Hello ALL

Please find our incident report below.

1.      How your CA first became aware of the problem and the time and date.

        1)      3 February 2018, 12:06 CET -  Certum receives the message from 
[email protected] to [email protected].



2.      A timeline of the actions CERTUM took in response.

        1)      3 February 2018, 12:06 CET -  Certum receives the message from 
[email protected] to [email protected].
        2)      5 February 2018, 15:37 CET and 15:56 CET - Certum informs 
subscribers (owners of *.orix.pl and ftp.gavdi.pl domains) 
                        about the obtained problem report.
        3)      5 February 2018, 15:37 CET and 15:56 CET - Certum request 
subscribers to provide private keys checksums.
        4)      5 February 2018, 16:03 CET - Certum informs Hanno Boeck that 
received the problem report.
        5)      6 February 2018, 16:03 CET - Certum revokes certificates SHA1 - 
6E8B5A67417FDBDE2871A28ED7A2C30FEE686390 and SHA1 - 
        882AE1C8660BB75E3311ACB0CEBCD3C3FF9167E3.
        6)      6 February 2018 - Certum scans certificates database. No weak 
keys was found.
        7)      6 February 2018 - Certum scans certificates database. The 
problem with validation against Debian weak key was found.
        8)      8 February 2018 - Certum deploys a new version of the weak keys 
validation system.
        9)      8 February 2018 - Certum Certum scans certificates database. 
The problem with validation against Debian weak key was not 
                found.


3.      A summary of the problematic certificates.

The total number of certificates with the problem is 2:
        1)      https://crt.sh/?id=308392091&opt=ocsp 
        2)      https://crt.sh/?id=6888863&opt=ocsp


4.      Explanation about how and why the mistakes were made or bugs 
introduced, and how they avoided detection until now.

        The issue was caused by incorrect calculation of the SHA1 fingerprint 
of public key.
        Public keys hashes stored in Certum's  database was calculated from the 
Modulo key value with the Modulus prefix and a line ending character while the  
value of public key from CSR was calculated and returned without these 
additional characters. 
        So, this is the reason why the calculated fingerprint did not match the 
value from  Certum's database.
        Weak keys verification is tested each time before the new version of 
the software is deployed and also periodically as part of the test schedule.
        Unfortunately, the database of weak keys that served the tests 
contained keys hashes in incorrect formats, the parsed key was also in an 
incorrect format.      Therefore we could not recognize weak key in its 
"original" OpenSSL form. So each test returned false positives.

5.      List of steps your CA is taking to resolve the situation and ensure 
such issuance will not be repeated in the future

        Certum standardized formats of the validated and stored weak keys to be 
compliant with the following sources:
        
https://anonscm.debian.org/viewvc/pkg-openssl/openssl-blacklist/tags/0.5-2/blacklists/le64/blacklist-4096.db?view=co
        
https://anonscm.debian.org/viewvc/pkg-openssl/openssl-blacklist/tags/0.5-2/blacklists/le32/blacklist-4096.db?view=co
        
https://anonscm.debian.org/viewvc/pkg-openssl/openssl-blacklist/tags/0.5-2/blacklists/be32/blacklist-4096.db?view=co
        
https://anonscm.debian.org/viewvc/pkg-openssl/openssl-blacklist/trunk/blacklists/be32/blacklist-2048.db?view=co
        
https://anonscm.debian.org/viewvc/pkg-openssl/openssl-blacklist/trunk/blacklists/le32/blacklist-2048.db?view=co
        
https://anonscm.debian.org/viewvc/pkg-openssl/openssl-blacklist/trunk/blacklists/le64/blacklist-2048.db?view=co
        
https://anonscm.debian.org/viewvc/pkg-openssl/openssl-blacklist/trunk/blacklists/be32/blacklist-1024.db?view=co
        
https://anonscm.debian.org/viewvc/pkg-openssl/openssl-blacklist/trunk/blacklists/le32/blacklist-1024.db?view=co
        
https://anonscm.debian.org/viewvc/pkg-openssl/openssl-blacklist/trunk/blacklists/le64/blacklist-1024.db?view=co




--
Arkadiusz Ławniczak
Analyst 
Security and Trust Services Division
Asseco Data Systems S.A.
Biuro w Szczecinie
ul. Królowej Korony Polskiej 21
70-486 Szczecin
phone  + 48 91 480 12 32
mob. +48 669992104
[email protected]
assecods.pl 
Asseco Data Systems S.A. Headquarters: Podolska 21, 81-321 Gdynia/Poland. Tax 
Identification Number (NIP): 517-035-94-58. Statistical ID number (REGON): 
180853177. National Court Register: 0000421310 District Court in Gdańsk, VIII 
Commercial Department of the National Court Register. Share capital: 120 002 
940,00 PLN.
This information is intended only for the person or entity to which it is 
addressed and may contain confidential and/or privileged material. Unauthorised 
use of this information by person or entity other than the intended recipient 
is prohibited by law. If you received this by mistake, please immediately 
contact the sender by e-mail or by telephone and delete this information from 
any computer. Thank you. Asseco Data Systems S.A.



-----Original Message-----
From: dev-security-policy 
[mailto:dev-security-policy-bounces+arkadiusz.lawniczak=assecods...@lists.mozilla.org]
 On Behalf Of Hanno Böck via dev-security-policy
Sent: Monday, February 5, 2018 5:08 PM
To: [email protected]
Subject: Certificates with 2008 Debian weak key bug

Hi,

I searched crt.sh for valid certificates vulnerable to the 2008 Debian weak key 
bug. (Only 2048 bit.)

Overall I found 5 unexpired certificates.

Two certificates by Certum (reported on Saturday, Certum told me "We have taken 
necessary steps to clarify this situation as soon as possible", they're not 
revoked yet):
https://crt.sh/?id=308392091&opt=ocsp
https://crt.sh/?id=6888863&opt=ocsp

Wosign:
https://crt.sh/?id=30347743
StartCom:
https://crt.sh/?id=54187884
https://crt.sh/?id=307753186

As we all know these are no longer trusted by Mozilla, I reported them 
nevertheless. No reply yet.

Old bugs never die, I recommend every CA adds a check for the Debian bug to 
their certificate issuance process.

--
Hanno Böck
https://hboeck.de/

mail/jabber: [email protected]
GPG: FE73757FA60E4E21B937579FA5880072BBB51E42
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to