Starting in January, any website using a new certificate from Qihoo 360-owned certificate authority WoSign will have troubles reaching Firefox users.
Firefox-maker Mozilla announced on Tuesday it will ban newly-issued digital certificates from WoSign and StartCom, an Israel-based certificate authority that the Chinese firm recently acquired.
The move follows a damning report published by Mozilla last month accusing WoSign of backdating certificates to circumvent an industry-wide effort to phase out HTTPS certificates signed with the outdated SHA-1 algorithm.
CAs, such as WoSign, were not supposed to issue SHA-1 signed certificates after January 1. WoSign backdated a number of certificates to appear as if they were issued in December, 2015.
Mozilla last month proposed a one-year ban on newly-issued WoSign certificates but hadn't set a date for its introduction. The new commitment to follow through with the ban comes despite last-ditch efforts by Qihoo 360 to avert it.
Mozilla has now opted to distrust WoSign and StartCom certificates generated after October 21. The action takes effect in Firefox 51, which is due on January 24, 2017.
Mozilla's other gripe with WoSign was the certificate authority's persistent denial of its ownership of StartCom.
"The levels of deception demonstrated by representatives of the combined company have led to Mozilla's decision to distrust future certificates chaining up to the currently-included WoSign and StartCom root certificates," Mozilla's security team wrote.
On realizing the severity of Mozilla's threat, Qihoo 360 offered to fire WoSign's CEO Richard Wang, and appoint Qihoo 360 chief security officer Xiaosheng Tan as chairman of StartCom.
WoSign vowed to use the Google-backed system of Certificate Transparency (CT) to log existing and new certificates. Google's CT logs offer an independent source to audit CAs and keep check on them in the event that one goes rogue or is hacked, such as occurred to Dutch CA DigiNotar in 2011.
More recently Google demanded that all Symantec certificates issued after June 1 support CT after it was caught out issuing bogus certificates for Google domains.
WoSign for its part said it had voluntarily posted all SSL (HTTPS) certificates to Google's CT log server on July 5, 2016.
The company would probably have had to do that anyway in coming months with Google this week announcing a major expansion of its CT program.
Google now expects all publicly-trusted website certificates issued after September 2017 to comply with Chrome's CT policy for them to be trusted by Chrome.
"The use of Certificate Transparency has profoundly altered how browsers, site owners, and relying parties are able to detect and respond to misissuance, and importantly, gives new tools to mitigate the damage caused when a CA no longer complies with community expectations and browser programs," said Ryan Sleevi, a Google software engineer.
READ MORE ON FIREFOX AND BROWSERS
- Mozilla to China's WoSign: We'll kill Firefox trust in you after mis-issued GitHub certs
- Vivaldi's email client, sync: How its browser team is working on key new features
- Microsoft expands Windows Insider Preview Edge browser bug bounty program
- Google Safe Browsing beats rivals but still only flags up 10 percent of hacked sites
- Windows 10 Edge: Now Microsoft puts $15k bounty on remote attack browser bugs
- Google tagged a website as unsafe? Now you get more details on the problem
- TechRepublic: Firefox gains serious speed and reliability and loses some bloat
- CNET: Mozilla will give half of Firefox users a snappier browser