Hi all, We issued a single certificate that contained an internal domain. This certificate was discovered on Oct 16th and revoked on the 17th. We filed the bug report here: https://bugzilla.mozilla.org/show_bug.cgi?id=1500621 but are also posting the list for awareness. Tl;dr. Two validation agents overrode our compliance checks and authorized issuance of a certificate, completing the domain validation using an unauthorized email. We're moving from cablint to zlint as our pre-issuance compliance check and removing the ability of validation agents to override the compliance check. Thanks, Jeremy Bug report: 1. How your CA first became aware of the problem (e.g. via a problem report submitted to your Problem Reporting Mechanism, a discussion in mozilla.dev.security.policy, a Bugzilla bug, or internal self-audit), and the time and date. On 10/16/2018, we were notified by a third party that they had identified an internal name on a publicly issued certificate, unrelated to their business, within the past week. 2. A timeline of the actions your CA took in response. A timeline is a date-and-time-stamped sequence of all relevant events. This may include events before the incident was reported, such as when a particular requirement became applicable, or a document changed, or a bug was introduced, or an audit was done. 10/16/18 A certificate with an internal domain name was reported to us by a third party 10/16/18 We investigated the root cause including the source of the request and the system that issued the problem certificate. We identified a gap in our domain pre-validation process that allowed a certificate containing an internal name to be submitted for validation by a customer. This was intentional as certificates for use cases other than the WebPKI use the same validation engine. Once an internal name was queued for validation, a validation agent overrode the base domain's classification as "private" and manually performed a WHOIS procedure which is only allowed when automatic WHOIS data retrieval used to determine the email address for a method 2 email-based domain validation fails. The WHOIS lookup procedure allowed a validation agent to send a domain confirmation email to the customer containing a base domain substring of the FQDN, and the customer proceeded to approve the internal name in response to the method 2 confirmation. Because the automated WHOIS data retrieval failed in this case, it exposed an unintended ability for the validation agent to perform an override, categorize the domain as authorized for the WebPKI, and incorrectly approve the certificate. 10/17/18 We revoked the one problem certificate and moved the pre-issuance check behind the validation process, ensuring the system blocks internal names for public certs regardless of validation staff mistakes. We also implemented changes on our portals to prevent the gap that allowed internal names into our domain pre-validation process for WebPKI. We have also improved our linting process pre-issuance to catch similar situations. 10/17/18 We ran a script over our existing certificate database to identify certs affected by this issue. No additional certificates were identified. 3. Whether your CA has stopped, or has not yet stopped, issuing certificates with the problem. A statement that you have will be considered a pledge to the community; a statement that you have not requires an explanation. On 10/17/18, we implemented two fixes and a linting enhancement to prevent this problem from re-occurring. The linting enhancement checks the certificate pre-issuance but post validation to ensure no additional issues exist. 4. A summary of the problematic certificates. For each problem: number of certs, and the date the first and last certs with that problem were issued. Impact of one certificate, issued on 10/10/2018. 7. The complete certificate data for the problematic certificates. <https://crt.sh/?id=845405886> https://crt.sh/?id=845405886 6. Explanation about how and why the mistakes were made or bugs introduced, and how they avoided detection until now. Limited front-end PSL checking allowed an internal domain name request to be submitted to our validation queue for human review. Although this is intentional because we support non-WebPKI systems, there was an override in the validation process that allowed a validation agent to approve the certificate for WebPKI. The override was added to allow a validation agent to override a pre-issuance check when manually accessing WHOIS data and providing the method 2 Domain Contact email address to the system. The override feature was only available if the automated WHOIS Domain Contact email address lookup service failed for the submitted domain. The override also allowed the validation staff to incorrectly approve non-WebPKI certificates for WebPKI once validation completed. A combination of these two problems permitted a manual override of the pre-issuance check and incorrect approval of the certificate for issuance. 7. List of steps CA is taking to resolve the situation and ensure it will not be repeated. We implemented additional software rules and checks to prevent agents from overriding the pre-issuance check when automated WHOIS Domain Contact email address lookups fail and to prevent agents from associating internal domain names with domains on public suffixes. We also enhanced the existing front-end screening in our domain pre-validation system.
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

