Re: Pre-Incident Report - GoDaddy Serial Number Entropy

2019-03-15 Thread Daymion Reynolds via dev-security-policy
On Friday, March 15, 2019 at 12:53:15 PM UTC-7, Daymion Reynolds wrote: > On Friday, March 15, 2019 at 12:45:39 PM UTC-7, Ryan Sleevi wrote: > > On Fri, Mar 15, 2019 at 3:35 PM Daymion Reynolds via dev-security-policy < > > dev-security-policy@lists.mozilla.org> wrote: >

Re: Pre-Incident Report - GoDaddy Serial Number Entropy

2019-03-15 Thread Daymion Reynolds via dev-security-policy
On Friday, March 15, 2019 at 12:45:39 PM UTC-7, Ryan Sleevi wrote: > On Fri, Mar 15, 2019 at 3:35 PM Daymion Reynolds via dev-security-policy < > dev-security-policy@lists.mozilla.org> wrote: > > > > On Wednesday, March 13, 2019 at 8:17:00 PM UTC-4

Re: Pre-Incident Report - GoDaddy Serial Number Entropy

2019-03-15 Thread Daymion Reynolds via dev-security-policy
On Friday, March 15, 2019 at 12:35:47 PM UTC-7, Daymion Reynolds wrote: > On Friday, March 15, 2019 at 12:25:37 PM UTC-7, ad...@adamcaudill.com wrote: > > Daymion, > > > > (Apologies in advance if I've missed something that led to these results. > > These results rely on the crt.sh database,

Re: Pre-Incident Report - GoDaddy Serial Number Entropy

2019-03-15 Thread Daymion Reynolds via dev-security-policy
On Friday, March 15, 2019 at 12:25:37 PM UTC-7, ad...@adamcaudill.com wrote: > Daymion, > > (Apologies in advance if I've missed something that led to these results. > These results rely on the crt.sh database, which I will admit to being less > familiar with than I would like.) > > While

Re: Pre-Incident Report - GoDaddy Serial Number Entropy

2019-03-14 Thread Daymion Reynolds via dev-security-policy
On Thursday, March 14, 2019 at 3:13:51 PM UTC-7, Jaime Hablutzel wrote: > > 64bits_entropy = GetRandom64Bits() //This returns 64 random bits from a > > CSPRNG with at least one bit in the highest byte set to 1 > > > > is, strictly speaking, not true. The best possible implementation for > >

Re: Pre-Incident Report - GoDaddy Serial Number Entropy

2019-03-13 Thread Daymion Reynolds via dev-security-policy
On Thursday, March 7, 2019 at 7:01:41 PM UTC-7, Daymion Reynolds wrote: > As of 9pm AZ on 3/6/2019 GoDaddy started researching the 64bit certificate > Serial Number issue. We have identified a significant quantity of > certificates (> 1.8million) not meeting the 64bit serial number requirement.

Re: Pre-Incident Report - GoDaddy Serial Number Entropy

2019-03-12 Thread Daymion Reynolds via dev-security-policy
On Tuesday, March 12, 2019 at 11:32:38 AM UTC-7, Ryan Sleevi wrote: > On Tue, Mar 12, 2019 at 2:22 PM Daymion Reynolds via dev-security-policy < > dev-security-policy@lists.mozilla.org> wrote: > > > The crux of the difference is in the DER format interpretation. The fact >

Re: Pre-Incident Report - GoDaddy Serial Number Entropy

2019-03-12 Thread Daymion Reynolds via dev-security-policy
On Tuesday, March 12, 2019 at 9:54:56 AM UTC-7, ad...@adamcaudill.com wrote: > Daymion, > > You linked to a thread in m.d.s.p and cited it as confirming a specific > interpretation of 7.1 - as that's a long thread (with some possible > questionable information), could you possibly share what

Re: Pre-Incident Report - GoDaddy Serial Number Entropy

2019-03-12 Thread Daymion Reynolds via dev-security-policy
As of 9pm AZ on 3/6/2019 GoDaddy started researching the 64bit certificate Serial Number issue. Due to a m.d.s.p.[1] discussion validating an interpretation of BR 7.1 our revised count is approximately 12,152 live certificates not meeting the 64bit serial number requirement. Additionally, we

Re: EJBCA defaulting to 63 bit serial numbers

2019-03-11 Thread Daymion Reynolds via dev-security-policy
On Monday, March 11, 2019 at 8:57:27 AM UTC-7, Ryan Sleevi wrote: > I don’t think there’s anything inherently wrong with an approach that uses > a fixed prefix, whether of one bit or more, provided that there is at least > 64 bits of entropy included in the serial prior to encoding to DER. > >

