RE: Public Discussion of GlobalSign's CA Inclusion Request for R46, E46, R45 and E45 Roots

2021-02-12 Thread Arvid Vermote via dev-security-policy
Hi Nick 

We attached an updated version of the affected certificate overview to the
bug on February 10, which does contain the date of order and date of
issuance. 

Thanks

Arvid

> -Original Message-
> From: dev-security-policy 
On
> Behalf Of Nick Lamb via dev-security-policy
> Sent: donderdag 11 februari 2021 19:12
> To: dev-security-policy@lists.mozilla.org
> Cc: Ben Wilson 
> Subject: Re: Public Discussion of GlobalSign's CA Inclusion Request for
R46,
> E46, R45 and E45 Roots
> 
> On Tue, 9 Feb 2021 14:29:15 -0700
> Ben Wilson via dev-security-policy
>  wrote:
> 
> > All,
> > GlobalSign has provided a very detailed incident report in Bugzilla -
> > see https://bugzilla.mozilla.org/show_bug.cgi?id=1690807#c2.
> > There are a few remaining questions that still need to be answered, so
> > this email is just to keep you aware.
> > Hopefully later this week I'll be able to come back and see if people
> > are satisfied and whether we can proceed with the root inclusion
> > request.
> 
> I have a question (if I should write it in Bugzilla instead please say so
it is unclear
> to me what the correct protocol is)
> 
> GlobalSign have provided a list of 112 other certificates which were
issued for the
> same reason, I examined some of them manually and determined that they are
in
> appearance unextraordinary (2048-bit RSA keys for example) and so it's
> unsurprising we didn't notice they were issued previously.
> 
> However, the list does not tell me when these certificates were ordered
or, if
> substantially different, when the email used to "validate" these orders
was sent.
> 
> As a result it's hard to be sure whether these certificates were issued
perhaps
> only a few weeks after they were ordered, which is a relatively minor
oversight,
> or, like the incident certificate, many years afterwards. I'd like maybe a
column of
> "order date" and "email sent date" if the two can be different.
> 
> -
> 
> I also have noticed something that definitely isn't (just) for GlobalSign.
It seems to
> me that the current Ten Blessed Methods do not tell issuers to prevent
robots
> from "clicking" email links. We don't need a CAPTCHA, just a "Yes I want
this
> certificate" POST form ought to be enough to defuse typical "anti-virus",
"anti-
> malware" or automated crawling/ cache building robots. Maybe I just missed
> where the BRs tell you to prevent that, and hopefully even without
prompting all
> issuers using the email-based Blessed Methods have prevented this,
> 
> 
> Nick.
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy


smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Notice on SC31 and CAs using EJBCA

2020-09-18 Thread Arvid Vermote via dev-security-policy
During gap analysis and impact assessment of the changes to the BR in the
context of SC31 - Browser Alignment, we noted that our legacy platform,
using EJBCA as issuance backend, did not fully support the changes related
to not including the "Unspecified" reason code in OCSP responses for the
certificates that are revoked with that reason. Refer to BR 1.7.1 section
7.3 and 7.2.2, this specific requirement is effective as of September 30
2020.

 

We raised the issue with PrimeKey and EJBCA version 7.4.2 was released on
September 14 2020. This message is intended to inform other CA using EJBCA
software and subject to BR of the above.



smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: Verifying Auditor Qualifications

2020-07-20 Thread Arvid Vermote via dev-security-policy
ACAB'c is a group of a few eIDAS CABs working together for reasons, they do not 
represent all eIDAS CABs neither do they have any recognized or official 
function within the eIDAS ecosystem. 

Can the ACAB'c member list be relied upon as being accurate and providing 
correct and latest information on the accreditation status of member CABs? It’s 
a manual list maintained based on membership applications and their acceptance. 
Isn't the only current accurate source of accredited eIDAS CAB the 20+ 
governmental NABs of participating EU countries that are designated to accredit 
and supervise eIDAS CAB?

Without any visible added value or clear and transparent insights on what 
supervisory function they perform within the context of the WebPKI ecosystem 
(filtering which eIDAS CAB and reports are acceptable/qualitiative?), why would 
a specific subset of eIDAS CAB be promoted over other eIDAS CAB? Parties that 
are interested in becoming a WebPKI CA or maintaining that status often go look 
at root program requirements as a first source to understand what needs to be 
done, including what audit attestations that need to be obtained and which 
parties can provide these. 

