We revoked the affected certificate immediately.

One of our customers issued a S/MIME certificate (SHA-1) to misuse as gateway 
certificate. That's the reason, why this certificate was identified as 
incorrect TLS Server certificate (ERROR: SHA-1 not allowed for signing 
certificates). We specified in our CP/CPS that this practice is not allowed.

We will improve the verification mechanisms to prevent this kind of abuse in 
the future.


Bernd Nakonzer
T-Systems International GmbH
Trust Center Applications


-----Ursprüngliche Nachricht-----
Von: dev-security-policy 
[mailto:dev-security-policy-bounces+bernd.nakonzer=t-systems....@lists.mozilla.org]
 Im Auftrag von Charles Reiss
Gesendet: Montag, 9. Mai 2016 21:40
An: [email protected]
Betreff: Re: March 2016 CA Communication Responses

On 04/13/16 20:32, Kathleen Wilson wrote:
> All,
>
> I have added links to reports of the responses to the March 2016 CA 
> Communication survey:
>
> https://wiki.mozilla.org/CA:Communications#March_2016_Responses

For the responses to Question 1a:

DocuSign (OpenTrust/Keynectis) indicated 2015 Dec 31 but the following 
certificate has a notBefore of 10 Feb 2016 and, according to its CRL, was 
revoked 11 Feb 2016:
- https://crt.sh/?id=16157906&opt=cablint

Government of France indicated by 2015 Dec 31 but the following certificate has 
notBefores of 11 Jan 2016 and 18 April 2016:
- https://crt.sh/?id=12129393&opt=cablint
- https://crt.sh/?id=18777122&opt=cablint

SECOM indicated 2015 Dec 31 but the following certificate as a notBefore of 7 
Jan 2016:
- https://crt.sh/?id=12090324&opt=cablint

T-Systems International GmbH (Deutsche Telekom) indicated 2016 Jan 15 with 
"revoked: 02/02/2016" in the comment, but the following certificate has a 
notBefore of 9 March 2016:
- https://crt.sh/?id=15019496&opt=cablint


For the responses to Question 4:

Government of France indicated "None of the above", but the following 
certificates include the id-kp-serverAuth EKU but no dNSName or iPAddress SAN:
- https://crt.sh/?id=12129393&opt=cablint
- https://crt.sh/?id=18777122&opt=cablint

Government of Hong Kong (SAR) indicated "None of the above", but these 
certificates (which chain to Hongkong Post Root CA 1) are lacking SAN entries 
and appear to be intended for TLS server usage:
- https://crt.sh/?id=16024471&opt=cablint
- https://crt.sh/?id=12114285&opt=cablint



>
> Please keep in mind that the responses are considered preliminary and 
> may be changed until April 22, 2016. And remember that up until about 
> 2010, some CAs were issuing 10 year TLS/SSL certificates, so this may 
> cause some consternation regarding responses to ACTION #1b.
>
> Also, I still need to add the new "ACTION 1a TEXT INPUT" and "ACTION 
> 1b TEXT INPUT" data to the reports.
>
> Thanks, Kathleen
>

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to