Closed Bug 1047011 Opened 11 years ago Closed 10 years ago

Remove 1024-bit GTE CyberTrust Global Root

Categories

(NSS :: CA Certificates Code, task)

3.17.3
task
Not set
normal

Tracking

(Not tracked)

RESOLVED FIXED

People

(Reporter: kathleen.a.wilson, Assigned: kathleen.a.wilson)

References

Details

(Whiteboard: Changes are in NSS 3.17.3, Firefox 36)

Remove this 1024-bit root from NSS: CN = GTE CyberTrust Global Root OU = "GTE CyberTrust Solutions, Inc." O = GTE Corporation C = US SHA1: 97:81:79:50:D8:1C:96:70:CC:34:D8:09:CF:79:44:31:36:7E:F4:74 It was removed in Bug #936304 and then added back on Bug #1046343 due to compatibility concerns. We need to figure out a path forward regarding removal of this 1024-bit root, and then make it happen. I see three possible approaches for migrating off of this root: 1)Identify and temporarily include the 2048-bit version of cross-signed intermediate certs, as per Bug #1045189. More testing is needed and we will need to collect the set of intermediate certs that will have the biggest impact on easing the migration off of this root. 2) Dynamic fetching of missing intermediate certs, as described in Bug #399324. But this is controversial and is being discussed in mozilla.dev.security.policy. 3) Set a new date to remove the root, communicate the change and provide information about how folks can fix their web servers if the change impacts them.
Assignee: nobody → kwilson
Status: NEW → ASSIGNED
It looks like we will not do option 2 (dynamic fetching of missing intermediate certs). We can consider temporarily including a small set of 2048-bit cross-certificates to ease the migration. We would need those cross-certificates attached to this bug by mid-September. We are targeting Firefox 35 for this root removal: https://wiki.mozilla.org/RapidRelease/Calendar
Whiteboard: Target Firefox 35
Sites affected by removal of this root, detected after scanning Alexa Top 1 million sites (~400000 SSL enabled) as of 11th of July: 191.it@217.169.121.228 acdelcogarage.com@174.143.186.120 alice.it@217.169.121.227 bancagenerali.it@193.41.84.51 baskinrobbins.com@164.109.96.216 bil.com@156.133.48.230 bpost.be@193.191.180.209 cadillaceurope.com@213.83.24.215 chevrolet.com.pe@198.208.245.20 cm.be@62.213.199.139 comune.roma.it@94.86.40.109 dell.ca@143.166.83.38 dell.cl@143.166.83.38 dell.com@143.166.224.244 dell.com.br@143.166.83.38 dell.com.co@143.166.83.38 dell.com.mx@143.166.83.38 dell.com.pr@143.166.224.244 don.com@164.109.41.73 dsoa.ae@195.229.104.87 dunkinfranchising.com@164.109.96.216 dyson.com.au@216.255.88.233 electrabel.be@37.110.194.239 etisalat.com.eg@41.222.129.2 etisalat.eg@41.222.129.210 ettoday.net@219.85.79.131 euromut.be@194.78.148.214 gmfamilyfirst.com@198.208.73.78 gmfleetorderguide.com@198.208.145.185 gm-korea.co.kr@198.208.106.109 hallmark.com@165.193.83.157 impresasemplice.it@77.238.17.230 infostrada.it@54.229.10.161 isuzu.co.za@41.215.239.42 jumpin.it@212.48.1.45 mc.be@62.213.199.139 mcdonaldsarabia.com@216.255.66.200 myalcon.com@164.109.69.40 mylu.liberty.edu@208.95.48.173 nic.ae@195.229.242.240 oz.be@194.78.148.212 parlamento.pt@88.157.195.27 partenamut.be@194.78.148.217 planchevrolet.com.ar@198.208.145.32 sacredheart.edu@198.101.212.115 sanpaoloimi.com@193.41.198.240 sdtps.gov.ae@213.42.203.183 sisalpay.it@85.40.211.250 sriwijayaair.co.id@203.196.90.50 tim.it@156.54.69.9 turismodeportugal.pt@83.240.208.254 tvlicence.ie@194.125.152.173 ustation.it@77.238.10.99 visitportugal.com@83.240.208.237 windgroup.it@54.229.10.164 wind.it@54.229.10.160 www.agenziafarmaco.gov.it@156.54.64.29 www.agustawestland.com@193.169.150.1 www.base.gov.pt@194.65.55.203 www.bep.gov.pt@194.110.76.232 www.chevrolet.co.kr@198.208.106.109 www.dell.com.pr@143.166.83.38 www.dgs.pt@80.172.233.33 www.e-financas.gov.pt@213.13.158.241 www.emfa.pt@194.140.232.200 www.genertellife.it@92.246.34.26 www.gmiotraining.com@208.81.182.147 www.gntn-pgd.it@5.97.112.30 www.gov-madeira.pt@62.28.7.146 www.inci.pt@194.65.55.196 www.inps.it@94.86.41.16 www.oz.be@137.116.217.170 www.portaldasfinancas.gov.pt@213.13.158.243 www.ricevitoresisal.it@5.97.112.54 www.sef.pt@83.240.239.138 www.timinternet.it@156.54.69.10 www.wifiarea.it@217.169.121.230
