26 Mart 2019 Salı 19:19:24 UTC+3 tarihinde Wayne Thayer yazdı:
> Melis: Thank you for this incident report. I have filed
> https://bugzilla.mozilla.org/show_bug.cgi?id=1539190 and assigned it to you
> to track this issue.
> 
> Will you please have one of your colleagues add you as a Kamu SM contact in
> CCADB? That will allow me to confirm that you are representing Kamu SM.
> 
> - Wayne
> 
> On Mon, Mar 25, 2019 at 7:16 AM Melis BALKAYA via dev-security-policy <
> [email protected]> wrote:
> 
> > As a preliminary note, Kamu SM would like to express that the only
> > affected 2 certificates are the test certificates issued to our own domains
> > in order to fulfill the related requirement of Mozilla Root Inclusion
> > Request.
> >
> >  1. How your CA first became aware of the problem (e.g. via a problem
> > report submitted to your Problem Reporting Mechanism, a discussion in
> > mozilla.dev.security.policy, a Bugzilla bug, or internal self-audit), and
> > the time and date.
> >
> > While Mozilla root inclusion process of Kamu SM, we had noticed that our
> > test certificates has serial number lower than 64 bits. Our system had been
> > updated to generate serial numbers with greater than 64 bit entropy in
> > 2017.
> >
> > We monitor mozilla.dev.security.policy group daily based and we became
> > aware of the EJBCA problem about DarkMatter concerns on 2019-02-26.
> >
> > 2. A timeline of the actions your CA took in response. A timeline is a
> > date-and-time-stamped sequence of all relevant events. This may include
> > events before the incident was reported, such as when a particular
> > requirement became applicable, or a document changed, or a bug was
> > introduced, or an audit was done.
> >
> > 2017-02-03 Kamu SM has issued three test certificates which are valid,
> > expired and revoked in order to fulfill the related Mozilla Root Inclusion
> > process requirement.
> >
> > 2017-03-07 In CP/CPS reviewing for Mozilla Root Inclusion Request of Kamu
> > SM, we had noticed that our random number generator was not generating
> > serial numbers with 64-bit entropy. Then, we changed the procedure for
> > generating serial numbers as greater than 64-bit entropy. Our “valid test
> > SSL certificate” was renewed with such a serial number. We did not take an
> > action for other two test certificates because one is revoked and the other
> > is expired.
> >
> > 2019-02-26 We became aware of the EJBCA problem about DarkMatter concerns.
> >
> > 2019-03-08 We have informed software developer team about the raised
> > issue.
> >
> > 2019-03-11 They checked all certificates issued by "CN=TUBITAK Kamu SM SSL
> > Sertifika Hizmet Saglayicisi - Surum 1”. They came to the conclusion that
> > none of the issued certificates other than the two test certificates
> > mentioned above are affected by this issue.
> >
> > 3. Whether your CA has stopped, or has not yet stopped, issuing
> > certificates with the problem. A statement that you have will be considered
> > a pledge to the community; a statement that you have not requires an
> > explanation.
> >
> > Since none of our customer certificates are affected by the serial number
> > entropy problem, we have continued to issue SSL certificates.
> >
> > 4. A summary of the problematic certificates. For each problem: number of
> > certs, and the date the first and last certs with that problem were issued.
> >
> > 2017-02-03 Kamu SM has issued three test certificates which are valid,
> > expired and revoked in order to fulfill the related Mozilla Root Inclusion
> > process requirement.
> >
> > 2019-03-19 With the announcement of the list of CAs that have been
> > noncompliant with BR 7.1, we have investigated that two test certificates
> > that are issued in the process of the Mozilla root inclusion request are
> > affected by this issue.
> >
> > 5. The complete certificate data for the problematic certificates. The
> > recommended way to provide this is to ensure each certificate is logged to
> > CT and then list the fingerprints or crt.sh IDs, either in the report or as
> > an attached spreadsheet, with one list per distinct problem.
> >
> > 2017-02-03 testsslrevoked.kamusm.gov.tr (0xbe64996b)
> > https://crt.sh/?id=95903318
> >
> > 2017-02-03 testsslexpired.kamusm.gov.tr (0x76cb4f6c)
> > https://crt.sh/?id=95903322
> >
> > 6. Explanation about how and why the mistakes were made or bugs
> > introduced, and how they avoided detection until now.
> >
> > Our certificate issuance system has been updated before we have included
> > Mozilla Root Store.
> >
> > 7. List of steps your CA is taking to resolve the situation and ensure
> > such issuance will not be repeated in the future, accompanied with a
> > timeline of when your CA expects to accomplish these things.
> >
> > Our affected test certificates were not valid since the beginning, and it
> > is not allowed to issue a valid subscriber certificate which has a serial
> > number lower than 64 bit in our system. All issued subscriber certificates
> > other than those test certificates comply with BR 7.1.
> > _______________________________________________
> > dev-security-policy mailing list
> > [email protected]
> > https://lists.mozilla.org/listinfo/dev-security-policy
> >

Wayne: I have been added to CCADB as a Kamu SM Contact.

Thanks,

-Melis Şimşek
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to