Hi Hanno,

Hanno Böck, on 04 October 2016 13:34, said..
> There seem to be more certificates of that kind that weren't mentioned
> in the incident report. Here's a .re / www.re certificate (expired
> 2015):
> https://crt.sh/?id=4467456
> 
> Has comodo checked its systems for other certificates of that kind? Can
> you provide a full list of all such certificates?
> 

Yes, we have.

The initial check was for certificates issued on or after Nov 1st 2015, that 
being the date when internal server names were finally outlawed.  
In certificates issued before that date dNSName=sb could arguably be considered 
an internal server name (given that https://sb/ isn't supposed to
resolve on the public Internet).  At any rate, in the interests of getting the 
incident report out, it was simpler to only go back as far as Nov 1st 2015 so 
that we didn't have to consider internal server names at all.

We took another pass through the data looking for all server authentication 
certificates where we included DOMAIN, and for which DOMAIN is also included in 
the PSL or is a TLD, but where we validated (something).DOMAIN instead of 
DOMAIN.  This should produce a superset of all certificates that exhibit this 
problem.
In each case, the (something) was 'www'.

Going back to 2011, which was when we started checking the PSL in addition to a 
(then) fixed list of TLDs, we find the following certificates:
Issued          PSL section     State
25/07/2011      k12.wa.us       ICANN   expired
25/07/2011      k12.wa.us       ICANN   expired
12/11/2011      re      ICANN   expired
10/12/2012      gov.uk  ICANN   expired
02/05/2013      fredrikstad.no  ICANN   expired
10/06/2013      k12.wa.us       ICANN   expired
02/08/2013      ks.ua   ICANN   expired
30/06/2014      re      ICANN   expired
28/08/2014      iki.fi  PRIVATE Valid (still live on https://iki.fi)
17/06/2015      gov.lk  ICANN   expired
20/09/2015      net.kg  ICANN   expired

Plus these ones which were already discussed:
26/11/2015      rivne.ua        ICANN
03/08/2016      tc      ICANN
03/08/2016      tc      ICANN
03/08/2016      tc      ICANN
21/09/2016      sb      ICANN

Plus three more certificates which turned out to be on the private section of 
the PSL now, but were not in the PSL when we issued the certificates.

> 
> Also my understanding is that the error here was that control over the
> www.[domain] subdomain would indicate control over [domain]. Does that
> mean that this bug could've been used to also get wildcard certificates
> in the form of *.[tld]?

No.  Regardless of other controls, the nature of this bug was that it only 
affected cases where a customer requested www.DOMAIN, because that was the case 
in which we also added DOMAIN into the SAN.

No certificates were issued for *.[tld]

Regards
Robin Alden
Comodo

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to