On Mon, 24 Oct 2022 at 14:06, Filippo Valsorda <[email protected]>
wrote:

> Hi,
>
> For what it's worth, I think this kind of intentional end-to-end testing
> is good, and what testing CT logs and roots are for. Like negative tests,
> it demonstrates your pipeline actually works (and is not rejecting the bad
> certificates just because it's broken), and as a side effect it allowed us
> to test the community's ability to catch certificates issued from bad
> public keys.
>
> I'm mentioning this because I want you and other CAs to feel encouraged
> to, not discouraged from, this kind of testing.
>
> Agreed on maybe surfacing public trust information in crt.sh, which is
> available behind the Issuer click. https://crt.sh/?caid=251252
>

Agreed/


>
>
> Cheers,
> Filippo
>
> 2022-10-24 14:05 GMT+02:00 'Lahtiharju, Pekka' via
> [email protected] <[email protected]>:
>
> Hi Ben,
>
>
>
> We are not using Debian at all. We just took one random vulnerable key
> from vulnerable key archive from Debian weak key list because we wanted to
> test what will happen in our test code with such key. The purpose of this
> test was to use seriously bad key when bypassing our normal ways to detect
> and prevent it.
>
>
>
> We didn’t expect this test key/certificate to go to any CT log that is
> used for CT monitoring.
>
>
>
> Br Pekka
>
>
>
> *From:* Ben Laurie <[email protected]>
> *Sent:* maanantai 24. lokakuuta 2022 12.04
> *To:* Lahtiharju, Pekka <[email protected]>
> *Cc:* Hanno Böck <[email protected]>; [email protected]
> *Subject:* Re: Certificate with Debian OpenSSL bug issued
>
>
>
>
>
>
>
> On Mon, 24 Oct 2022 at 07:07, 'Lahtiharju, Pekka' via
> [email protected] <[email protected]> wrote:
>
> Hi Hanno,
>
> This is not publicly trusted TLS certificate but only Telia's test
> certificate. Issuer is our test issuer "Telia PreProd Server CA v3" (not
> publicly trusted).
>
> Telia was testing new Badkeys/Lint implementation and we wanted to do also
> one test without Badkeys/Lint with vulnerable key to see if anything else
> would prevent such key. According to our information CT log "Dodo" that was
> used is non-production CT log and could be used for such tests with
> non-trusted TLS certificates (Mammoth and Sabre are Sectigo's production CT
> logs). I hope this kind of testing is OK? Or should we keep such test
> certificates internal only without any CT publishing?
>
>
>
> The certificate aside, having the problem suggests you were running a very
> ancient version of Debian - is that wise, even in test environments?
>
>
>
>
> Best Regards
>
> Pekka Lahtiharju
> Senior Development Manager | Trust Services
> Telia Finland
> +358407061299 <+358%2040%207061299>
> [email protected]
> www.telia.fi
> Telia Finland Oyj, Helsinki 1475607-9
>
>
>
> -----Original Message-----
> From: [email protected] <[email protected]>
> On Behalf Of Hanno Böck
> Sent: sunnuntai 23. lokakuuta 2022 16.15
> To: [email protected]
> Subject: Certificate with Debian OpenSSL bug issued
>
> Hi,
>
> A few days ago a certificate with a key vulnerable to the 2008 Debian
> OpenSSL bug was issued by Telia:
> https://crt.sh/?id=7799145606
>
> It's a 4096 bit RSA key generated with a vulnerable debian version on
> 64 bit.
>
> --
> Hanno Böck
> https://hboeck.de/
>
> --
> You received this message because you are subscribed to the Google Groups "
> [email protected]" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> To view this discussion on the web visit
> https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/20221023151433.7002479b%40computer
> .
>
> This email may contain information which is privileged or protected
> against unauthorized disclosure or communication. If you are not the
> intended recipient, please notify the sender and delete this message and
> any attachments from your system without producing, distributing or
> retaining copies thereof or disclosing its contents to any other person.
>
> Telia Company processes emails and other files that may contain personal
> data in accordance with Telia Company’s Privacy Policy<
> https://www.teliacompany.com/en/about-the-company/privacy/>.
>
>
> --
> You received this message because you are subscribed to the Google Groups "
> [email protected]" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> To view this discussion on the web visit
> https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/AS1PR07MB8688F4317AE188F9EFCE44C1E12E9%40AS1PR07MB8688.eurprd07.prod.outlook.com
> .
>
>
> --
> You received this message because you are subscribed to the Google Groups "
> [email protected]" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> To view this discussion on the web visit
> https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/AS1PR07MB8688A78506942360543FF0D4E12E9%40AS1PR07MB8688.eurprd07.prod.outlook.com
> <https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/AS1PR07MB8688A78506942360543FF0D4E12E9%40AS1PR07MB8688.eurprd07.prod.outlook.com?utm_medium=email&utm_source=footer>
> .
>
>
> --
> You received this message because you are subscribed to the Google Groups "
> [email protected]" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> To view this discussion on the web visit
> https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/6a844802-74ac-4026-8e32-72dd083fd506%40app.fastmail.com
> <https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/6a844802-74ac-4026-8e32-72dd083fd506%40app.fastmail.com?utm_medium=email&utm_source=footer>
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CABrd9SSLr0rPYPg7v5L0W1%3DEtfJnjN98KKut3uS0wCx2YWKdxQ%40mail.gmail.com.

Reply via email to