https://crt.sh/?serial=056d1570da645bf6b44c0a7077cc6769&iCAID=1662 says "Not Revoked" three times. I wonder if that's causing some confusion here.

crt.sh currently only tracks revocation via various browser-based blacklisting mechanisms (Chrome's CRLSets and hardcoded blacklist, Microsoft's disallowedcert.stl and Mozilla's OneCRL). crt.sh doesn't yet track CRLs signed by CAs (TODO: https://github.com/crtsh/certwatch_db/issues/16) or OCSP.

I just downloaded http://crls6.wosign.com/ca6-server1-free.crl and found that the serial number 056d1570da645bf6b44c0a7077cc6769 _is_ revoked.

The relevant OCSP server (http://ocsp6.wosign.com/ca6/server1/free) also reports "revoked" for this issuer / serial number.

On 01/09/16 10:11, Richard Wang wrote:
I am sure it is revoked, please check it again, thanks.


Best Regards,

Richard

-----Original Message-----
From: dev-security-policy 
[mailto:[email protected]] On 
Behalf Of Patrick T
Sent: Thursday, September 1, 2016 5:07 PM
To: [email protected]
Subject: Re: Reuse of serial numbers by StartCom

On Wednesday, 31 August 2016 17:57:41 UTC+1, Eddy Nigg  wrote:
On 08/31/2016 03:19 PM, Matt Palmer wrote:
That bug appears to pre-date *all* of the certificates listed above.
Further, the last communication on that bug (2014-09-22), from Eddy
Nigg (of StartCom), said:
It's a hard and software related capacity issue of the queue
managing the certificates and the real solution will be only
available after a hardware upgrade we are planning for Nov-Dec this year.
So that's presumably Nov-Dec 2014... and 12 months later, duplicate
serial numbers were still appearing.

Right, however we could limit this occurrence to a minimum at that
time
- an entirely new infrastructure was in the pipeline already which
solved the problem completely. Please note that such infrastructures
are fairly complex and therefore also hard to deal with sometimes. I
acknowledged in the bug report that we were able significantly reduce
this issue, though not eliminate entirely.

It's somewhat disconcerting that the response from StartCom in that
bug report was, essentially, a mixture of, "it's not our fault, the
software did it" and "ain't no thang".  To me, that isn't a
particularly useful attitude for a CA operator.  The correctness of
the software which is deployed is of
*crucial* importance to the trustworthiness of a CA.

True, but as explained above, some more drastic changes had to be done
in order to correct this issue completely, not something done over
night. The corrective measure and eventual implementation was however
there on the way, even if it took some time.

Regarding our "attitude", even though this issue was certainly not
desired, it wasn't comparable to a wrongful issuance leading to
possible abuse - some client software would however stopped working
when encountering a duplicate serial. And to my assessment this wasn't
a situation which required to take an entire system down in order to "fix"
it (which was necessary in this case).

Is anyone aware of any attempts by StartCom to proactively report
these BR violations to Mozilla or any other trust store operator, at
or around the time of issuance?  I don't see any mention of the 2015
misissuances in the most recent BR audit report
(https://startssl.com/ey-webtrust-br.pdf),
either.  Does this mean that StartCom were unaware that they had
issued these duplicate certificates, despite having a history of
doing so, or did they mislead their auditors?

Neither - the software wasn't designed to issue certificates with
duplicate serials, neither was that done knowingly or willfully. Since
we are talking about an occurrence of perhaps one in 40-50 thousand
certificates or less, it's not really something that can be measured
by an auditor. What can be measured are software design, actions
performed, implementation of plans to solve a particular issue.

PS. it appears that most certificates mentioned originally have
already expired, so there isn't much to revoke today except one.

--
Regards
Signer:         Eddy Nigg, Founder
        StartCom Ltd. <http://www.startcom.org>
XMPP:   [email protected] <xmpp:[email protected]>


Are the certificates listed here also affected by this problem?

https://crt.sh/?serial=056d1570da645bf6b44c0a7077cc6769&iCAID=1662

There seem to be a number of duplicated-serial certificates, which aren't 
revoked and are still valid.

--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to