[SSL Observatory] certificates for .local names [was: Re: DFN and subordinate CA domain-scoped whitelists]

Daniel Kahn Gillmor dkg at fifthhorseman.net
Wed Nov 9 08:40:12 PST 2011


On Wed, 09 Nov 2011 12:28:57 +0100, Matthias Hunstock <matthias.hunstock at tu-ilmenau.de> wrote:
> It's very simple. The domain whitelist was introduced some time ago
> (about 1.5 years ago I think), the "bad" certs you have in your data
> should be older than that.

I just looked into this deeper.

I should note that the dataset i'm using was gathered by the EFF nearly
1 year ago (2010-12 if you believe the date on the tin).

The most recent .local certificate issued by a subsidiary of DFN was on
2010-04-08, so it looks like you're right that something changed in
their policy round 2010-04.

However, all but one of these were 5-year certs.  And all of them appear
to be still valid.  So their change in policy doesn't protect relying
parties against certs that they have already issued.  And the certs
gathered by the observatory are clearly not an exhaustive list.

Here's the .local domains issued by a subordinate of DFN along with
their start and end dates:

------------
mysql> SELECT name, children.startdate, children.enddate, children.certid FROM names  JOIN valid_certs AS children      ON names.certid=children.certid  JOIN valid_certs AS parents      ON children.`X509v3 extensions:X509v3 Authority Key Identifier:keyid`=parents.`X509v3 extensions:X509v3 Subject Key Identifier`  WHERE LOCATE("dfn-verein",parents.issuer) AND name LIKE '%.local' ORDER BY startdate; 
+-----------------------------------+---------------------+---------------------+---------+
| name                              | startdate           | enddate             | certid  |
+-----------------------------------+---------------------+---------------------+---------+
| app1.cip.physik.local             | 2009-01-20 13:09:09 | 2014-01-19 13:09:09 |  292782 |
| mercury.mpifg.local               | 2009-04-28 14:41:08 | 2014-04-27 14:41:08 |  657314 |
| exchange.hds.local                | 2009-06-16 09:26:07 | 2014-06-15 09:26:07 |  813391 |
| sharepoint.mpifg.local            | 2009-06-17 12:22:08 | 2014-06-16 12:22:08 |  659281 |
| webconf02.rki.local               | 2009-09-17 11:28:07 | 2014-09-16 11:28:07 |  710468 |
| webconf01.rki.local               | 2009-09-18 07:34:13 | 2014-09-17 07:34:13 |  707557 |
| leibniz.local                     | 2009-11-24 16:37:09 | 2014-11-23 16:37:09 | 3653370 |
| de-be-lbz-exca1.leibniz.local     | 2009-11-24 16:37:09 | 2014-11-23 16:37:09 | 3653370 |
| de-be-lbz-dcex1.leibniz.local     | 2009-11-24 16:37:09 | 2014-11-23 16:37:09 | 3653370 |
| autodiscover.leibniz.local        | 2009-11-24 16:37:09 | 2014-11-23 16:37:09 | 3653370 |
| webmail.rki.local                 | 2010-01-06 13:40:09 | 2015-01-05 13:40:09 |  671657 |
| mx1.zbi.local                     | 2010-02-02 14:16:09 | 2013-02-01 14:16:09 |  299472 |
| wettbewerb.leibniz.local          | 2010-02-17 13:47:07 | 2015-02-16 13:47:07 | 3500635 |
| wettbewerb-training.leibniz.local | 2010-02-17 13:47:07 | 2015-02-16 13:47:07 | 3500635 |
| wettbewerb-test.leibniz.local     | 2010-02-17 13:47:07 | 2015-02-16 13:47:07 | 3500635 |
| ars.rki.local                     | 2010-03-11 13:56:09 | 2015-03-10 13:56:09 |  688346 |
| hfk-cas2.hfk-bremen.local         | 2010-03-23 15:49:07 | 2015-03-22 15:49:07 |  680864 |
| hfk-cas1.hfk-bremen.local         | 2010-03-23 15:49:07 | 2015-03-22 15:49:07 |  680864 |
| nffex01.nff.local                 | 2010-04-06 12:54:07 | 2015-04-05 12:54:07 |  302968 |
| firewall.erpbilab.local           | 2010-04-08 10:47:08 | 2015-04-07 10:47:08 |  340764 |
+-----------------------------------+---------------------+---------------------+---------+
20 rows in set (1 min 23.76 sec)

mysql> 
------------

rather than pick on DFN itself, i note that the EFF found over 11K
certificates still valid today that have some .local name in them,
coming from 52 CAs:

