Closed Bug 1054719 Opened 11 years ago Closed 10 years ago

update.microsoft.com/microsoftupdate - This Connection is Untrusted

Categories

(Web Compatibility :: Site Reports, defect)

x86_64
Windows 7
defect
Not set
normal

Tracking

(Not tracked)

RESOLVED WONTFIX

People

(Reporter: alice0775, Assigned: karlcow)

References

()

Details

(Whiteboard: [country-us] [ssl] [sitewait])

https://update.microsoft.com/microsoftupdate/ uses a certificate signed by "Microsoft Update Secure Server CA 1", which doesn't chain up to anything we trust. As in the connection is in fact untrusted! Same thing Chrome and Safari (at least on Mac).
Assignee: nobody → english-us
Component: Security → English US
Product: Core → Tech Evangelism
Contacted our Web compat counterpart at Microsoft about it by email.
Assignee: english-us → nobody
Status: NEW → ASSIGNED
Component: English US → Desktop
Summary: https://update.microsoft.com/microsoftupdate/ - This Connection is Untrusted → update.microsoft.com/microsoftupdate - This Connection is Untrusted
Whiteboard: [country-us] [ssl] [contactready] [sitewait]
See Also: → 1052155
Whiteboard: [country-us] [ssl] [contactready] [sitewait] → [country-us] [ssl] [sitewait]
It seems there is a similar issue on Bug 1052155.
Assignee: nobody → kdubost
Thank you for letting us know about this. We looked into this. The Microsoft Update site is a legacy site which supports Internet Explorer and does not support other browsers or non-Windows operating systems. If you would like to opt-in to receive updates from Microsoft Update, please visit the site using Internet Explorer.
It would be nice to have these certificate included. It's causing a snowball effect among the Linux distros that uses the Mozilla CA-certificates. It will cause Squid (http and https proxy caching server) and other https/http proxy servers running on Linux.
If the Microsoft root certificates were included Linux machines running squid (proxy caching server) would have no problems providing Microsoft Updates to Windows machines that go through the proxy server. Here is a referenced bug with Ubuntu: https://bugs.launchpad.net/ubuntu/+source/ca-certificates/+bug/1359695 Ubuntu bug tells us to go to Mozilla to fix the issue. Please fix issue. System admins want to save bandwidth and network congestions.
This bug isn't about us including a new cert root. It's about Microsoft using a recognized cert root. If people want us to actually add a new cert root, that presumably needs a new bug, and typically requires the source of the root to actually do some work. Which Microsoft may well not be willing to do, note. See https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/
Flags: needinfo?(kwilson)
What info do you need from me? Microsoft already responded in Comment #4 Based on that response, I don't think they are planning to go through Mozilla's root inclusion process. Also, it would be easier/faster for them to get cross-signed by an already-included root -- this wouldn't involved me or Mozilla at all.
Flags: needinfo?(kwilson)
Kathleen, the only question for you is whether my summary of the situation in comment 8 is correct. Sounds like it is, in the sense that we have no plans to add a random root that doesn't make any promises about its behavior, right?
(In reply to Boris Zbarsky [:bz] from comment #10) > Kathleen, the only question for you is whether my summary of the situation > in comment 8 is correct. Sounds like it is, in the sense that we have no > plans to add a random root that doesn't make any promises about its > behavior, right? Correct.
This doesn't seem to be a Tech Evangelism issue anymore. I will close it as WONTFIX, or move it to an appropriate Product/Component.
Status: ASSIGNED → RESOLVED
Closed: 10 years ago
Resolution: --- → WONTFIX
Product: Tech Evangelism → Web Compatibility
You need to log in before you can comment on or make changes to this bug.