Lucian Constantin
CSO Senior Writer

After Mozilla inquiry, Apple untrusts Chinese certificate authority

news
Oct 4, 20163 mins

After an upcoming update MacOS and iOS will not trust new certificates issued by WoSign

apple campus headquarters
Credit: Mario Sánchez Prada

Following a Mozilla-led investigation that found multiple problems in the SSL certificate issuance process of WoSign, a China-based certificate authority, Apple will make modifications to the iOS and macOS to block future certificates issued by the company.

Although there is no WoSign root certificate in Apple’s trusted certificate store, a WoSign intermediate CA certificate is cross-signed by two other CAs that Apple trusts: StartCom and Comodo. This means that until now Apple products have automatically trusted certificates issued through the WoSign intermediate CA.

Because WoSign experienced multiple control failures in their certificate issuance processes for the WoSign CA Free SSL Certificate G2 intermediate CA, “we are taking action to protect users in an upcoming security update,” Apple said in support notes for both iOS and macOS. “Apple products will no longer trust the WoSign CA Free SSL Certificate G2 intermediate CA.”

The ban is only for future certificates issued by WoSign and not for those that have already been issued and published to public Certificate Transparency (CT) log servers by Sept. 19. Those existing certificates will continue to be trusted until they expire, are revoked, or Apple decides to ban them at a later date.

This is similar to the decision that Mozilla’s CA team is considering after discovering multiple problems at WoSign, including mis-issuing of certificates and a strong suspicion, backed by evidence, that the CA issued SHA-1-signed certificates after Jan. 1 and then back-dated them in violation of industry rules.

“Mozilla’s CA team has lost confidence in the ability of WoSign/StartCom to faithfully and competently discharge the functions of a CA,” the Mozilla team said in a detailed analysis of the incidents. “Therefore we propose that, starting on a date to be determined in the near future, Mozilla products will no longer trust newly-issued certificates issued by either of these two CA brands.”

The inclusion of StartCom, an Israel-based CA, in this decision is due to the fact that WoSign silently acquired StartCom in November 2015. Although WoSign said in September that the two companies are operated and managed independently, there is evidence that StartCom has been using WoSign’s certificate-issuing infrastructure and processes.

In its own analysis and response, WoSign claims that only 8 SHA-1 certificates have been incorrectly issued after the SHA-1 cutoff date of Jan. 1, 2016, and that those incidents were the result of a bug in its system and API.

“WoSign remains committed to continually evolve our technology, processes, and offerings to help keep our customers and the Internet safe,” said in its final report after the investigation. “We believe that the steps we have taken will ensure that this type of incident never happens again, and we believe that full support for CT is our commitment of supervision.”

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author