Li-Chun: thank you for this incident report. I have created
https://bugzilla.mozilla.org/show_bug.cgi?id=1532436 to track this issue.



On Fri, Mar 1, 2019 at 5:59 AM Jakob Bohm via dev-security-policy <
[email protected]> wrote:

> On 28/02/2019 17:48, [email protected] wrote:
> > 1. How your CA first became aware of the problem (e.g. via a problem
> report submitted to your Problem Reporting Mechanism, a discussion in
> mozilla.dev.security.policy, a Bugzilla bug, or internal self-audit), and
> the time and date.
> >
> >   Ans:
> > One of our staffs in PKI group was taking samples of the issued
> certificates from crt.sh database for some reasons and found a mis-issued
> certificate which has a test (unregistered) FQDN on February 15, 2019 at
> 1:55 (UTC). He then notified us (Public CA) of the incident. We decide to
> make an initial investigation and found another mis-issued certificate
> which also has a test FQDN on February 15, 2019 at 2:30 (UTC).
> >
> > 2. A timeline of the actions your CA took in response. A timeline is a
> date-and-time-stamped sequence of all relevant events. This may include
> events before the incident was reported, such as when a particular
> requirement became applicable, or a document changed, or a bug was
> introduced, or an audit was done.
> >
> >   Ans:
> > Timeline (all times are UTC):
> > 15 February 2019 1:55: Find a mis-issued certificate with a FQDN
> www.raotest.com.tw
> > 15 February 2019 1:59: Revoke the first mis-issued certificate
> > 15 February 2019 2:07:  Public CA starts an action plan and initial
> investigation
> > 15 February 2019 2:17:  Further certificate issuing suspended
> > 15 February 2019 2:30: Find another mis-issued certificate with a FQDN
> publicca.rao.com.tw
> > 15 February 2019 4:10: Initial investigation completed
> > 15 February 2019 4:25: Certificate issuing restarted
> > 15 February 2019 4:40: Hold an investigation meeting
> >
> > 3. Whether your CA has stopped, or has not yet stopped, issuing
> certificates with the problem. A statement that you have will be considered
> a pledge to the community; a statement that you have not requires an
> explanation.
> >
> > Ans:
> > Yes, we had stopped issuing certificates before we investigated and
> revoked any certificate with an unregistered FQDN. We have asked our CA
> system vendor to include an automatic FQDN-checking function in the hotfix
> which will be released not after 30 March 2019 to avoid making the same
> mistakes.
> >
> > 4. A summary of the problematic certificates. For each problem: number
> of certs, and the date the first and last certs with that problem were
> issued.
> >
> > Ans:
> > Number of certs: 2
> >       First cert: issued on Nov 12, 2018 at 11:53:02 (UTC)
> >       Last cert: issued on Jan 29, 2019 at 06:43:59 (UTC)
> >
> > 5. The complete certificate data for the problematic certificates. The
> recommended way to provide this is to ensure each certificate is logged to
> CT and then list the fingerprints or crt.sh IDs, either in the report or as
> an attached spreadsheet, with one list per distinct problem.
> >
> > Ans:
> > https://crt.sh/?id=1153958924 with FQDN www.raotest.com.tw
> > https://crt.sh/?id=940459864 with FQDN publicca.rao.com.tw
> >
> > 6. Explanation about how and why the mistakes were made or bugs
> introduced, and how they avoided detection until now.
> >
> > Ans:
> > For the certificate with FQDN www.raotest.com.tw:
> > One of our RAOs intended to take a screenshot of certificate application
> process for training material in test environment, but she was not aware
> that she is in the formal environment. After the certificate was issued,
> the RAO forgot to revoke it.
> >
> > For the certificate with FQDN publicca.rao.com.tw:
> > The same as the former cause, but the mis-issued certificate had been
> revoked immediately without notifying Public CA.
> >
> > The mistakes have not been detected (even by our internal self-audit)
> because the amount of mis-issued certificates is minor. The RAO involved in
> this incident has been verbally warned and needs to undergo a retraining
> process in accordance with our employment contract.
> >
> > 7. List of steps your CA is taking to resolve the situation and ensure
> such issuance will not be repeated in the future, accompanied with a
> timeline of when your CA expects to accomplish these things.
> >
> > Ans:
> > To avoid making the same mistakes, the following steps will newly be
> introduced:
> >
> > Step 1. Implementation of a two-stage manual verification by different
> RAOs. Effective 26/02/2019.
> >
> > Step 2. Implementation of an automatic FQDN-checking function prior to
> issuing certificates. Effective 30/03/2019.
> >
> > Step 3. Implementation of a scheduling program to periodically and
> automatically check the newly-issued certificates from our repository.
> Effective 30/05/2019.
> >
> >
>
> How come your Public CA wasn't routinely using the blessed automatic
> methods listed in the BRs?  Manual domain ownership or control
> validation is supposed to be an exception, not the routine standard
> procedure for a general public CA (a private Sub-CA technically
> constrained by the parent CA to only issue for domains already
> validated as belonging to the Sub-CA owner may rely exclusively on
> their internal processes to authorize certificates for any FQDNs
> under their own domains, because a public CA can legitimately
> validate the customer higher level domain control to issue for FQDNs
> under the validated domain).
>
> FQDN existence is not a requirement, only validation that the
> certificate applicant has the authority to create and change that
> FQDN at will.  For example, automated validation that raotest.com.tw is
> a registered domain fully controlled by the applicant would be enough
> to give that applicant a certificate for www.raotest.com.tw, even
> before that applicant creates www.raotest.com.tw.  Some applicants
> may even prefer to obtain certificates before making their FQDN live.
>
> Of cause the fact that a registry such as the one for .com.tw can
> create any non-existent domain does not count, because such domains
> would generally belong to a 3rd party.
>
>
> Enjoy
>
> Jakob
> --
> Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
> Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
> This public discussion message is non-binding and may contain errors.
> WiseMo - Remote Service Management for PCs, Phones and Embedded
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to