This post links to https://bugzilla.mozilla.org/show_bug.cgi?id=1509512
syntax error in one tls certificate 1. How your CA first became aware of the problem (e.g. via a problem report submitted to your Problem Reporting Mechanism, a discussion in mozilla.dev.security.policy, a Bugzilla bug, or internal self-audit), and the time and date. We became aware of the issue via https://crt.sh/ on 2018-11-12, 09:01 UTC. 2. A timeline of the actions your CA took in response. A timeline is a date-and-time-stamped sequence of all relevant events. This may include events before the incident was reported, such as when a particular requirement became applicable, or a document changed, or a bug was introduced, or an audit was done. Timeline: 2018-11-12, 09:01 UTC CA became aware via https://crt.sh/ of a syntax error in one tls certificate issued on 2018-06-02. The PrintableString of OBJECT IDENTIFIER serialNumber (2 5 4 5) contains an invalid character. For more details see https://crt.sh/?id=514472818 2018-11-12, 09:30 UTC CA Security Issues task force analyzed the error and recommended further procedure. 2018-11-12, 10:30 UTC Customer was contacted the first time. Customer runs an international critical trade platform for emissions. Immediate revocation of the certificate would cause irreparable harm to the public. 2018-11-12, 13:00 UTC We performed a dedicated additionally coaching on this specific syntax topic within the validation team to avoid this kind of error in the future. 2018-11-16, 08:40 UTC Customer responded first time and asked for more time to evaluate the certificate replacement process. 2018-11-19, 12:30 UTC CA informed the auditor TÜV-IT about the issue. 2018-11-20, 15:19 UTC Customer declared to replace the certificate on 2018-11-22 latest. 2018-11-22, 15:52 UTC New certificate has been applied for and has been issued. 2018-11-22, 16:08 UTC The certificate with the serial number 3c 7c fb bf ea 35 a8 96 c6 79 c6 5c 82 ec 40 13 was revoked by customer. 3. Whether your CA has stopped, or has not yet stopped, issuing certificates with the problem. A statement that you have will be considered a pledge to the community; a statement that you have not requires an explanation. The CA has not stopped issuing EV-certificates. We applied dedicated coaching on this specific syntax topic within the validation team to avoid this kind of error until software adjustments to both effected systems have been completed. 4. A summary of the problematic certificates. For each problem: number of certs, and the date the first and last certs with that problem were issued. 1 Certificate SHA-256 41F3AD0CBDA392F078D776FD1CDC0E35F7AF61030C56C7B26B95936F41A83B32 Issued on 2018-06-01 5. The complete certificate data for the problematic certificates. The recommended way to provide this is to ensure each certificate is logged to CT and then list the fingerprints or crt.sh IDs, either in the report or as an attached spreadsheet, with one list per distinct problem. For more details see https://crt.sh/?id=514472818 6. Explanation about how and why the mistakes were made or bugs introduced, and how they avoided detection until now. This problem was caused within the frontend system to the customer and the lint system. Both systems did not check the entry in the field of serialNumber (2 5 4 5) correctly. It was possible to enter characters other than defined in PrintableString definition. 7. List of steps your CA is taking to resolve the situation and ensure such issuance will not be repeated in the future, accompanied with a timeline of when your CA expects to accomplish these things. The CA Security Issues task force together with the software development analyzed the error. We applied dedicated coaching on this specific syntax topic within the validation team to avoid this kind of error until software adjustments to both effected systems have been completed. The changes in the systems are expected to go live in early January 2019. Thank you Enrico Entschew D-TRUST GmbH _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