(In reply to Hubert Kario from comment #2) > Sites affected by removal of this root, detected after scanning Alexa Top 1 > million sites (~400000 SSL enabled) as of 11th of July: Thanks Hubert! Steven, I'm sure you are already in contact with these customers. Please continue to encourage them to migrate to a newer CA hierarchy that does not use 1024-bit RSA certificates. The code change corresponding to this bug will result in the above listed websites becoming untrusted when Firefox 35 is released. ( https://wiki.mozilla.org/RapidRelease/Calendar ) Also, note that the changes will be in an NSS release in early October, so others who use NSS directly will notice the changes earlier.
Depends on: 1088147
Confirmed removal of the "GTE CyberTrust Global Root" in the test build.
Sites affected by root removal (using data collected from scanning Alexa Top 1 Million sites between 13th and 24th of October 2014). Total: 55 sites (22 less). 191.it@217.169.121.228 acdelcogarage.com@174.143.186.120 alice.it@217.169.121.227 bancagenerali.com@193.41.84.51 bancagenerali.it@193.41.84.51 baskinrobbins.com@164.109.96.216 bil.com@156.133.48.230 bpost.be@193.191.180.209 cadillaceurope.com@213.83.24.215 cbdonline.ae@213.42.80.12 cm.be@62.213.199.139 comune.roma.it@94.86.40.109 don.com@164.109.41.73 dsoa.ae@195.229.104.87 dunkinfranchising.com@164.109.96.216 dyson.com.au@216.255.88.233 electrabel.be@94.236.33.55 etisalat.com.eg@41.222.129.2 etisalat.eg@41.222.129.210 euromut.be@194.78.148.214 gmfleetorderguide.com@198.208.145.185 gm-korea.co.kr@198.208.106.109 hallmark.com@165.193.83.157 isuzu.co.za@41.215.239.42 mc.be@62.213.199.139 mcdonaldsarabia.com@216.255.66.200 membershiprewardsviagens.com.br@186.234.211.27 mylu.liberty.edu@208.95.48.173 oz.be@194.78.148.212 parlamento.pt@88.157.195.27 partenamut.be@194.78.148.217 planchevrolet.com.ar@198.208.145.32 portaldahabitacao.pt@194.38.148.237 sdtps.gov.ae@213.42.203.183 turismodeportugal.pt@83.240.208.254 tvlicence.ie@194.125.152.173 visitportugal.com@193.126.28.43 windgroup.it@54.229.10.164 www.agenziafarmaco.gov.it@156.54.64.29 www.agustawestland.com@193.169.150.1 www.anpostpayment.ie@194.125.152.187 www.base.gov.pt@194.65.55.203 www.chevrolet.co.kr@198.208.106.109 www.dgo.pt@213.63.137.49 www.dgs.pt@80.172.233.33 www.emfa.pt@194.140.232.200 www.gmiotraining.com@208.81.182.147 www.gov-madeira.pt@62.28.7.146 www.inci.pt@194.65.55.196 www.oz.be@137.116.217.170 www.pep.pt@83.240.239.138 www.sacredheart.edu@104.130.138.206 www.sef.pt@83.240.239.138 www.sicae.pt@91.198.182.96 www.wifiarea.it@217.169.121.230
(In reply to Hubert Kario from comment #6) > Sites affected by root removal (using data collected from scanning Alexa Top > 1 Million sites between 13th and 24th of October 2014). > > Total: 55 sites (22 less). Thanks, Hubert, for continuing to provide this data. Steven, Looks like you're making good progress. I assume all these customers have been informed of the dates for Firefox 35, and what they need to do before then. Thanks! Kathleen
Status: ASSIGNED → RESOLVED
Closed: 10 years ago
Resolution: --- → FIXED
Whiteboard: Target Firefox 35 → Changes are in NSS 3.17.3, Firefox 36
Version: 3.16.4 → 3.17.3
https://www.ssllabs.com/ssltest/analyze.html?d=liberty.edu&latest Notice this was just renewed today but still is based on the GTE CyberTrust root. Has an intermediate been created for LUPKI01 that is chained to a 2048-bit root.
