In March of this year, Google found unauthorized digital certificates for several Google domains. The root certificate authority for these domains was the China Internet Network Information Center(CNNIC). CNNIC was controlled by the Chinese government through the Ministry of Industry and Information Technology and is now under the management of the Cyberspace Administration of China (CAC). CNNIC was recognized by all major browsers as a trusted Certificate Authority. If CNNIC signs a fake certificate used in a man-in-the-middle attack, no browser will warn of any unusual activity unless the certificate is pinned.
After Google found these unauthorized certificates, both Google and Firefox revoked its trust in CNNIC a few days later. Apple and Microsoft on the other hand, did not revoke their trust in CNNIC, nor did they make any announcements regarding the security compromise.
In June 2015, Apple quietly published a support article titled “About the security partial trust allow list”. Apple states in the support article that “an intermediate certificate was incorrectly issued by the certificate authority CNNIC. This issue was addressed through the addition of a mechanism to partially trust a CA by trusting only a set of certificates.” This is the same strategy that has been taken by Google and Firefox to block CNNIC.
Apple also published the full domain list signed by CNNIC which might be interesting to researchers.
Microsoft is the only major browser operator left that still trusts CNNIC-issued CAs. Microsoft pointed to a help article when requested for comment. Microsoft didn’t indicate any action against CNNIC in the article. We urge Microsoft to revoke CNNIC following Google, Mozilla and Apple's lead and limit CNNIC's authority to the domain list published by Apple.