As it stands, the HTTPs "encrypted web" is built on trust. We use browsers that trust that Certificate Authorities secure their infrastructure and deliver TLS certificates (1) after validating and verifying the request correctly.
It's all about trust. Browsers trust those CA root certificates and in turn, they accept the certificates that the CA issues.
Update: it's less bad than it sounds, see comments below.
(1) Let's all agree to never call it SSL certificates ever again.
Revoking trust
Once in a while, Certificate Authorities misbehave. They might have bugs in their validation procedures that have lead to TLS certificates being issued where the requester had no access to. It's happened for Github.com, Gmail, ... you can probably guess the likely targets.
When that happens, an investigation is performed -- in the open -- to ensure the CA has taken adequate measures to prevent it from happening again. But sometimes, those CA's don't cooperate. As is the case with StartCom (StartSSL) and WoSign, which in the next Chrome update will start to show as invalid certificates.
Google has determined that two CAs, WoSign and StartCom, have not maintained the high standards expected of CAs and will no longer be trusted by Google Chrome, in accordance with our Root Certificate Policy.
This view is similar to the recent announcements by the root certificate programs of both Apple and Mozilla.
So Apple (Safari), Mozilla (Firefox) and Google (Chrome) are about to stop trusting the StartCom & WoSign TLS certificates.
From that point forward, those sites will look like this.

With Mozilla, Chrome & Safari, that's 80% of the browser market share blocking those Certificate Authorities.
Staged removal of CA trust
Chrome is handling the update sensibly, it'll start distrusting the most recent certificates first, and gradually block the entire CA.
Beginning with Chrome 56, certificates issued by WoSign and StartCom after October 21, 2016 00:00:00 UTC will not be trusted. [..]
In subsequent Chrome releases, these exceptions will be reduced and ultimately removed, culminating in the full distrust of these CAs.
If you purchased a TLS certificate from either of those 2 CAs in the last 2 months, it won't work in Chrome, Firefox or Safari.
Customer Transparency
Those 3 browsers have essentially just bankrupted those 2 CA's. Surely, if your certificates are not going to be accepted by 80% of the browsers, you're out of business -- right?
Those companies don't see it that way, apparently, as they still sell new certificates online.

This is pure fraud: they're willingly selling certificates that are known to stop working in all major browsers.
Things like that piss me of, because only a handful of IT experts know that those Certificate Authorities are essentially worthless. But they're still willing to accept money from unsuspecting individuals wishing to secure their sites.
I guess they proved once again why they should be distrusted in the first place.
Guilt by Association
Part of the irony is that StartCom, which runs StartSSL, didn't actually do anything wrong. But a few years ago, they were bought by WoSign. In that process, StartCom replaced its own process and staff with those of WoSign, essentially copying the bad practices that WoSign had.
If StartCom hadn't been bought by WoSign, they'd still be in business.
I'm looking forward to the days when we have an easy-to-use, secure, decentralized alternative to Certificate Authorities.
Comments
akafusi Tuesday, January 17, 2017 at 14:10 -
” I guess they proved once again why they should be distrusted in the first place. ” It’s funny, they are very artful.
Alan Tuesday, January 17, 2017 at 14:13 -
WoSign: updated report and discussion
trumbaut Wednesday, January 18, 2017 at 12:55 -
I agree StartCom’s communication is not what you can expect. However, they do communicate about this issue (nuancing the verdict above a little bit):
– Right below their product table (of which you made a screenshot), there is a little but important notice:
– On their public news channel, they provide some information (https://startssl.com/NewsDetails?date=20161103).
– Once logged in to their control panel, we have some more details:
Anon Sunday, January 29, 2017 at 04:56 -
Nope. Do you think they are the first CA to get removed? They’re not.
There are other uses for certificates than what you have listed and one can always add the root back in themselves so it is trusted. If someone wanted certificates to be used internally without running their own CA, this is easily doable.
There is no such thing as SSL or TLS certificates, they are one in the same. How about we use the real name for it; X.509! SSL and TLS are protocols.
Well, they are still in business. Just because they are not trusted doesn’t mean they will go out of business. They can make changes to their policies and get back in the good graces of the browsers. Google threatened Symantec a few years ago when they had some issues. Google gave Symantec a chance to fix their ways. I expect that StartCom will be back in as a trusted CA in the future. While they were removed, they just need to follow the rules and reapply to be a trusted.
Then how do you have a trust relationship when it is decentralized? Does everyone need to pick who they want to trust?
So people shouldn’t do their own research? A handful of IT experts? More than a handful know this and anyone that is an expert when it comes to X.509 knew this, if they didn’t, they are not an expert.
Paul Thursday, February 2, 2017 at 16:26 -
Or, call it by what it exactly is; x.509 certificate.
idot Monday, April 10, 2017 at 06:47 -
The author is a idiot.
Daniel Marschall Wednesday, May 3, 2017 at 19:58 -
You blame them for selling their certs? What do you expect them to do? Giving up and getting bankrupt? Or ask youself: What would you do, if you were StartCom ? Wouldn’t you try to survive?
Paul Tuesday, August 1, 2017 at 08:05 -
I would find out what is wrong with my certs and why they are bad and fix it before trying to sell more, but I guess not everyone cares about that.
Ariq Naufal Saturday, January 27, 2018 at 05:35 -
So, what’s browser did still accept wosign ssl? My campus’ webmail use wosign ssl, since it’s revoked i can’t access it on firefox, and chrome. :(
Inbound links
- Web Development Reading List #166: Efficient Docker, CSP Learnings, And JavaScript’s Global Object – Web Guy Help
- Web Development Reading List #166: Efficient Docker, CSP Learnings, And JavaScript’s Global Object – Smashing Magazine