1. How your CA first became aware of the problem (e.g. via a problem report 
submitted to your Problem Reporting Mechanism, a discussion in 
mozilla.dev.security.policy, a Bugzilla bug, or internal self-audit), and the 
time and date.
 
In Bug 1551364 "SwissSign: "Some-State" in stateOrProvinceName", Ryan Sleevi 
reported potential issues in relation to OIDs in the CP/CPS of SwissSign Gold 
PKI (https://bugzilla.mozilla.org/show_bug.cgi?id=1551364#c2).

In the subsequent internal analysis SwissSign found the following:
- The SwissSign Gold CP/CPS with OID 2.16.756.1.89.1.2.1.7 is missing on the 
online archive under https://repository.swisssign.com and is only available in 
the internal archive.

- For the SwissSign Gold CP/CPS with OID 2.16.756.1.89.1.2.1.7, the certificate 
profile for end user certificates for G22 in section 7.1.2 f) was still 
2.16.756.1.89.1.2.1.6 instead of 2.16.756.1.89.1.2.1.7
- For the SwissSign Gold CP/CPS with OID 2.16.756.1.89.1.2.1.8, the certificate 
profile for end user certificates for G22 in section 7.1.2 f) was still 
2.16.756.1.89.1.2.1.6 instead of 2.16.756.1.89.1.2.1.8

- By applying the certificates profiles out the CP/CPS correctly, SwissSign 
issued certificates with a reference to an OID that did not match the 
applicable valid CP/CPS for these certificates. Concretely: 
 i) between 14.09.2017 - 12.10.2017 under the wrong OID 2.16.756.1.89.1.2.1.6 
instead of  2.16.756.1.89.1.2.1.7.
 ii) between 12.10.2017 - 16.07.2018 under the wrong OID 2.16.756.1.89.1.2.1.6 
instead of  2.16.756.1.89.1.2.1.8.
- Note: No EV certificates are affected by this issue

Because of the above findings we additionally checked the SwissSign Silver 
product line which resulted in similar findings
- The SwissSign Silver CP/CPS with OID 2.16.756.1.89.1.3.1.8 is missing on the 
online archive under https://repository.swisssign.com and is only available in 
the internal archive.

- For the SwissSign Silver CP/CPS with OID 2.16.756.1.89.1.3.1.7, the 
certificate profile for end user certificates for G22 in section 7.1.2.6 was 
still 2.16.756.1.89.1.3.1.6 instead of 2.16.756.1.89.1.3.1.7.
- For the SwissSign Silver CP/CPS with OID 2.16.756.1.89.1.3.1.8,
 i) the title page showed for this CP/CPS the OID is 2.16.756.1.89.1.3.7 
instead of 2.16.756.1.89.1.3.8 in contrast to section 1.2
 ii) the certificate profile for end user certificates for G22 in section 
7.1.2.6 was still 2.16.756.1.89.1.3.1.6 instead of 2.16.756.1.89.1.3.1.8
- By applying the certificates profiles out the CP/CPS correctly, SwissSign 
issued certificates with a reference to an OID that did not match the 
applicable valid CP/CPS for these certificates. Concretely: 
 i) between 15.09.2017 - 16.10.2017 under the wrong OID 2.16.756.1.89.1.3.1.6 
instead of  2.16.756.1.89.1.3.1.7.
 ii) between 16.10.2017 - 28.06.2018 under the wrong OID 2.16.756.1.89.1.3.1.6 
instead of  2.16.756.1.89.1.3.1.8.

As part of the risk impact analysis, all changes in the concerned CP/CPS were 
revisited. All changes were related either to a change in regulations not 
directly impacting the issued certificate (i.e. CT Log and CAA)  respectively 
to an audit finding requiring a statement on used key length and algorithms for 
the subscriber’s QCSD in the CP/CPS. Therefore, the risk analysis did not show 
any security impact for our customers nor for the community by further usage of 
these certificates. The detailed impact was shared with TÜV Trust IT to confirm 
our interpretation. We did not identify any relevant changes that would put the 
customer at risk by usage of the impacted certificates. 


2. A timeline of the actions your CA took in response. A timeline is a 
date-and-time-stamped sequence of all relevant events. This may include events 
before the incident was reported, such as when a particular requirement became 
applicable, or a document changed, or a bug was introduced, or an audit was 
done.

