issuer and finds the signature to be a valid signature of that issuer, then it can use the included public key to communicate securely with the certificate's subject. In email encryption, code signing, and e-signature systems, a certificate's subject is typically a person or organization. However, in Transport Layer Security (TLS) a certificate's subject is typically a computer or other device, though TLS certificates may identify organizations or individuals in addition to their core role in identifying devices. TLS, sometimes called by its older name Secure Sockets Layer (SSL), is notable for being a part of HTTPS, a protocol for securely browsing the web.

In cryptography, X.509 is an International Telecommunication Union (ITU) standard defining the format of public key certificates. X.509 certificates are used in many Internet protocols, including TLS/SSL, which is the basis for HTTPS, the secure protocol for browsing the web. They are also used in offline applications, like electronic signatures.

<span class="mw-page-title-main">Root certificate</span> Certificate identifying a root authority

In cryptography and computer security, a root certificate is a public key certificate that identifies a root certificate authority (CA). Root certificates are self-signed and form the basis of an X.509-based public key infrastructure (PKI). Either it has matched Authority Key Identifier with Subject Key Identifier, in some cases there is no Authority Key identifier, then Issuer string should match with Subject string. For instance, the PKIs supporting HTTPS for secure web browsing and electronic signature schemes depend on a set of root certificates.

In cryptography, a certificate authority or certification authority (CA) is an entity that stores, signs, and issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others to rely upon signatures or on assertions made about the private key that corresponds to the certified public key. A CA acts as a trusted third party—trusted both by the subject (owner) of the certificate and by the party relying upon the certificate. The format of these certificates is specified by the X.509 or EMV standard.

The Online Certificate Status Protocol (OCSP) is an Internet protocol used for obtaining the revocation status of an X.509 digital certificate. It is described in RFC 6960 and is on the Internet standards track. It was created as an alternative to certificate revocation lists (CRL), specifically addressing certain problems associated with using CRLs in a public key infrastructure (PKI). Messages communicated via OCSP are encoded in ASN.1 and are usually communicated over HTTP. The "request/response" nature of these messages leads to OCSP servers being termed OCSP responders.

Netscape Plugin Application Programming Interface (NPAPI) is a deprecated application programming interface (API) for web browser plugins, initially developed for Netscape Navigator 2.0 in 1995 and subsequently adopted by other browsers.

<span class="mw-page-title-main">Extended Validation Certificate</span> Certificate for HTTPS websites and software

An Extended Validation Certificate (EV) is a certificate conforming to X.509 that proves the legal entity of the owner and is signed by a certificate authority key that can issue EV certificates. EV certificates can be used in the same manner as any other X.509 certificates, including securing web communications with HTTPS and signing software and documents. Unlike domain-validated certificates and organization-validation certificates, EV certificates can be issued only by a subset of certificate authorities (CAs) and require verification of the requesting entity's legal identity before certificate issuance.

The Online Certificate Status Protocol (OCSP) stapling, formally known as the TLS Certificate Status Request extension, is a standard for checking the revocation status of X.509 digital certificates. It allows the presenter of a certificate to bear the resource cost involved in providing Online Certificate Status Protocol (OCSP) responses by appending ("stapling") a time-stamped OCSP response signed by the CA to the initial TLS handshake, eliminating the need for clients to contact the CA, with the aim of improving both security and performance.

<span class="mw-page-title-main">DigiCert</span> Internet security company

DigiCert, Inc. is a digital security company headquartered in Lehi, Utah. DigiCert provides public key infrastructure (PKI) and validation required for issuing digital certificates or TLS/SSL certificates, acting as a certificate authority (CA) and trusted third party.

DigiNotar was a Dutch certificate authority owned by VASCO Data Security International, Inc.

<span class="mw-page-title-main">Qihoo 360</span> Chinese computer security software company

Qihoo 360, full name 360 Security Technology Inc., is a Chinese internet security company that has developed the antivirus software programs 360 Safeguard and 360 Mobile Safe, the Web browser 360 Secure Browser, and the mobile application store 360 Mobile Assistant. It was founded by Zhou Hongyi and Qi Xiangdong in June 2005. The company's head office is in Chaoyang District, Beijing.

<span class="mw-page-title-main">Heartbleed</span> Security bug in OpenSSL

Heartbleed is a security bug in some outdated versions of the OpenSSL cryptography library, which is a widely used implementation of the Transport Layer Security (TLS) protocol. It was introduced into the software in 2012 and publicly disclosed in April 2014. Heartbleed could be exploited regardless of whether the vulnerable OpenSSL instance is running as a TLS server or client. It resulted from improper input validation in the implementation of the TLS heartbeat extension. Thus, the bug's name derived from heartbeat. The vulnerability was classified as a buffer over-read, a situation where more data can be read than should be allowed.

POODLE is a security vulnerability which takes advantage of the fallback to SSL 3.0. If attackers successfully exploit this vulnerability, on average, they only need to make 256 SSL 3.0 requests to reveal one byte of encrypted messages. Bodo Möller, Thai Duong and Krzysztof Kotowicz from the Google Security Team discovered this vulnerability; they disclosed the vulnerability publicly on October 14, 2014. On December 8, 2014, a variation of the POODLE vulnerability that affected TLS was announced.

