On 02/12/16 14:26, Christoph Klein wrote:
> Dear All!
> 
> Thank you for contributing in our discussion and illustrate some
> existing problems with our certificates. I would like to address the
> stated points seperatley.
[snip]
> * 20 Bits of Entropy: the Serialnumber included in the Subject of our
> SSL - certificatges is randomly generated

When you reissue a certificate for the same subject, you appear to reuse
the same serial number (see, e.g., https://crt.sh/?id=12740856 and
https://crt.sh/?id=1659927). This makes sense for a subject's serial
number, but means that the random value does not serve the purpose of
making chosen-prefix collision attacks more difficult when a subscriber
requests a renewed certificate.

Also, in EV certificates, this subject serialNumber field number field
represents the registration number of the subject, so those certificates
do not seem to have added entropy at all.

> 
> * V Clause (X): We analyzed this problem and found an issue, where
> the variable wasn't transfered into the final certificate. This bug
> has been around since our first issued EV certificate and wasn't
> noticed until now. The problem is fixed, new certificates will
> replace the x with the proper letter.

Given that every EV certificate you issued had this error, and you have
been issuing EV certificates since at least 2013 (from your old root),
how was this error not detected by the self-audit you are required to
perform of 'a randomly selected sample of at least three percent of the
EV Certificates'?

[snip]
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to