[security] SL comprimise
Phillip Hallam-Baker
hallam at gmail.com
Thu Mar 24 17:06:57 UTC 2011
No login servers were affected.
Several domains on which the servers are deployed were affected but not the
login servers.
On Thu, Mar 24, 2011 at 12:48 PM, Mike Hanson <mhanson at mozilla.com> wrote:
> Comodo has posted a detail incident report here:
> http://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html
>
> Several login servers were affected.
>
> -MH
>
>
> On Mar 24, 2011, at 7:09 AM, John Bradley wrote:
>
> >
> >
> >
> http://threatpost.com/en_us/blogs/phony-ssl-certificates-issued-google-yahoo-skype-others-032311?utm_source=Threatpost&utm_medium=Tabs&utm_campaign=Today%27s+Most+Popular
> >
> > The browser venders blocking those certificates is nice, however there
> are attacks on RP that could be done with those certificates that are still
> open.
> >
> > In testing something like 0% of RP check OCSP or CRL, the libs don't
> force openSSL to so those checks (I think DNOA will do them in FICAM mode)
> >
> > So perhaps encouraging people to perform those checks would be a good
> idea.
> >
> > We can only hope that none of the 9 certificates cover openID OP,
> otherwise user accounts at RP could theoretically be compromised.
> >
> > John B.
> >
> >
> > _______________________________________________
> > security mailing list
> > security at lists.openid.net
> > http://lists.openid.net/mailman/listinfo/openid-security
>
> _______________________________________________
> security mailing list
> security at lists.openid.net
> http://lists.openid.net/mailman/listinfo/openid-security
>
--
Website: http://hallambaker.com/
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-security/attachments/20110324/c65b5816/attachment.html>
More information about the security
mailing list