[Dev] wiki.tizen.org https certificate revoked (was Re: Cynara + DBUS)

Clark, Joel joel.clark at intel.com
Wed Apr 30 22:39:34 GMT 2014

When will this be fixed so that wiki.tizen.org has a good certificate?  Wiki.tizen.org is critical to our project.


From: Dev [mailto:dev-bounces at lists.tizen.org] On Behalf Of Pierce, Dean
Sent: Wednesday, April 30, 2014 3:31 PM
To: Rafał Krypa
Cc: application-dev at lists.tizen.org
Subject: Re: [Dev] wiki.tizen.org https certificate revoked (was Re: Cynara + DBUS)

To clear up some mystery here.  We are definitely revoking and re-rolling all of our keys as a safety measure due to the recent heartbleed bug.  We had everything patched within hours of when the fixes were available, but we, like the rest of the world are in the process of reissuing, replacing, and revoking everything, but I'm surprised that we would have revoked a cert before we replaced it.  It's a long and manual process, and I'm sure StartSSL is being overwhelmed with revocation requests.

The reason that Chrome etc still works is because they scrapped their CRL/OCSP code recently, and moved to a static, and regularly updated list of revoked certificates.  I'm betting that if we don't put in a new cert soon, Chrome will get the revocation in its next update, and it will stop working there too.


  - DEAN

On Wed, Apr 30, 2014 at 10:39 AM, Rafał Krypa <r.krypa at samsung.com<mailto:r.krypa at samsung.com>> wrote:
On 2014-04-30 19:08, Rafał Krypa wrote:
> On 2014-04-30 17:11, Schaufler, Casey wrote:
>> Hmm. I see the same thing from outside the Intel firewall, while access from inside Intel works just fine. No, it's not just you.
> Are you using the same browsers inside and outside the firewall? I can see the revocation message in Firefox and MSIE, but Chromium doesn't report it.
> Either way the certificate seems to be revoked by issuer, StartSSL.
I found a dumb way to work around this problem. Mapping crl.startssl.com<http://crl.startssl.com> and ocsp.startssl.com<http://ocsp.startssl.com> to in /etc/hosts works for me.

> I have checked it with openssl command line, using both CRL and OCSP:
> ### Get the wiki.tizen.org<http://wiki.tizen.org> server certificate
> $ openssl s_client -connect wiki.tizen.org:443<http://wiki.tizen.org:443> -showcerts  </dev/null 2>/dev/null | grep -m1 BEGIN -A100 | openssl x509 -text >server.pem
By the way, it seems odd that s_client doesn't inform that server certificate is revoked. I tried passing "-crl_check -crl_check_all" options, but it didn't cause any certificate error.
Dev mailing list
Dev at lists.tizen.org<mailto:Dev at lists.tizen.org>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.tizen.org/pipermail/dev/attachments/20140430/139afcb4/attachment.html>

More information about the Dev mailing list