Speaking of which I also found that this was also renewed recently, but alsostill is based on the GTE CyberTrust root: https://myshu.sacredheart.edu/
(In reply to Yuhong Bao from comment #8) > https://www.ssllabs.com/ssltest/analyze.html?d=liberty.edu&latest > Notice this was just renewed today but still is based on the GTE CyberTrust > root. Has an intermediate been created for LUPKI01 that is chained to a > 2048-bit root. (a) I don't understand, what is "LUPKI01" ? (b) I see something else. Maybe they have changed their configuration again. I see a cert issued on Jan 05 with this chain: Certificate chain 0 s:/1.3.6.1.4.1.311.60.2.1.3=US/1.3.6.1.4.1.311.60.2.1.2=Virginia/businessCategory=Private Organization/serialNumber=0136062-7/C=US/postalCode=24502-2269/ST=Virginia/L=Lynchburg/street=1971 University Blvd/O=LIBERTY UNIVERSITY, INC./OU=Technical Services/CN=www.liberty.edu i:/C=US/O=Symantec Corporation/OU=Symantec Trust Network/CN=Symantec Class 3 EV SSL CA - G3 1 s:/C=US/O=Symantec Corporation/OU=Symantec Trust Network/CN=Symantec Class 3 EV SSL CA - G3 i:/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2006 VeriSign, Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification Authority - G5 2 s:/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2006 VeriSign, Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification Authority - G5 i:/C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority (and I get a domain mismatch, because the cert isn't valid for liberty.edu, but only valid for www.liberty.edu) (In reply to Yuhong Bao from comment #9) > Speaking of which I also found that this was also renewed recently, but > alsostill is based on the GTE CyberTrust root: > https://myshu.sacredheart.edu/ Please distinguish between the CA and the separate entity that controls the intermediate CA. The intermediate CA, which is controlled by the university, has issued the server certificate.
LUPKI01 is the intermediate certificate, and yes notice this happened after the date of my original comment.
(In reply to Hubert Kario from comment #6) > Sites affected by root removal (using data collected from scanning Alexa Top > 1 Million sites between 13th and 24th of October 2014). > > Total: 55 sites (22 less). > Hi Hubert, Would you please provide new data again? As you know, the "GTE CyberTrust Global Root" is removed in Firefox 36, which is schedule to release on Feb 23. https://wiki.mozilla.org/RapidRelease/Calendar Thanks, Kathleen
Sure. I plan to start new scan on this Friday (16/01/2015) so I should have the data around 30th of January.
Excellent! Thanks!
(In reply to Yuhong Bao from comment #11) > LUPKI01 is the intermediate certificate, and yes notice this happened after > the date of my original comment. A reminder that they also will have to replace the certificate used on mylu.liberty.edu too.
(In reply to Hubert Kario from comment #16) > Sites affected by root removal (using data collected from scanning Alexa Top > 1 Million sites between 17th and 30th of January 2015). > > Total: 47 sites (8 less). Thanks Hubert! All, If any of you have contacts for the above websites, please point them to: https://blog.mozilla.org/security/2015/01/28/phase-2-phasing-out-certificates-with-1024-bit-rsa-keys/
FYI, of the ECCE ones, emfa.pt and visitportugal.com already have been fixed to use Baltimore.
We remain actively involved in helping customers who will be affected by the February 23rd release. In many cases, several of these certificates represent single customers in the process of moving larger certificate populations than those shown.
Depends on: 1120977
You need to log in before you can comment on or make changes to this bug.