Hey Daniel,

Thanks for the heads-up.  This is a useful thing to keep in mind as we work
through the SHA-1 deprecation.

To be honest, this seems like a net positive to me, since it gives users a
clear incentive to uninstall this sort of software.

--Richard

On Mon, Jan 4, 2016 at 3:19 AM, Daniel Holbert <dholb...@mozilla.com> wrote:

> Heads-up, from a user-complaint/ support / "keep an eye out for this"
> perspective:
>  * Starting January 1st 2016 (a few days ago), Firefox rejects
> recently-issued SSL certs that use the (obsolete) SHA1 hash algorithm.[1]
>
>  * For users who unknowingly have a local SSL proxy on their machine
> from spyware/adware/antivirus (stuff like superfish), this may cause
> *all* HTTPS pages to fail in Firefox, if their spyware uses SHA1 in its
> autogenerated certificates.  (Every cert that gets sent to Firefox will
> use SHA1 and will have an issued date of "just now", which is after
> January 1 2016; hence, the cert is untrusted, even if the spyware put
> its root in our root store.)
>
>  * I'm not sure what action we should (or can) take about this, but for
> now we should be on the lookout for this, and perhaps consider writing a
> support article about it if we haven't already. (Not sure there's much
> help we can offer, since removing spyware correctly/completely can be
> tricky and varies on a case by case basis.)
>
> (Context: I received a family-friend-Firefox-support phone call today,
> who this had this exact problem.  Every HTTPS site was broken for her in
> Firefox, since January 1st.  IE worked as expected (that is, it happily
> accepts the spyware's SHA1 certs, for now at least).  I wasn't able to
> remotely figure out what the piece of spyware was or how to remove it --
> but the rejected certs reported their issuer as being "Digital Marketing
> Research App" (instead of e.g. Digicert or Verisign).  Googling didn't
> turn up anything useful, unfortunately; so I suspect this is "niche"
> spyware, or perhaps the name is dynamically generated.)
>
> Anyway -- I have a feeling this will be somewhat-widespread problem,
> among users who have spyware (and perhaps crufty "secure browsing"
> antivirus tools) installed.
>
> ~Daniel
>
> [1]
>
> https://blog.mozilla.org/security/2014/09/23/phasing-out-certificates-with-sha-1-based-signature-algorithms/
> _______________________________________________
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform
>
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to