I have difficulties understanding what current reason there is to refer to the 
ACAB'c and why the "simplified check" seems to suggest only ACAB'c member audit 
reports are accepted. 

> -Original Message-
> From: dev-security-policy  On
> Behalf Of Nicholas Knight via dev-security-policy
> Sent: maandag 13 juli 2020 15:31
> To: mozilla-dev-security-pol...@lists.mozilla.org
> Subject: Re: Verifying Auditor Qualifications
> 
> It seems exceptionally strange to me that what, from all appearances, is a 4 
> year
> old advocacy body for auditors could be considered an authoritative source.
> ACAB’c does not seem to have done anything at all to acquire the extremely 
> high
> level of credibility such a source needs.
> 
> The idea that an association of auditors can’t keep its website and charter 
> up to
> date does nothing to dispel doubt, and is in fact evidence that ACAB’c is not
> capable of its claimed functions.
> 
> I see no browsers or anyone else can rely on ACAB’c, or should. It was not 
> formed
> for that purpose and there is no evidence it even understands that purpose. I
> suggest that if they intend to perform this function, it is necessary to 
> start over
> with a new organization with a new charter and new leadership.
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy


smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: SECURITY RELEVANT FOR CAs: The curious case of the Dangerous Delegated Responder Cert

2020-07-03 Thread Arvid Vermote via dev-security-policy
GlobalSign recognizes the reported security issue and associated risk, and
is working on a plan to remediate the impacted CA hierarchies with first
priority on terminating those branches that include issuing CA with private
keys outside of GlobalSign's realm. We will soon share an initial plan on
our Bugzilla ticket https://bugzilla.mozilla.org/show_bug.cgi?id=1649937.

One question we have for the root store operators specifically is what type
of assurance they are looking for on the key destruction activities. In the
past we've both done key destruction ceremonies without and with (e.g. in
the case of addressing a compliance issue like
https://bugzilla.mozilla.org/show_bug.cgi?id=1591005) an external auditor
witnessing the destruction and issuing an independent ISAE3000 witnessing
report.

> -Original Message-
> From: dev-security-policy 
On
> Behalf Of Ryan Sleevi via dev-security-policy
> Sent: woensdag 1 juli 2020 23:06
> To: mozilla-dev-security-policy

