I am happy to create the bugs, and have done so for this issue: https://bugzilla.mozilla.org/show_bug.cgi?id=1534147
On Sun, Mar 10, 2019 at 11:52 AM James Burton via dev-security-policy < [email protected]> wrote: > Hi Fotis, > > You need to file this as a bugzilla bug. > > Thank you, > > Burton > > On Sun, 10 Mar 2019 at 18:34, Fotis Loukos via dev-security-policy < > [email protected]> wrote: > > > SSL.com has been following the recent discussions at > > mozilla.dev.security.policy regarding the behavior of EJBCA based CAs in > > the matter of serial number generation. > > > > SSL.com is using EJBCA internally and is affected by the same issue. > > After consulting with our auditors, we would like to post a preliminary > > report of our findings. > > > > ### How your CA first became aware of the problem (e.g. via a problem > > report submitted to your Problem Reporting Mechanism, a discussion in > > mozilla.dev.security.policy, a Bugzilla bug, or internal self-audit), > > and the time and date. > > > > SSL.com has been following discussion of this issue in > > mozilla.dev.security.policy and initiated a review on 05/03/2019. > > > > ### A timeline of the actions your CA took in response. A timeline is a > > date-and-time-stamped sequence of all relevant events. This may include > > events before the incident was reported, such as when a particular > > requirement became applicable, or a document changed, or a bug was > > introduced, or an audit was done. > > > > - 10/07/2016 - Ballot 164 on Certificate Serial Number Entropy is voted. > > - 30/09/2016 - Ballot 164 enters into effect. > > - 05/03/2019 - Initial review initiated. > > - 05/03/2019 - Confirmed issue exists in SSL.com certificates. > > - 05/03/2019 - Tested and deployed correction to production systems. > > - 06/03/2019 - A full plan for the revocation of all certificates has > > been initiated. We plan on revoking all certificates within 30 days. > > > > ### Whether your CA has stopped, or has not yet stopped, issuing > > certificates with the problem. A statement that you have will be > > considered a pledge to the community; a statement that you have not > > requires an explanation. > > > > A patch was deployed as soon as we confirmed that the issue exists in > > SSL.com certificates. Certificate issuance has been resumed with serials > > meeting all requirements. > > > > ### A summary of the problematic certificates. For each problem: number > > of certs, and the date the first and last certs with that problem were > > issued. > > > > - 6931 End Entity TLS Certificates > > > > We will post an update that will include all S/MIME and CA certificate > > information. > > > > ### The complete certificate data for the problematic certificates. The > > recommended way to provide this is to ensure each certificate is logged > > to CT and then list the fingerprints or crt.sh IDs, either in the report > > or as an attached spreadsheet, with one list per distinct problem. > > > > Please find attached the file tlseelist.txt containing the fingerprints > > of all affected end entity TLS certificates. S/MIME and CA certificate > > information will be posted during an update. > > > > ### Explanation about how and why the mistakes were made or bugs > > introduced, and how they avoided detection until now. > > > > EJBCA's method of generating serial numbers has led to a discrepancy > > between expected and actual behavior and output, such that any CA using > > EJBCA with the default settings will encounter this issue (and be > > therefore in violation of BR 7.1). > > > > ### List of steps your CA is taking to resolve the situation and ensure > > such issuance will not be repeated in the future, accompanied with a > > timeline of when your CA expects to accomplish these things. > > > > The number of bits of entropy used for the generation of serial numbers > > has been increased to 127. > > > > In addition to remediation related to this issue, we will initiate a > > review of other technical requirements of CA/B Forum and how they are > > implemented by EJBCA in order to ensure no more problematic practices > > are followed. > > > > SSL.com intends to exceed minimum technical requirements where ever > > possible to guard against similar issues in the future and ensure the > > highest possible level of security and compliance. > > > > Regards, > > Fotis > > > > -- > > Fotis Loukos, PhD > > Director of Security Architecture > > SSL Corp > > e: [email protected] > > w: https://www.ssl.com > > _______________________________________________ > > dev-security-policy mailing list > > [email protected] > > https://lists.mozilla.org/listinfo/dev-security-policy > > > _______________________________________________ > dev-security-policy mailing list > [email protected] > https://lists.mozilla.org/listinfo/dev-security-policy > _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

