On 08/31/2016 03:19 PM, Matt Palmer wrote:
That bug appears to pre-date *all* of the certificates listed above.
Further, the last communication on that bug (2014-09-22), from Eddy
Nigg (of StartCom), said:
It's a hard and software related capacity issue of the queue
managing the certificates and the real solution will be only
available after a hardware upgrade we are planning for Nov-Dec this year.
So that's presumably Nov-Dec 2014... and 12 months later, duplicate
serial numbers were still appearing.
Right, however we could limit this occurrence to a minimum at that
time
- an entirely new infrastructure was in the pipeline already which
solved the problem completely. Please note that such infrastructures
are fairly complex and therefore also hard to deal with sometimes. I
acknowledged in the bug report that we were able significantly reduce
this issue, though not eliminate entirely.
It's somewhat disconcerting that the response from StartCom in that
bug report was, essentially, a mixture of, "it's not our fault, the
software did it" and "ain't no thang". To me, that isn't a
particularly useful attitude for a CA operator. The correctness of
the software which is deployed is of
*crucial* importance to the trustworthiness of a CA.
True, but as explained above, some more drastic changes had to be done
in order to correct this issue completely, not something done over
night. The corrective measure and eventual implementation was however
there on the way, even if it took some time.
Regarding our "attitude", even though this issue was certainly not
desired, it wasn't comparable to a wrongful issuance leading to
possible abuse - some client software would however stopped working
when encountering a duplicate serial. And to my assessment this wasn't
a situation which required to take an entire system down in order to "fix"
it (which was necessary in this case).
Is anyone aware of any attempts by StartCom to proactively report
these BR violations to Mozilla or any other trust store operator, at
or around the time of issuance? I don't see any mention of the 2015
misissuances in the most recent BR audit report
(https://startssl.com/ey-webtrust-br.pdf),
either. Does this mean that StartCom were unaware that they had
issued these duplicate certificates, despite having a history of
doing so, or did they mislead their auditors?
Neither - the software wasn't designed to issue certificates with
duplicate serials, neither was that done knowingly or willfully. Since
we are talking about an occurrence of perhaps one in 40-50 thousand
certificates or less, it's not really something that can be measured
by an auditor. What can be measured are software design, actions
performed, implementation of plans to solve a particular issue.
PS. it appears that most certificates mentioned originally have
already expired, so there isn't much to revoke today except one.
--
Regards
Signer: Eddy Nigg, Founder
StartCom Ltd. <http://www.startcom.org>
XMPP: [email protected] <xmpp:[email protected]>