> Subject: SECURITY RELEVANT FOR CAs: The curious case of the Dangerous
> Delegated Responder Cert
> 
> I've created a new batch of certificates that violate 4.9.9 of the BRs,
which was
> introduced with the first version of the Baseline Requirements as a MUST.
This is
> https://misissued.com/batch/138/
> 
> A quick inspection among the affected CAs include O fields of: QuoVadis,
> GlobalSign, Digicert, HARICA, Certinomis, AS Sertifitseeimiskeskus,
Actalis,
> Atos, AC Camerfirma, SECOM, T-Systems, WISeKey, SCEE, and CNNIC.
> 
> Section 4.9.9 of the BRs requires that OCSP Delegated Responders MUST
> include an id-pkix-ocsp-nocheck extension. RFC 6960 defines an OCSP
> Delegated Responder within Section 4.2.2.2 as indicated by the presence of
the
> id-kp-OCSPSigning as an EKU.
> 
> These certificates lack the necessary extension, and as such, violate the
BRs. As
> the vast majority of these were issued on-or-after 2013-02-01, the
Effective Date
> of Mozilla Root CA Policy v2.1, these are misissued. You could also
consider the
> effective date as 2013-05-15, described later in [1] , without changing
the results.
> 
> This batch is NOT comprehensive. According to crt.sh, there are
approximately
> 293 certificates that meet the criteria of "issued by a Mozilla-trusted,
TLS-capable
> CA, with the OCSPSigning EKU, and without pkix-nocheck". misissued.com had
> some issues with parsing some of these certificates, due to other non-
> conformities, so I only included a sample.
> 
> Censys.io is aware of approximately 276 certificates that meet this
criteria, as you
> can see at [2]. The differences in perspectives underscores the importance
of
> CAs needing to carefully examine the certificates they've issued to
understand.
> 
> It's important for CAs to understand this is Security Relevant. While they
should
> proceed with revoking these CAs within seven (7) days, as defined under
the
> Baseline Requirements Section 4.9.1.2, the degree of this issue likely
also
> justifies requiring witnessed Key Destruction Reports, in order to
preserve the
> integrity of the issuer of these certificates (which may include the CA's
root).
> 
> The reason for this is simple: In every case I examined, these are
certificates that
> appear to nominally be intended as Issuing CAs, not as OCSP Responder
> Certificates. It would appear that many CAs were unfamiliar with RFC 6960
when
> constructing their certificate profiles, and similarly ignored discussion
of this issue
> in the past [3], which highlighted the security impact of this. I've
flagged this as a
> SECURITY matter for CAs to carefully review, because in the cases where a
> third-party, other than the Issuing CA, operates such a certificate, the
Issuing CA
> has delegated the ability to mint arbitrary OCSP responses to this
third-party!
> 
> For example, consider a certificate like https://crt.sh/?id=2657658699 .
> This certificate, from HARICA, meets Mozilla's definition of "Technically
> Constrained" for TLS, in that it lacks the id-kp-serverAuth EKU. However,
> because it includes the OCSP Signing EKU, this certificate can be used to
sign
> arbitrary OCSP messages for HARICA's Root!
> 
> This also applies to non-technically-constrained sub-CAs. For example,
consider
> this certificate https://crt.sh/?id=21606064 . It was issued by DigiCert
to
> Microsoft, granting Microsoft the ability to provide OCSP responses for
any
> certificate issued by Digicert's Baltimore CyberTrust Root. We know from
> DigiCert's disclosures that this is independently operated by Microsoft.
> 
> Unfortunately, revocation of this certificate is simply not enough to
protect Mozilla
> TLS users. This is because this Sub-CA COULD provide OCSP for itself that
> would successfully validate, AND provide OCSP for other revoked sub-CAs,
even
> if it was revoked. That is, if this Sub-CA's key was maliciously used to
sign a
> GOOD response for itself, it would be accepted.
> These security concerns are discussed in Section 4.2.2.2.1 of RFC 

RE: Verifying Auditor Qualifications

2020-06-04 Thread Arvid Vermote via dev-security-policy
Hi Kathleen

Related to the below it would be helpful if the WebTrust organization would 
disclose additional details on the licensed WebTrust practitioners: right now 
there is no data publicly available on historical WebTrust auditor licensing. 
We don't know as of when an auditor has been licensed and as far as I am aware 
there is no overview of auditors that did not renew, withdrew or had their 
license revoked. Having such a list would certainly help CAs in the auditor 
selection process and better monitoring of auditor qualifications. 

The Dutch NAB has an excellent inventory of their suspensions and withdrawals 
of accreditations: 
https://www.rva.nl/en/accredited-organisations/suspended-withdrawals. We think 
everyone would benefit from the WebTrust task force / CPA Canada maintaining a 
similar public inventory.

Thanks

Arvid

> -Original Message-
> From: dev-security-policy  On
> Behalf Of Kathleen Wilson via dev-security-policy
> Sent: donderdag 4 juni 2020 1:21
> To: mozilla-dev-security-pol...@lists.mozilla.org
> Subject: Verifying Auditor Qualifications
> 
> All,
> 
> It recently came to my attention that I need to be more diligent in verifying 
> auditor
> qualifications. Therefore, we have added a field in the CCADB called “Date
> Qualifications Verified” (on Auditor Location objects), which will be used to 
> remind
> root store operators to check each auditor’s qualifications every year. This 
> field
> can only be edited by a root store operator, and we will enter this date 
> whenever
> we confirm that the auditor is still qualified to perform ETSI or WebTrust 
> audits.
> 
> Some of you may notice that your Audit Case or Root Inclusion Case has the
> message: “Auditor Verification Date is blank”. This warning message is 
> intended
> to remind root store operators that we need to verify the auditor's 
> qualifications. In
> the future you may also notice a warning message when the date in that field 
> is
> over a year old, reminding us root store operators to re-verify the auditor's
> qualifications.
> 
> I will greatly appreciate your input on the following new wiki page section,
> especially in regards to verifying auditor qualifications.
> 
> https://wiki.mozilla.org/CA/Audit_Statements#Auditor_Qualifications
> 
> Thanks,
> Kathleen
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy


smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: GlobalSign: Failure to revoke certificate with compromised private key within 24 hours

