On Monday, August 20, 2018 at 10:40:15 AM UTC-7, Wayne Thayer wrote:
> Thank you for the disclosure Daymion. I have created bug 1484766 to track
> this issue. I've requested an incident report to help the community better
> understand what happened and what can and is being done to prevent similar
> problems in the future, as described in the last two topics [1]:
> 
> 6. Explanation about how and why the mistakes were made or bugs introduced,
> and how they avoided detection until now.
> 7. List of steps your CA is taking to resolve the situation and ensure such
> issuance will not be repeated in the future, accompanied with a timeline of
> when your CA expects to accomplish these things.
> 
> - Wayne
> 
> [1] https://wiki.mozilla.org/CA/Responding_To_An_Incident#Incident_Report
> 
> On Mon, Aug 20, 2018 at 9:26 AM Daymion Reynolds via dev-security-policy <
> [email protected]> wrote:
> 
> > On Saturday, August 18, 2018 at 2:27:05 PM UTC-7, Ben Laurie wrote:
> > > On Fri, 17 Aug 2018 at 18:22, Daymion Reynolds via dev-security-policy <
> > > [email protected]> wrote:
> > >
> > > > Revoke Disclosure
> > > >
> > > > GoDaddy has been proactively performing self-audits. As part of this
> > > > process, we identified a vulnerability in our code that would allow our
> > > > validation controls to be bypassed. This bug would allow for a Random
> > Value
> > > > that was generated for intended use with Method 3.2.2.4.6 and
> > 3.2.2.4.7 and
> > > > was validated using Method 3.2.2.4.2 by persons who were not confirmed
> > as
> > > > the domain contact. This bug was introduced November 2014 and was
> > leveraged
> > > > to issue a total of 865 certificates. The bug was closed hours after
> > > > identification, and in parallel we started the scope and revocation
> > > > activities.
> > > >
> > > > In accordance with CA/B Forum BR, section 4.9.1.1, all miss-issued
> > > > certificates were revoked within 24 hours of identification.
> > > >
> > > > A timeline of the Events for Revocation are as follows:
> > > >
> > > > 8/13 9:30am – Exploit issue surfaced as possible revocation event.
> > > > 8/13 9:30-4pm – Issue scope identification (at this point it was
> > unknown),
> > > > gathering certificate list
> > > > 8/13 4pm – Certificate list finalized for revoke total 825 certs,
> > Revoke
> > > > notification sent to cert owners.
> > > >
> > >
> > > I presume you mean domain owners?
> > >
> > > Do we know if any of these certs were used? If so, how?
> > >
> > >
> > > > 8/14 1:30pm – All certificates revoked.
> > > >
> > > > Further research identified 40 certificates which contained re-use of
> > > > suspect validation information.
> > > > 8/15 – 2pm – Additional certificates identified due to re-use.
> > > > 8/15 – 2:30pm – Customers notified of pending revoke.
> > > > 8/16 – 12:30pm – All certificated revoked.
> > > >
> > > > We stand ready to answer any questions or concerns.
> > > > Daymion
> > > >
> >
> > Yes, domain owners.
> >
> > Yes, some of the certs were being used as typical server certs. We have
> > not detected any nefarious activities.
> > _______________________________________________
> > dev-security-policy mailing list
> > [email protected]
> > https://lists.mozilla.org/listinfo/dev-security-policy
> >

Wayne, I have found the bug. Will add information to it soon. -Daymion
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to