Hi all,
a list of certificates showing a ROCA fingerprint was posted by Rob Stradling 
at Mozilla.dev.security.policy on 2017/10/18 available at 
https://misissued.com/batch/28/
This contains among other certificates a number of D-Trust related certificates 
that all show a ROCA fingerprint.    

All of these certificates are not related to WebPKI, i.e. are not chaining to a 
root trusted by NSS, but were part of the German qualified signature scheme 
under the supervision of the German supervisory body Bundesnetzagentur 
(BNetzA). The German qualified signature scheme mandated the sole use of 
specific smartcards under a specific German scheme (“Bestätigung nach 
Signaturgesetz (SigG)” for the operation of a qualified PKI infrastructure 
according to this scheme. Qualified TSPs were bound to this by law.
Smartcards in the German scheme were required to fulfill both a composite 
Common Criteria certification according to the relevant protection profiles as 
well as a specific qualification according to the German scheme. All components 
used by D-Trust during the applicability of the German Signaturgesetz met these 
requirements as confirmed by yearly audits by the accredited conformity 
assessment body TüvIT.

The German qualified signature scheme was superseded by the EU eIDAS 
regulation, which overrules national signature law in the EU. The eIDAS 
regulation became mandatory at the 1st of July 2017 after a one year transition 
period. Therefore all certificates related to D-Trust at 
https://misissued.com/batch/28/ where deactivated during June 2017 and revoked 
later in order to comply with the new eIDAS requirements which include an eIDAS 
conformity assessment as well as various technical adaptions. The trust status 
of these certificates can be validated in the German Trusted List (TSL) located 
at https://www.nrca-ds.de/ which is the centeal point of trust according to the 
eIDAS regulation and where the respective status is shown as withdrawn.

In the course of this transition smart cards were abandoned as the new eIDAS 
regulation now allows for a HSM based infrastructure inside a qualified TSP 
(contrary to the former situation according to the German Signature law).

Therefore all mentioned D-Trust related certificates at 
https://misissued.com/batch/28/  are now deactived and revoked and the related 
services are shown as withdrawn in the German TSL. Please note that a 
considerable part of these certificates were derived from a root operated by 
the supervisory body BNetzA as they were part of the so-called accredited 
qualified signature scheme as mandated by national German signature law. 

Please note that all WebPKI related systems within D-Trust are not affected by 
the issue of weak RSA key generation in Infineon components as all of these 
systems are HSM based.

Best Regards,

Enrico Entschew (D-TRUST)
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to