2020-03-10 Thread Arvid Vermote via dev-security-policy
An incident report was created for this yesterday:
https://bugzilla.mozilla.org/show_bug.cgi?id=1620922

> -Original Message-
> From: dev-security-policy 
On
> Behalf Of Matt Palmer via dev-security-policy
> Sent: dinsdag 10 maart 2020 1:41
> To: dev-security-policy@lists.mozilla.org
> Subject: GlobalSign: Failure to revoke certificate with compromised
private key
> within 24 hours
> 
> A certificate with a publicly-disclosed private key was reported to
GlobalSign for
> revocation within the BR-mandated 24 hour period, however the revocation
took
> place over 46 hours after the report was sent.  Several requests for
information I
> had already provided were made by GlobalSign, however the revocation
eventually
> took place without any further information being required.  Communication
from
> GlobalSign then appeared to suggest that the certificate had "already"
been
> revoked, despite timestamps in the CRL indicating otherwise.
> 
> I believe an incident report for this event is warranted, given that
GlobalSign was
> provided with sufficient information to revoke the certificate in the
initial problem
> report (based on the fact that revocation eventually took place with no
further
> information being provided by myself), but failed to do so within the
BR-mandated
> time period.
> 
> Excuciatingly detailed timeline follows.
> 
> 2020-03-06 21:48:53Z E-mail sent to report-ab...@globalsign.com:
> 
> -8<-
> Date: Sat, 7 Mar 2020 08:48:53 +1100
> From: Matt Palmer 
> To: report-ab...@globalsign.com
> Subject: Problem Report for certificate(s) with compromised private key
> 
> One or more certificates issued by your CA are using a private key which
has been
> publicly disclosed.  The list of affected certificates can be retrieved
from
> 
> https://crt.sh/?spkisha256=6a02703a7a2ba3f368a2915305383549cf8ada826242269
> 7d62d5ba410e4d93f
> 
> Included below is a CSR, signed by the compromised private key,
demonstrating
> proof of possession:
> 
> -BEGIN CERTIFICATE REQUEST-
> MIIE0TCCArkCAQAwgYsxaTBnBgNVBAMMYFRoZSBrZXkgdGhhdCBzaWduZWQg
> dGhp
> cyBDU1IgaGFzIGJlZW4gcHVibGljbHkgZGlzY2xvc2VkLiBJdCBzaG91bGQgbm90
> IGJlIHVzZWQgZm9yIGFueSBwdXJwb3NlLjEeMBwGA1UECgwVaHR0cHM6Ly9wd2
> 5l
> ZGtleXMuY29tMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA2OMM6yti
> 3q+GhnZsMPYrACVrZWYqn2yz2fH5J6kPONDvHm3P4UgPJb5j0OFUbmng3e41Fw
> Wf
> QhD7UFbiEtH/fCJLnxuhAlCBZkVTwIBIwIYRpBmSp/shtNBJZvHBPgktF78qQBr5
