Paul Hoffman:
> http://news.netcraft.com/archives/2008/06/12/ssl_certificates_vulnerable_to_openssl_flaw_on_debian.html
>
>
> The last paragraph says:
>
> =====
> Although a number of certificate authorities have offered free
> replacement certificates to customers affected by the Debian OpenSSL
> vulnerability, it has been reported that they have not been getting a
> big response. Comodo is offering a free replacement SSL certificate to
> any affected business, regardless of their original provider, while
> VeriSign is offering free reissuance for both SSL certificates and code
> signing certificates. GeoTrust and Thawte also offer free SSL
> certificate reissuance, and RapidSSL certificates can be renewed for
> free at GeoTrust's website.
> =====
>
> No mention of any CA actively contacting affected customers, much less
> revoking any certs.


StartCom has scanned and detected all vulnerable keys and informed the 
affected subscribers. We'll revoke all compromised keys within a short time.

We also updated our FAQ page https://www.startssl.com/?app=25#74 and 
will scan future submissions of CSRs for potential vulnerabilities and 
provide a tool to detect them beforehand at the StartSSL Control Panel.

Even though we represent only a small share of the overall potentially 
affected certificates, the nagging of you all of you was not fruitless 
after all :-)


-- 
Regards

Signer: Eddy Nigg, StartCom Ltd.
Jabber: [EMAIL PROTECTED]
Blog:   https://blog.startcom.org
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to