------------
mysql> SELECT COUNT(distinct certid) FROM names  JOIN valid_certs USING (certid) WHERE name LIKE '%.local' AND enddate > now();        
+------------------------+
| COUNT(distinct certid) |
+------------------------+
|                  11499 |
+------------------------+
1 row in set (4.24 sec)

mysql> SELECT COUNT(distinct issuer) FROM names  JOIN valid_certs USING (certid) WHERE name LIKE '%.local' AND enddate > now() ORDER BY startdate; 
+------------------------+
| COUNT(distinct issuer) |
+------------------------+
|                     52 |
+------------------------+
1 row in set (4.23 sec)

mysql> 
------------

here are the guilty parties, ordered by the most recent startdate of an
issued .local certificate:

SELECT max(startdate) AS mostrecent, issuer FROM
  names JOIN valid_certs USING (certid) 
WHERE name LIKE '%.local' AND enddate > now()
GROUP BY issuer
ORDER BY mostrecent;




2008-12-12 00:00:00      C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global CA
2009-01-20 13:09:09      C=DE, ST=Niedersachsen, L=Goettingen, O=Georg-August-Universitaet Goettingen, CN=Universitaet-Goettingen CA/emailAddress=gwdg-ca at gwdg.de
2009-02-26 00:00:00      C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global CA (2048)
2009-03-31 00:24:00      DC=local, DC=experian, CN=Configuration, CN=Services, CN=Public Key Services, CN=AIA, CN=Experian PrdSubCA1
2009-04-02 19:13:03      C=US, O=Entrust.net, OU=www.entrust.net/CPS incorp. by ref. (limits liab.), OU=(c) 1999 Entrust.net Limited, CN=Entrust.net Secure Server Certification Authority
2009-06-16 09:26:07      C=DE, ST=Hessen, L=Wiesbaden, O=Fachhochschule Wiesbaden, OU=IT-Center, CN=FHW-CA/emailAddress=fhw-ca at itc.fh-wiesbaden.de
2009-06-17 12:22:08      C=DE, O=Max-Planck-Institut fuer Gesellschaftsforschung, OU=MPIfG, CN=MPIfG-CA/emailAddress=ca at mpifg.de
2009-12-07 00:00:00      C=GB, ST=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=AAA Certificate Services
2009-12-07 22:38:26      C=US, O=Entrust, Inc., OU=AND ADDITIONAL TERMS GOVERNING USE AND RELIANCE, OU=CPS CONTAINS IMPORTANT LIMITATIONS OF WARRANTIES AND LIABILITY, OU=www.entrust.net/CPS is incorporated by reference, OU=(c) 2008 Entrust, Inc., CN=Entrust Certification Authority - L1B
2010-01-26 00:00:00      C=US, O=Trusted Secure Certificate Authority, CN=Trusted Secure Certificate Authority
2010-02-02 14:16:09      C=DE, ST=Saarland, L=Saarbruecken, O=Universitaet des Saarlandes, CN=CA Universitaet des Saarlandes/emailAddress=ca at rz.uni-saarland.de
2010-02-05 00:00:00      C=ZA, O=Thawte Consulting (Pty) Ltd., CN=Thawte SGC CA
2010-02-12 00:00:00      C=AT, L=Wien, O=e-commerce monitoring GmbH, CN=A-CERT SERVERCERT Class 3/emailAddress=info at globaltrust.eu
2010-02-17 13:47:07      C=DE, O=DFN-Verein, OU=DFN-PKI, CN=DFN-Verein CA Services
2010-02-19 11:33:15      C=FI, O=Sonera, CN=Sonera Class2 CA
2010-03-11 13:56:09      C=DE, O=Robert Koch-Institut, OU=RKI-PCA, CN=RKI Certification Authority/emailAddress=certify at rki.de
2010-03-23 15:49:07      C=DE, ST=Bremen, L=Bremen, O=Hochschule fuer Kuenste Bremen, CN=HFK-BREMEN-CA/emailAddress=hotline at hfk-bremen.de
2010-04-06 12:54:07      C=DE, ST=Niedersachsen, L=Braunschweig, O=Technische Universitaet Braunschweig, CN=Technische Universitaet Braunschweig CA/emailAddress=pki at tu-bs.de
2010-04-08 10:47:08      C=DE, L=Stuttgart, O=Universitaet Stuttgart, CN=Universitaet Stuttgart CA - G01/emailAddress=ca-g01 at uni-stuttgart.de
2010-04-14 13:44:39      C=ES, ST=MADRID, L=MADRID, O=ips Certification Authority, OU=Certificaciones, CN=ipsCA Level 1 CA/emailAddress=ipscalevel1 at ipsca.com
2010-04-16 00:44:16      DC=edu, DC=gemini, C=US, OU=Information Systems Group, O=AURA - Gemini Observatory, CN=GEMINI-CA
2010-04-22 00:00:00      C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO High Assurance Secure Server CA
2010-06-04 00:00:00      C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Premium Server CA/emailAddress=premium-server at thawte.com
2010-08-03 15:27:58      C=CH, O=SwissSign AG, CN=SwissSign Server Gold CA 2008 - G2
2010-08-26 00:00:00      C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO High-Assurance Secure Server CA
