Hello,


Many thanks for the research - this CT analysis is both fascinating and useful. 
 I'd like to address the following statement:



"Noncompliance already visible from previously logged certificates.  The 
HydrantID SSL ICA G2 CA is trusted by Mozilla (via QuoVadis) for TLS 
authentication, but issues certs intended for IPSEC and which lack serverAuth 
and clientAuth EKU values, which are not BR-compliant (7.1.2.3.f)."



For the sake of reference, here's a link to one of the certificates referenced: 
 https://crt.sh/?id=380352272&opt=zlint.  Responding to the two points:



1. IPSEC EKU

These certificates contain extKeyUsage values for IPSEC due to a customer 
requirement.  This is allowed under the Baseline Requirements:



"7.1.2.3.f. extKeyUsage (required) Either the value id-kp-serverAuth [RFC5280] 
or id-kp-clientAuth [RFC5280] or both values MUST be present. 
id-kp-emailProtection [RFC5280] MAY be present. Other values SHOULD NOT be 
present."



RFC 2119 defines SHOULD NOT as:



4. SHOULD NOT
This phrase, or the phrase "NOT RECOMMENDED" mean that there may exist valid 
reasons in particular circumstances when the particular behavior is acceptable 
or even useful, but the full implications should be understood and the case 
carefully weighed before implementing any behavior described with this label.



2.  serverAuth and clientAuth EKU

These certificates are compliant with the BR and contain the required 
extKeyUsage values for both id-kp-serverAuth or id-kp-clientAuth.  It appears 
that zLint "w_sub_cert_eku_extra_values" provides an incomplete message 
relating to the BR 7.1.2.3:



*****************************************

* ZLint showing just w_sub_cert_eku_extra_values description

*****************************************

$ zlint -list-lints-json | grep 'w_sub_cert_eku_extra_values'

{"name":"w_sub_cert_eku_extra_values","description":"Subscriber Certificate: 
extKeyUsage either the value id-kp-serverAuth or id-kp-clientAuth or both 
values MUST be present.","citation":"BRs: 7.1.2.3"}



This lint shows a warning due to the inclusion of additional extKeyUsage 
values. The zLint description ideally should include the "Other values SHOULD 
NOT be present" portion of the BR to reflect that the warning may be generated 
even though the cert is compliant with the BR.



Regards,

Stephen Davidson

QuoVadis







-----Original Message-----
From: dev-security-policy 
<dev-security-policy-bounces+s.davidson=quovadisglobal....@lists.mozilla.org> 
On Behalf Of Tim Smith via dev-security-policy
Sent: Saturday, March 31, 2018 7:15 PM
To: Mozilla <[email protected]>
Subject: Discovering unlogged certificates in internet-wide scans



Hi MDSP,



I went looking for corpuses of certificates that may not have been previously 
logged to CT and found some in the Rapid7 "More SSL" dataset, which captures 
certificates from their scans of non-HTTPS ports for TLS-speaking services.



I wrote up some findings at

http://blog.tim-smith.us/2018/03/moressl-spelunking/.



A few highlights include:

- of the ~10 million certificates in the corpus, about 20% had valid signatures 
and chained to roots included in the Mozilla trust store

- about 50,000 of the 2 million trusted certificates had not previously been 
logged

- about half of the novel certificates were unexpired



There were interesting examples of unexpired, non-compliant, trusted 
certificates chaining to issuers including GoDaddy, NetLock, Logius, and 
Entrust. (I have not taken any action to inform issuers of these findings, 
other than this message and by publishing the certificates to CT logs.)



I welcome any feedback or questions about the value of the approach and the 
findings.



Thanks,

Tim

_______________________________________________

dev-security-policy mailing list

[email protected]<mailto:[email protected]>

https://lists.mozilla.org/listinfo/dev-security-policy



_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to