> HaX9jZOl/z0rLVw42wnzHlMyyeJNCQzBgRqA+Lcgig/9I2qxQvm3C53868i0EE3k
> B418D63cEhz6hldoxELt7twoYulwyLk/PXWj/I0qHQZGT1weLD6UXINuxhmcFUDj
> 4i5V9UqNWhP4LT/QWjNtqE5y1OOT5qtkczjmSd3TS3GCik3o7v2M7JxwME1T/e/z
> unTqhCarZF3HkrN5MxDB/28HsPaSRUpbxzmIUt+GApuVjNWnRW0awlzp8i5wQnmo
> x7nNtSSht44DhlWETpPeT3n27LKM64no97aN0NS0LEKc5sFuOcS5sCj5FvsxNm/8
> RhqfQkHXjkhZByTPhYvkQZTTA8Gxsh52Pnr0aTKrNz/fNpcJWzlKvbSmQn7i1Nmn
> z6f9cTB3gW9+DjgSq/XjgVZJdGAWD9k5/i+v8b0zSbpprGNh2gkn39QYmWLlS2eu
> XhtAhdWAroEBxm5pLA3T50KWcfM1IHsZSHIeneIcR3anUhqnA1vMjZdFdFkX+TCE
> n/c6cotq/fESE+ieMdc7NjpTn4w2a+10xHECAwEAAaAAMA0GCSqGSIb3DQEBCw
> UA
> A4ICAQCnPqJFlaTaNTz0ldS+PepRa8cpf4DXJ/shKBf8ChJ7ivY8+Q6qQWLU4WTM
> DSChT+5K2Zlr5LRoIBeTsgyl3345agsPI8BKjw1OpRlxgVsMKlKOd6nCSJPw2NDl
> +Ud+s/LbnZJsIn9nb4fQdF+mC4L6Q1GikCkTfQ1SD8RykVgwojiQFwsdaNRy1U2z
> uw3QtlYXZ1s/zdgEITBB4x5js1r8+njue3X4hbgmTrnppEpxeaiuKIImLxFCOveo
> pv6evi9g8mYCZ2hqvLO2RTO3iTSvbDAgbImr6D0Asem1qdCdNPbhiGXj/kxJNNUQ
> P5hb1KmbcdCLIjvMz0+Z6TkIW0q4MowUpUeKx8Y18Pjt9D+nLN9sRLi8vfjvlnt4
> eLENX2156CWMmJQg4n16UjYKaf6dSCvWJYC2TzYJzs+ZEKU71LCkUl/hdj7ZNLtZ
> o3Z3C892nPZ56LdJES2wBMFgfMV5EWo4MrriFO7yhpkVp3NlOWkWVjIuTPDsm0g
> K
> fLVgHQPfgpVR6LT/e2HWISdiogUrACsVFrb5vfehXY2PAewPghkD5Cn3LG6hnXYn
> hmjgXDwz2dK5ud3ABJT1UxJtn82o3z3okUDISdeioxw43HBhCQ84p3G+JoRq9x6+
> 2ncweNmCQQ66tsX386ywKpPQJ4/1DrRsOKdSSy7siwwtR437Rg==
> -END CERTIFICATE REQUEST-
> 
> Please revoke all affected certificates within 24 hours, as per the
Baseline
> Requirements.
> 
> - Matt
> ->8-
> 
> 2020-03-06 21:49:04Z E-mail is accepted for delivery by a GlobalSign MX:
> 
> -8<-
> Mar  6 21:49:04 minotaur postfix/smtp[26026]: 75BC71857EE:
> to=,
> relay=globalsign-com.mail.protection.outlook.com[104.47.93.36]:25,
> delay=6.8, delays=0.47/0.01/0.9/5.4, dsn=2.6.0, status=sent (250 2.6.0
> <20200306214853.kpohtnh5y2m3k...@hezmatt.org> [InternalId=34857954577034,
> Hostname=HK0PR03MB2755.apcprd03.prod.outlook.com] 10967 bytes in 3.479,
> 3.078 KB/sec Queued mail for delivery)
> ->8-
> 
> 2020-03-06 21:49:15Z Auto-ack e-mail received from GlobalSign:
> 
> -8<-
> Dear Matt Palmer,
> 
> Thank you for reporting this issue to GlobalSign.  Case #04076325:
"Problem
> Report for certificate(s) with compromised private key" has been created
and a
> GlobalSign representative will investigate this immediately.  If requested
you will
> receive a response from a designated representative as soon as possible.
> 
> Thank you,
> Customer Service Team  GlobalSign
> ->8-
> 
> 2020-03-06 22:08:06Z Human response from GlobalSign:
> 

