On Tue, May 5, 2020 at 12:35 PM sandybar497--- via dev-security-policy
<[email protected]> wrote:
>
> I submitted a compromised key report to Sectigo [[email protected]] on 1 
> May 2020 at 2:03pm UTC but Sectigo failed to revoke the certificate per 
> cab-forum guidelines [4.9.1.1. Reasons for Revoking a Subscriber Certificate].
>
> Upon submitting my report [case ref: _00D1N2Ljih._5003l11VztU], I received an 
> automated response at 1 May 2020 at 2:03pm UTC and the first human response 
> came 4 hours later on 1 May 2020 at 6:24pm UTC with what I believe was an 
> incorrect assessment and failure to carefully review the evidence provided. 
> The impacted certificate as of writing this post is still not revoked.
>
> The certificate in question: https://crt.sh/?id=2081585376
>
> A CSR signed by the original private key was provided with the following 
> subject details as evidence of possession:
> CN = The key that signed this CSR has been publicly disclosed.
> O = Compromised Key
>
> The response I received from Sectigo failed to demonstrate competency to deal 
> with report and instead made references to the commonName attribute as being 
> a problem, however without providing any form of explanation as to what is 
> wrong with it? Additionally, Sectigo referred to pwnedkeys as some sort of 
> authority that they say it’s not compromised. However, I suspect what Sectigo 
> staff really meant is they were unable to find the spki sha256 fingerprint 
> against pwnedkeys database but I don’t see how that means anything or why 
> they are checking pwnedkeys when the evidence was attached along with the 
> report. The necessary evidence was provided to Sectigo and they have thus far 
> failed to deal with the evidence or clearly articulate reasons for concluding 
> this case to not be a compromise.
>
> I have sent further emails to Sectigo over 24 hours ago requesting their 
> decision to be carefully reviewed and have still not received a reply. I 
> suspect my case was closed and response went into a blackhole.
>
> I would like to request Sectigo to again review this matter, revoke the 
> certificate and provide an incident report.

Thanks for sharing this. Could I ask you to post the CSR and/or
evidence you shared somewhere?

Mostly to help confirm that indeed, Sectigo did make the wrong call,
and that this is an incident :) I was in the process of writing up the
Bugzilla bug and realized it probably makes sense to do a little due
diligence myself. Sectigo is expected to be watching this mailing list
and can also respond (and open the Bugzilla incident). I just didn't
recognize your e-mail / past posts, and so wanted to at least confirm
before making noise :)
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to