Add new KISA Root certificate(KISA RootCA 4) to Trusted Root Store
Categories
(CA Program :: CA Certificate Root Program, task)
Tracking
(Not tracked)
People
(Reporter: jjw, Assigned: kathleen.a.wilson)
Details
(Whiteboard: [ca-verifying] - Need BR Self Assessment)
| Assignee | ||
Comment 1•9 years ago
|
||
| Assignee | ||
Updated•9 years ago
|
| Reporter | ||
Comment 2•9 years ago
|
||
| Assignee | ||
Comment 3•9 years ago
|
||
| Reporter | ||
Comment 4•9 years ago
|
||
| Assignee | ||
Updated•9 years ago
|
Updated•8 years ago
|
Comment 5•8 years ago
|
||
| Assignee | ||
Comment 6•8 years ago
|
||
| Assignee | ||
Comment 7•8 years ago
|
||
Comment 8•7 years ago
|
||
There's a concern about KISA itself:
KISA is a public institution and is controlled by the Korean government.
The problem here is that the South Korean government is actively pursuing censorship and concerns that they can legally attempt an MITM attack.
In accordance with Article 44.7.3. of the Act on Promotion of Information and Communication Network Utilization and Information Protection in Korea, the South Korean government may order Internet service providers to block 'hazardous sites'.
Recently, under the leadership of the South Korean government, Internet service providers operate a system to drop packets through the HTTPS protocol through SNI eavesdropping.
I am seriously concerned about the more serious censorship structure that could be formed when this Root CA is registered and I ask KISA to confirm that it will never cooperate with the South Korean government's attempt to attack MITM.
Updated•6 years ago
|
Comment 9•5 years ago
|
||
I intend to close this inclusion request bug on or about 1-September-2020 because it does not appear to be actively pursued.
Updated•5 years ago
|
Updated•3 years ago
|
Description
•