I have created bug #1622539 to track this issue.

- Wayne

On Fri, Mar 13, 2020 at 3:09 PM Sándor dr. Szőke via dev-security-policy <
[email protected]> wrote:

> 1. How your CA first became aware of the problem (e.g. via a problem
> report submitted to your Problem Reporting Mechanism, a discussion in
> mozilla.dev.security.policy, a Bugzilla bug, or internal self-audit), and
> the time and date.
> Microsec became aware of the problem from the new discussion at the
> mozilla.dev.security.policy
>
> https://groups.google.com/forum/#!topic/mozilla.dev.security.policy/jRKOr4nvOfY
>
> 2. A timeline of the actions your CA took in response. A timeline is a
> date-and-time-stamped sequence of all relevant events. This may include
> events before the incident was reported, such as when a particular
> requirement became applicable, or a document changed, or a bug was
> introduced, or an audit was done.
> 2019-10-02  2 precertificates were issued for internal testing purposes
> with short validity
> 2020-03-10  Microsec was informed about the faulty precertificates
> 2020-03-10  Microsec checked the faulty precertificates. They were already
> expired, so revocation was not possible.
> 2020-03-10  Microsec decided to immediately stop issuance of IVCP
> certificates until all corrective measures are in place, to prevent similar
> mistakes in the future
> 2020-03-10  Microsec decided to develop the CA software by adding further
> controls regarding the required fields of IVCP certificates to guarantee
> compliance with the certificate profile in the future
> 2020-03-13  Microsec deactivated all the IVCP profiles in the CA software
> to prevent issuance of IVCP certificates until the controls in the CA
> software are in place
> 2020-03-13  Microsec opened this incident report
>
> 3.Whether your CA has stopped, or has not yet stopped, issuing
> certificates with the problem. A statement that you have will be considered
> a pledge to the community; a statement that you have not requires an
> explanation.
> Two subordinate CA were affected. They haven’t been stopped, but the
> issuance of IVCP certificates has been suspended by informing the RA
> operators about the decision and by deactivating all the IVCP certificate
> profiles.
>
> 4. A summary of the problematic certificates. For each problem: number of
> certs, and the date the first and last certs with that problem were issued.
> There are 2 certificates involved.
> They were issued on the same day which was 2019-10-02
>
>
> 5. The complete certificate data for the problematic certificates. The
> recommended way to provide this is to ensure each certificate is logged to
> CT and then list the fingerprints or crt.sh IDs, either in the report or as
> an attached spreadsheet, with one list per distinct problem.
> The problematic certificates are:
> https://crt.sh/?id=1947655126&opt=zlint,ocsp
> https://crt.sh/?id=1947655112&opt=zlint,ocsp
>
> 6. Explanation about how and why the mistakes were made or bugs
> introduced, and how they avoided detection until now.
> Microsec made an investigation and could find the following:
> - the certification policy and practice statement contain the proper
> requirements regarding the content of the IVCP certificates
> - the problem was caused by human mistakes, the RA operators could not
> recognize the missing data
> - the CA software presently does not have automatic controls to check for
> the existence of the required fields in case of IVCP certificates
> - the certificates have been checked by cablint, but cablint did not
> indicate this fault
> - the certificates have never been published and used, so the fault has
> not been discovered until now
>
> 7. List of steps your CA is taking to resolve the situation and ensure
> such issuance will not be repeated in the future, accompanied with a
> timeline of when your CA expects to accomplish these things.
> Microsec decided the following measures to avoid having the same problem
> in the future.
> - the problematic precertificates were issued for short period and have
> already expired, so revocation is not necessary
> - suspended the issuance of the IVCP certificates with immediate effect
> - decided to develop the CA software to add further controls and checks in
> case of IVCP certificates - no deadline has been set due to the COVID-19
> situation
> - decided to hold a training about the required IVCP profiles for the RA
> operators before enabling the issuance of IVCP certificates again
> - the issuance of IVCP certificates may be continued only after the
> successful testing of the upgraded CA software
> - Microsec will check all the issued IVCP certificates looking for similar
> issues - deadline 2020-03-20
> - Microsec will review the CA software looking for possible similar
> problems - deadline 2020-03-31
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to