On Sat, Mar 21, 2020 at 07:20:27PM +0000, Nick Lamb wrote: > On Sat, 21 Mar 2020 13:40:21 +1100 > Matt Palmer via dev-security-policy > <[email protected]> wrote: > > There's also this one, which is another reuse-after-revocation, but > > the prior history of this key suggests that there's something *far* > > more interesting going on, given the variety of CAs and domain names > > it has been used for (and its current residence, on a Taiwanese > > traffic stats server): > > > > > > https://crt.sh/?spkisha256=69fc5edbd904577629121b09c49b711e201c46213e5b175bbee08a4d1d30b3c7 > > > > If anyone figures out the story with that last key, I'd be most > > pleased to hear about it. > > Sure.
[snip story] Ha ha! Nice detective work. It was the old wildcard for `*.new-access.net` that threw me for a loop, but I suppose if someone's going to reuse a key, why not reuse one for a wildcard? Thanks, I can now sleep a little bit sounder now that I know there isn't another Debian-style weak PRNG out there. - Matt _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