[May-14-2019 Post Ryan Sleevi] Notification of potential OID divergence in one 
of the CP/CPS Gold documents
[May-15-2019] Start of validation of potential issue
[May-17-2019] SwissSign validates the issue in the 2 CP/CPS Gold mentioned 
above.
[May-20-2019] Confirmation of issue on a partial set of certificates and 
decision to initiate a full analysis. Risk impact analysis recorded a formal 
issue triggering a revocation of the concerned certificates, no security impact 
for our customers nor for the community by further usage of these certificates 
was identified.
[May-21-2019] Information of auditor (TüV Trust IT) about issue.
[May-23-2019] Management Board acknowledged the issue and the associated risks.
[May-27-2019] First results of analysis syndicated and validated on Gold 
product line. Decision to extend analysis to Silver product line.
[May-29-2019] Results confirmed for Gold product line scope, information to the 
management board of the additional extend, information of the auditor about the 
need to post a misissuance report to Bugzilla.
[June-04-2019] Confirmation that Silver product line is also in scope of issue, 
Information of auditor about the additional scope
[June-07-2019] Proposal for staged revocation plan of the concerned 72430 
certificates until end of 2019 agreed SwissSign internally, discussed with 
auditor for agreement
[June-11-2019] Post on Bugzilla


3. Whether your CA has stopped, or has not yet stopped, issuing certificates 
with the problem. A statement that you have will be considered a pledge to the 
community; a statement that you have not requires an explanation.

Yes, the currently issued certificates have the correct OID. All CP/CPs after 
July 16, 2018 on Gold product line and after June 28, 2018 on Silver product 
line have the correct OID in the certificate profile in section 7.1.2.


4. A summary of the problematic certificates. For each problem: number of 
certs, and the date the first and last certs with that problem were issued.

Our two related roots for SwissSign's SSL and S/MIME certificate products are 
concerned:
The silver product line issued
- between 15.09.2017 - 16.10.2017 under the wrong OID 2.16.756.1.89.1.3.1.6 
instead of 2.16.756.1.89.1.3.1.7.
- between 16.10.2017 - 28.06.2018 under the wrong OID 2.16.756.1.89.1.3.1.6 
instead of 2.16.756.1.89.1.3.1.8.

The gold product line issued
- between 14.09.2017 - 12.10.2017 under the wrong OID 2.16.756.1.89.1.2.1.6 
instead of 2.16.756.1.89.1.2.1.7.
- between 12.10.2017 - 16.07.2018 under the wrong OID 2.16.756.1.89.1.2.1.6 
instead of 2.16.756.1.89.1.2.1.8.

In total, 72430 certificates as per June 11, 2019 are concerned.


5. The complete certificate data for the problematic certificates. The 
recommended way to provide this is to ensure each certificate is logged to CT 
and then list the fingerprints or crt.sh IDs, either in the report or as an 
attached spreadsheet, with one list per distinct problem.

Please check the Bugzilla post for a list of the certificates 
(https://bugzilla.mozilla.org/show_bug.cgi?id=1558552)


6. Explanation about how and why the mistakes were made or bugs introduced, and 
how they avoided detection until now.

Section 7.1 (Certificate Profiles) in CP/CPS had the wrong OID for leafs 
certificates.

Our analysis was not able to pinpoint a single event/task to explain the issue. 
As the update of the CP/CPS is a tedious manual process, we assume that the 
four eyes check updating the OID-parameter failed due to human error.

We therefore looked at the entire process of managing the CP/CPS and identified 
the following weaknesses:
- Change Control on the variable parameters is difficult to implement in the 
process as it has limited support in the used tooling (i.e. word editor). 
Variable parameters such as the OID in the certificate profile are prone to 
copy-paste errors in the process.
- Dual control tasks are not part of an end-to-end checklist which makes human 
error more likely.


7. List of steps your CA is taking to resolve the situation and ensure such 
issuance will not be repeated in the future, accompanied with a timeline of 
when your CA expects to accomplish these things.
 
SwissSign will execute a staged revocation of the concerned 72430 certificates 
until end of 2019.

SwissSign has already taken steps to address the introduced weaknesses. We will 
parametrize future CP/CPS in a way that parameters such as OID are centrally 
set in a template with no update possibility in the individual CP/CPS. The 
parameter fields will be constraint by rules for valid changes. In addition, we 
also enhance our current end-to-end checklist for the different process steps 
with special attention to dual control tasks.


The text above incl. the certificate list is additionally posted at Bugzilla: 
https://bugzilla.mozilla.org/show_bug.cgi?id=1558552
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to