We just published
https://blog.cloudflare.com/unauthorized-issuance-of-certificates-for-1-1-1-1/

Best,

 Bas

On Wed, Sep 3, 2025 at 10:41 PM Bas Westerbaan <b...@cloudflare.com> wrote:

> Hi all,
>
> Quick message to confirm that Fina CA did not have our permission to
> publish these certificates. After seeing the certificate-policy email,
> we've immediately reached out to them, Microsoft and their TSP supervisory
> body. We take this lapse very seriously. We've been busy investigating,
> including checking if there are any other certificates misissued for our
> domains. We're preparing a blog to share our findings soon.
>
> Best,
>
>  Bas
>
> On Wed, Sep 3, 2025 at 8:23 PM 'Ben Wilson' via
> dev-security-policy@mozilla.org <dev-security-policy@mozilla.org> wrote:
>
>> Thank you, Youfu, for bringing this to the community’s attention.
>>
>> This CA has never been part of the Mozilla Root Program, and their
>> certificates have never been trusted by Firefox. However, we are happy to
>> facilitate continued discussion on dev-security-policy as it is clearly
>> relevant to the community as a whole.
>>
>> Whilst we recognize Fina CA is not part of our root program, we also
>> agree that it would be extremely beneficial for Fina to file an incident
>> report in accordance with this guidance from the CCADB:
>> https://www.ccadb.org/cas/incident-report.
>>
>>
>> Ben
>>
>>
>> On Wed, Sep 3, 2025 at 9:32 AM Youfu Zhang <zhangyo...@gmail.com> wrote:
>>
>>> Hello,
>>>
>>> This is a public report of several certificates issued by Fina RDC
>>> 2020 that appear to be mis-issued. These certificates contain the
>>> Subject Alternative Name (SAN) iPAddress:1.1.1.1.
>>>
>>> The IP address 1.1.1.1 is a well-known public DNS resolver operated by
>>> Cloudflare, in partnership with APNIC. It is highly unlikely that the
>>> certificate subscribers demonstrated control over this IP address as
>>> required by the CA/Browser Forum Baseline Requirements.
>>>
>>> Three of the discovered certificates are still valid as of today,
>>> September 3, 2025.
>>>
>>> Mis-issued Certificates:
>>>
>>> 1. Serial Number: d3:16:7e:fd:77:ca:d7:59:00:00:00:00:5f:c7:c6:72
>>>    Subject CN: test1.hr
>>>    SAN:
>>>    - dNSName:test1.hr
>>>    - dNSName:test12.hr
>>>    - iPAddress:1.1.1.1
>>>    crt.sh: https://crt.sh/?id=18603461241
>>>    Censys:
>>> https://platform.censys.io/certificates/8abd30c3c154a4be2a1f82e2c0e96a7d4328320f743cc629778455a76632ceee
>>>
>>> 2. Serial Number: f9:72:55:2d:6a:c0:88:28:00:00:00:00:5f:c8:6f:4d
>>>    Subject CN: test1.hr
>>>    SAN:
>>>    - dNSName:test1.hr
>>>    - dNSName:test11.hr
>>>    - iPAddress:1.1.1.1
>>>    crt.sh: https://crt.sh/?id=19749721864
>>>    Censys:
>>> https://platform.censys.io/certificates/379d358af1a38f8b06866ea3342b15909ec566b5cd2404fda34fecfe07643abf
>>>
>>> 3. Serial Number: be:b8:ef:1b:1c:6c:ff:53:00:00:00:00:5f:c8:cd:e5
>>>    Subject CN: test11.hr
>>>    SAN:
>>>    - dNSName:test11.hr
>>>    - dNSName:test12.hr
>>>    - iPAddress:1.1.1.1
>>>    crt.sh: https://crt.sh/?id=20582951233
>>>    Censys:
>>> https://platform.censys.io/certificates/d42b028468e73795365102058cbcd350ad0a0b9ca7073c5362a570c5ec208a92
>>>
>>> Relevant Certificate Authority:
>>>
>>> These precertificates were issued by Fina RDC 2020
>>> (https://crt.sh/?caid=201916), which is a subordinate CA of Fina Root
>>> CA (https://crt.sh/?caid=100631).
>>>
>>> Fina Root CA is trusted by The Microsoft Root Certificate Program.
>>>
>>> Apparent Violations:
>>>
>>> This issuance appears to violate both the CA/Browser Forum's
>>> requirements and Fina's own stated policies.
>>>
>>> 1. CA/Browser Forum TLS Baseline Requirements (v2.1.7), Section
>>> 7.1.2.7.12:
>>>
>>> The entry MUST contain the IPv4 or IPv6 address that the CA has
>>> confirmed the Applicant controls or has been granted the right to use
>>> through a method specified in Section 3.2.2.5.
>>>
>>> 2. Fina RDC 2020 Certificate Policy (v1.12), Section 3.2.2.4:
>>>
>>> For each IP Address listed in certificate application Fina shall
>>> verify, as of the date the certificate was issued, the right to use
>>> and control the IP Address by the Legal person submitting the
>>> certificate application.
>>> This verification shall be done in accordance with the methods
>>> specified in the CA/Browser Forum BRG document.
>>>
>>> I request that Fina investigate this matter, revoke any active
>>> non-compliant certificates, and provide a public incident report in a
>>> timely manner.
>>>
>>> ---
>>>
>>> Best regards,
>>> Youfu Zhang
>>>
>>> --
>>> You received this message because you are subscribed to the Google
>>> Groups "dev-security-policy@mozilla.org" group.
>>> To unsubscribe from this group and stop receiving emails from it, send
>>> an email to dev-security-policy+unsubscr...@mozilla.org.
>>> To view this discussion visit
>>> https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CAEKhA2zDcVuKi1KVnMOwgjyQ2T9rv7sCFCYG0gwozLU9f7p4vQ%40mail.gmail.com
>>> .
>>>
>> --
>> You received this message because you are subscribed to the Google Groups
>> "dev-security-policy@mozilla.org" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to dev-security-policy+unsubscr...@mozilla.org.
>> To view this discussion visit
>> https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaaJHMvabX-kpn0q-kRfs6e8cDxkPw828zum-CMpr1oYHA%40mail.gmail.com
>> <https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CA%2B1gtaaJHMvabX-kpn0q-kRfs6e8cDxkPw828zum-CMpr1oYHA%40mail.gmail.com?utm_medium=email&utm_source=footer>
>> .
>>
>

-- 
You received this message because you are subscribed to the Google Groups 
"dev-security-policy@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to dev-security-policy+unsubscr...@mozilla.org.
To view this discussion visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CAMjbhoW%3DdFEstCwUhEoKiRqnG3Tiagiwafc4GswX%3DxwP%2BL5EGw%40mail.gmail.com.

Reply via email to