Let's Encrypt is a non-profit certificate authority run by Internet Security Research Group (ISRG) that provides X.509 certificates for Transport Layer Security (TLS) encryption at no charge. It is the world's largest certificate authority, used by more than 300 million websites, with the goal of all websites being secure and using HTTPS. The Internet Security Research Group (ISRG), the provider of the service, is a public benefit organization. Major sponsors include the Electronic Frontier Foundation (EFF), the Mozilla Foundation, OVH, Cisco Systems, Facebook, Google Chrome, Internet Society, AWS, NGINX, and Bill and Melinda Gates Foundation. Other partners include the certificate authority IdenTrust, the University of Michigan (U-M), and the Linux Foundation.

Trustico is a dedicated SSL certificate provider, They are headquartered in the United Kingdom.

In 2015, the government of Kazakhstan created a root certificate which could have enabled a man-in-the-middle attack on HTTPS traffic from Internet users in Kazakhstan. The government described it as a "national security certificate". If installed on users' devices, the certificate would have allowed the Kazakh government to intercept, decrypt, and re-encrypt any traffic passing through systems it controlled.

Version history for TLS/SSL support in web browsers tracks the implementation of Transport Layer Security protocol versions in major web browsers.

References

  1. Chirgwin, Richard (10 Oct 2016). "Heads roll as Qihoo 360 moves to end WoSign, StartCom certificate row". The Register . Retrieved 2016-12-10.
  2. "About StartCom". The Register. Apr 26, 2016. Archived from the original on June 25, 2016. Retrieved June 7, 2016.
  3. "Distrusting New WoSign and StartCom Certificates".
  4. Adam C. Engst. "Why Take Control Was Briefly Labeled "Not Secure"". Take Control.
  5. 1 2 Mozilla (2016-10-10). "WoSign and StartCom" . Retrieved 2016-10-25.
  6. apple (2016-09-30). "Blocking Trust for WoSign CA Free SSL Certificate G2 (IOS)".
  7. 1 2 apple (2016-09-30). "Blocking Trust for WoSign CA Free SSL Certificate G2 (MacOS)".
  8. Qihoo 360 Group (2016-10-14). "StartCom Remediation Plan" (PDF). Archived from the original (PDF) on 2016-10-26. Retrieved 2016-10-25.{{cite web}}: CS1 maint: numeric names: authors list (link)
  9. "StartSSL™ Certificates & Public Key Infrastructure". www.startcomca.com. Archived from the original on 2017-12-01. Retrieved 2017-11-17.
  10. 谭晓生 (17 November 2017). "Termination of the certificates business of Startcom". mozilla.dev.security.policy (Mailing list).
  11. "Web authentication authority suffers security breach". The Register. June 26, 2011. Retrieved January 14, 2012.
  12. "How StartCom Foiled Comodohacker: 4 Lessons". InformationWeek. September 8, 2011. Archived from the original on January 3, 2013. Retrieved December 20, 2012.
  13. "Microsoft Adds Support for StartCom Certificates". StartCom.org. September 24, 2009. Archived from the original (Press release) on July 17, 2011. Retrieved 2011-01-14.
  14. "Microsoft updates trusted root certs to include StartCom". Sophos.com Naked Security blog. September 27, 2009.
  15. "New Roots, new EV, and a new Public Suffix file". Opera.com Rootstore blog.
  16. 1 2 3 "CA:WoSign Issues - MozillaWiki" . Retrieved 2016-10-25.
  17. "Distrusting New WoSign and StartCom Certificates". October 24, 2016. Retrieved 2016-10-25.
  18. "Distrusting WoSign and StartCom Certificates". Google Online Security Blog. Retrieved 2016-11-02.
  19. "Lists of available trusted root certificates in iOS". Apple Support Web Site. Retrieved 2016-12-01.
  20. "685826 - Restrict the set of domains for WoSign/StartCom certificates - chromium - Monorail". bugs.chromium.org. Retrieved 2017-04-28.
  21. "Microsoft to remove WoSign and StartCom certificates in Windows 10". Windows Security. Retrieved 2017-08-11.
  22. "Termination of StartCom business". www.startcomca.com. Archived from the original on 2017-12-01. Retrieved 2017-12-03.
  23. "Twitter / startssl: We released a small FAQ page ..." StartCom. 13 April 2014.
  24. "Heartbleed F.A.Q." StartCom. 13 April 2014.
  25. "I use StartCom, and I revoked and re-keyed yesterday. In the revocation reason, ... Hacker News". Geoff. 9 April 2014.
  26. "Twitter / codeawe: @tonylampada @startssl ..." J. Breitsprecher. 11 April 2014.
  27. "Re: OpenSSL CVE-2014-0160 (aka "Heartbleed")". Jan. 9 April 2014. Archived from the original on 13 April 2014.
  28. "Most StartSSL certs will stay compromised". 9 April 2014.
  29. "StartSSL, please revoke me!". 12 April 2014. Archived from the original on April 12, 2014.{{cite web}}: CS1 maint: unfit URL (link)
  30. 1 2 "Thoughts and Observations: WoSign's secret purchase of StartCom; WoSign threatened legal actions over the disclosure". www.percya.com. Archived from the original on 2016-09-05. Retrieved 2016-09-08.
  31. "Thoughts and Observations: StartCom operated solely by WoSign in China - an analysis of the new StartCom website". www.percya.com. Archived from the original on 2016-09-07. Retrieved 2016-09-08.
  32. https://letsphish.org
  33. "Incidents involving the CA WoSign".
  34. "The story of how WoSign gave me an SSL certificate for GitHub.com".
  35. Seals, Tara (November 2, 2016). "Google to Distrust WoSign/StartCom Certificates". InfoSecurity Magazine. Retrieved July 7, 2017.
  36. "1311832 - StartCom: Action Items". bugzilla.mozilla.org. Retrieved 2017-08-01.