Re: EJBCA defaulting to 63 bit serial numbers

2019-03-11 Thread Daymion Reynolds via dev-security-policy
On Saturday, March 9, 2019 at 5:15:50 PM UTC-7, Wayne Thayer wrote: > On Sat, Mar 9, 2019 at 12:49 PM Dimitris Zacharopoulos via > dev-security-policy wrote: > > > > > The question I'm having trouble answering, and I would appreciate if > > this was answered by the Mozilla CA Certificate Policy

Re: Pre-Incident Report - GoDaddy Serial Number Entropy

2019-03-08 Thread Daymion Reynolds via dev-security-policy
Our goal is to reissue all the certificates within the next 30 days. We have started the revocation process. We have a significant number of customers that use manual methods for managing their certificates, so being agile for them is difficult. We want to keep our customers using https through

Pre-Incident Report - GoDaddy Serial Number Entropy

2019-03-07 Thread Daymion Reynolds via dev-security-policy
As of 9pm AZ on 3/6/2019 GoDaddy started researching the 64bit certificate Serial Number issue. We have identified a significant quantity of certificates (> 1.8million) not meeting the 64bit serial number requirement. We are still performing accounting so certificate quantity is expected to

Re: GoDaddy Revocation Disclosure

2018-08-20 Thread Daymion Reynolds via dev-security-policy
d ensure such > issuance will not be repeated in the future, accompanied with a timeline of > when your CA expects to accomplish these things. > > - Wayne > > [1] https://wiki.mozilla.org/CA/Responding_To_An_Incident#Incident_Report > > On Mon, Aug 20, 2018 at 9:26 AM Daymion Reynolds

Re: GoDaddy Revocation Disclosure

2018-08-20 Thread Daymion Reynolds via dev-security-policy
On Saturday, August 18, 2018 at 2:27:05 PM UTC-7, Ben Laurie wrote: > On Fri, 17 Aug 2018 at 18:22, Daymion Reynolds via dev-security-policy < > dev-security-policy@lists.mozilla.org> wrote: > > > Revoke Disclosure > > > > GoDaddy has been proactivel

GoDaddy Revocation Disclosure

2018-08-17 Thread Daymion Reynolds via dev-security-policy
Revoke Disclosure GoDaddy has been proactively performing self-audits. As part of this process, we identified a vulnerability in our code that would allow our validation controls to be bypassed. This bug would allow for a Random Value that was generated for intended use with Method 3.2.2.4.6

Re: GoDaddy Revocations Due to a Variety of Issues

2018-07-23 Thread Daymion Reynolds via dev-security-policy
Jul 20, 2018 at 6:39 PM Daymion Reynolds via dev-security-policy < > dev-security-policy@lists.mozilla.org> wrote: > > > The certificates were identified by analyzing results from both zlint and > > certlint. We also verified all lint findings against current and past BRs.

GoDaddy Revocations Due to a Variety of Issues

2018-07-20 Thread Daymion Reynolds via dev-security-policy
Revoke Notification GoDaddy has been proactively auditing certificates under management. We have identified 1000 certificates having one or more of the 6 issues defined below. The majority of these certs are 3yrs old or older. Most are from 2013 or before. The certificates were identified

Malformed Certificate Revocation - Godaddy

2018-05-30 Thread Daymion Reynolds via dev-security-policy
CA first become aware: We first became aware of the malformed certificates https://crt.sh/?id=250008707=cablint,x509lint,zlint,ocsp & https://crt.sh/?id=49843724=zlint,cablint,x509lint,ocsp via a Bugzilla bug report on 5/18 and an email to practices@. Timeline of the actions: 5/18 1am

Re: Discovering unlogged certificates in internet-wide scans

2018-04-09 Thread Daymion Reynolds via dev-security-policy
As an FYI only: We did review the one cert cited below for term length. The certificate was issued in 2013 before the current max term duration was defined. This cert is grandfathered in and does not require revocation. In May of this year it expires. regards, Daymion On Sunday, April 1,

Incident Report : GoDaddy certificates with ROCA Fingerprint

2017-10-24 Thread Daymion Reynolds via dev-security-policy
Godaddy LLC first became aware of possible ROCA vulnerability exposure on Monday October 16th 2017 at 9:30am. The following are the steps we took for detection, revocation, and the permanent fix of certificate provisioning: • Monday October 16th 2017 AZ, first became aware of the ROCA