2010-09-13 08:43:53      C=GB, O=Coventry City Council, OU=CCC Standard Issuing Authority
2010-09-14 12:10:17      C=AT, O=A-Trust Ges. f. Sicherheitssysteme im elektr. Datenverkehr GmbH, OU=a-sign-SSL-03, CN=a-sign-SSL-03
2010-09-17 00:00:00      O=VeriSign Trust Network, OU=VeriSign, Inc., OU=VeriSign International Server CA - Class 3, OU=www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign
2010-09-28 00:00:00      C=US, O=Thawte, Inc., OU=Domain Validated SSL, CN=Thawte DV SSL CA
2010-09-30 00:00:00      C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=Terms of use at https://www.verisign.com/rpa (c)05, CN=VeriSign Class 3 Secure Server CA
2010-10-04 00:00:00      C=NL, O=TERENA, CN=TERENA SSL CA
2010-10-08 00:00:00      C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=Terms of use at https://www.verisign.com/rpa (c)09, CN=VeriSign Class 3 Secure Server CA - G2
2010-11-10 10:26:29      C=IT, O=I.T. Telecom, OU=Servizi di certificazione, CN=I.T. Telecom Global CA
2010-11-19 15:33:46      C=DE, O=TC TrustCenter GmbH, OU=TC TrustCenter Class 2 L1 CA, CN=TC TrustCenter Class 2 L1 CA XI
2010-12-01 00:00:00      C=GB, ST=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=PositiveSSL CA
2010-12-05 18:11:52      C=US, O=Equifax, OU=Equifax Secure Certificate Authority
2010-12-13 00:00:00      C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=Terms of use at https://www.verisign.com/rpa (c)10, CN=VeriSign Class 3 Secure Server CA - T1
2010-12-13 07:38:20      C=US, O=GeoTrust Inc., OU=Domain Validated SSL, CN=GeoTrust DV SSL CA
2010-12-14 00:00:00      C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network, OU=http://www.usertrust.com, CN=UTN-USERFirst-Hardware
2010-12-14 00:00:00      C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=Terms of use at https://www.verisign.com/rpa (c)10, CN=VeriSign Class 3 Secure Server CA - G3
2010-12-15 23:55:25      C=US, O=GeoTrust, Inc., CN=GeoTrust SSL CA
2010-12-16 21:39:09      C=US, O=Entrust, Inc., OU=www.entrust.net/rpa is incorporated by reference, OU=(c) 2009 Entrust, Inc., CN=Entrust Certification Authority - L1C
2010-12-17 00:00:00      C=US, O=Register.com, CN=Register.com CA SSL Services (OV)
2010-12-17 00:00:00      C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=Terms of use at https://www.verisign.com/rpa (c)10, CN=VeriSign Class 3 International Server CA - G3
2010-12-17 00:00:00      C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert High Assurance CA-3
2010-12-17 00:00:00      C=US, O=Thawte, Inc., CN=Thawte SSL CA
2010-12-17 00:00:00      C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network, CN=USERTrust Legacy Secure Server CA
2010-12-17 14:39:10      C=BM, O=QuoVadis Limited, OU=www.quovadisglobal.com, CN=QuoVadis Global SSL ICA
2010-12-17 15:53:59      C=US, ST=Arizona, L=Scottsdale, O=Starfield Technologies, Inc., OU=http://certificates.starfieldtech.com/repository, CN=Starfield Secure Certification Authority/serialNumber=10688435
2010-12-17 16:05:08      OU=Organization Validation CA, O=GlobalSign, CN=GlobalSign Organization Validation CA
2010-12-17 20:05:39      C=BE, OU=Domain Validation CA, O=GlobalSign nv-sa, CN=GlobalSign Domain Validation CA
2010-12-18 20:12:12      C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., OU=http://certificates.godaddy.com/repository, CN=Go Daddy Secure Certification Authority/serialNumber=07969287


I note that of the CAs who issued .local certs in the last month before
the dataset was gathered, we have:

 * thawte
 * verisign
 * comodo
 * godaddy
 * register.com
 * starfield
 * geotrust
 * globalsign
 * usertrust
 * digicert

It's a who's who of major CAs directly issuing these things, not
subordinate CAs.

Am i wrong in thinking that this makes the "please recount the number of
CAs" concern seem like a distraction from deeper issues?

Is there some reason that a legit CA should be certifying names in the
.local zone at all?

       --dkg
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 965 bytes
Desc: not available
URL: <http://lists.eff.org/pipermail/observatory/attachments/20111109/d0a814ed/attachment.sig>


More information about the Observatory mailing list