Here's the incident report: 
  
1.    How your CA first became aware of the problem (e.g. via a problem report 
submitted to your Problem Reporting Mechanism, via a discussion in 
mozilla.dev.security.policy, or via a Bugzilla bug), and the date. 
  
Post-linting self check.
  
2.    A timeline of the actions your CA took in response. 
  
A. Jan 18, 2019 - Investigation began. 
B. Jan 21, 2019 - Found impacted certificate policy template and blocked for 
further usage. 
C  Jan 21, 2019 - Certificate was revoked
D  Jan 21, 2019 - Vendor was contacted
E  Jan 23, 2019 - Received reconfiguration procedure from Vendor
F  Jan 23, 2019 - Fixed impacted certificate policy template. 
G. Jul 8, 2019 - This disclosure. 

  
3.    Confirmation that your CA has stopped issuing TLS/SSL certificates with 
the problem. 
  
Confirmed. 
  
4.    A summary of the problematic certificates. For each problem: number of 
certs, and the date the first and last certs with that problem were issued. 
  
1 Certficate
https://crt.sh/?id=1120102462&opt=zlint,ocsp
  
5.    The complete certificate data for the problematic certificates. The 
recommended way to provide this is to ensure each certificate is logged to CT 
and then list the fingerprints or crt.sh IDs, either in the report or as an 
attached spreadsheet, with one list per distinct problem. 
  
https://crt.sh/?id=1120102462&opt=zlint,ocsp
  
6.    Explanation about how and why the mistakes were made or bugs introduced, 
and how they avoided detection until now. 
  
The the incident concerns 1 certificate.
The root cause of this issue was pre-issuance linting configuration tests 
conducted to avoid certificate misissuance.
One test case was to create certificate registration policy with SCT extensions 
but the policy was intetionally not listed in configuration for CT logging.
The expected result of this tests was an error but it turned out that 
certificate was issued and logged.
After raWe got an explanation fom Vendor:
"This publication is due to the Default logging group.  Any RP configured for 
CT that isn't in a different group will be picked up by the default group"


Remediation items: 

1. Reviewed all certificate policy templates dedicated for test cases for 
ensuring that all of them are BR comliant and none of them contains problematic
   configuration.

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to