On Dec 21 at 1715 UST we received a problem report (below) by email to 
[email protected] from Alex Gaynor relating to a TLS/SSL 
certificate issued by Swiss Government Public Trust Standard CA 02, a 
technically constrained external CA operated by Bundesamt fuer Informatik und 
Telekommunikation (BIT).

Specifically, a SAN in that certificate included a dNSName that ended with two 
\n characters:
https://crt.sh/?id=282646337&opt=cablinthttps://crt.sh/?id=282646337&opt=cablint

The certificate was revoked by the CA on Dec 22 at 1125 UST.

Upon investigation, the CA reports that the misissuance was the result of 
administrator error during the manual input of the SAN entry.  The misissuance 
will be reported to the CAs external auditors.  The CA has undertaken to add 
linting as part of the issuance of their TLS/SSL certificates.

Thanks to Alex Gaynor for reporting the issue.

Regards,
Stephen Davidson
QuoVadis, a WISeKey company

------

From: Alex Gaynor [mailto:[email protected]]
Sent: Thursday, December 21, 2017 1:15 PM
To: Group - QuoVadis Compliance 
<[email protected]<mailto:[email protected]>>
Subject: Misissued certificate

Hi,

I'm reporting a misissued certificate from one of your sub CAs: 
https://crt.sh/?id=282646337&opt=cablint

Specifically, one of the dNSNames ends with two newline (\n) chracters, which 
are not valid is a DNS label.

I am requesting you revoke this certificate and provide a post-mortem to MDSP.
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to