RE: Auditing of CA facilities in lockdown because of an environmental disaster/pandemic

2020-03-04 Thread Arvid Vermote via dev-security-policy
When I initially raised the topic I had two things in mind:

-What if a facility can’t be audited?

-If main key management facilities are down can WebPKI CA meet SSLBR 
4.9.1.2?

 

As for the inability to audit, a few things come to mind based on the previous 
shared thoughts:

-Inform root programs ASAP if a certain location is in a situation 
where it cannot be inspected within the three months after the period under 
audit

-File an “exception request” (which requires to be renew regularly to 
ensure CAs need to continuously justify an incomplete audit)

-Complete the audit for all locations that can be audited

-Deliver updated report that incorporates the facilities as soon as the 
facility is back available for inspection

 

Ryan, related to your thought “Similarly, if a CA’s preferred auditors are from 
a region affected by travel restrictions, but other accredited auditors exist 
that would be capable, would that be sufficient?”

-Auditors are not that flexible on reporting formats and doing a 
specific subset of a standards on a specific location. 

-What would the root programs accept in terms of such an ad-hoc report 
as it will not be an ISAE3000/CSAE3000/SSAE18 format? 

-Depending on the CA it would also be multiple reports that will be 
incomplete: WebTrust, SSLBR, EV, (EV) Code Signing

-Which controls / criteria should be reported on? Only the ones related 
to physical security? 

 

For the key material security and key management continuity aspect, compared to 
the controls I would think a typical CA would implement the WebTrust standard 
is quite brief and vague:

-Criterion #3.8 focuses on general CA continuity and availability of 
technology and information. For key material it focuses on having back-ups.  

-There is one specific control (#3.8.6) that talks a bit about securing 
a facility during a disaster 

 

None of these controls really talk focused about the importance of or set any 
timings for having a capability available at original or remote site to perform 
critical key management activities such as timely ICA revocation. Also 
generally our opinion is that key material protection requirements in WT are 
substandard to the level of protection that is required for WebPKI CAs. 

 

Based on our internal risk appetite we have implemented additional controls, 
including but not limited to:

-Having key management facilities / capability on different continents 
in politically stable countries

-Having additional locations on top of the above facilities under 
different political rule to which we can move key material quickly and securely 
in case of any threat or instability

-“Key management facility” means a facility where key material is 
stored. Credentials to unlock the key management facility and key material are 
stored in at least two other different locations in close proximity to the key 
management facility and require the presence of different roles to obtain 
access. 

-Rotational key management activities in the different locations to 
make sure the facilities are and stay operational and plans work when it comes 
to a BCP execution

-A colluded group of at least six trusted role people is required in 
order to obtain access to key management material

 

From: Ryan Sleevi  
Sent: vrijdag 28 februari 2020 19:32
To: Ryan Sleevi 
Cc: mozilla-dev-security-policy 
; Arvid Vermote 

Subject: Re: Auditing of CA facilities in lockdown because of an environmental 
disaster/pandemic

 

Hi Arvid,

 

I wanted to follow-up, and see if you had suggestions or ideas here for 
appropriate next steps. Understandably, as more countries are affected, this 
will no doubt continue to be an issue. I think you're spot on for asking early, 
as you did, and I'm hoping GlobalSign (and others!) might have ideas on 
appropriate risk mitigation and potential remediation strategies.



smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Auditing of CA facilities in lockdown because of an environmental disaster/pandemic

2020-02-19 Thread Arvid Vermote via dev-security-policy
COVID-19 is going on and there currently is a quarantine of certain areas in
China and also alert levels are further raising in other (mainly East-Asian)
countries.

 

How will the root programs approach CA facilities with key material that are
in a lockdown or in a territory that is not accessible by auditors and hence
cannot be inspected within the three months after the end of the CA's
period-under-audit? 

 

Lockdown in the above meaning properly secured according to the requirements
and BCP/DR plans but because of external conditions not accessible and
available for external auditors / inspection. 



smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


RE: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash Requirements

2019-05-22 Thread Arvid Vermote via dev-security-policy
GlobalSign has revoked the respective certificates and is investigating root
cause. Thanks. 

> -Original Message-
> From: dev-security-policy 
On
> Behalf Of Ryan Sleevi via dev-security-policy
> Sent: dinsdag 21 mei 2019 6:06
> To: Brian Smith 
> Cc: Ryan Sleevi ; mozilla-dev-security-policy
 security-pol...@lists.mozilla.org>; Wayne Thayer 
> Subject: Re: Policy 2.7 Proposal: Clarify Section 5.1 ECDSA Curve-Hash
> Requirements
> 
> On Thu, May 9, 2019 at 4:48 PM Brian Smith  wrote:
> 
> > On Fri, Apr 26, 2019 at 11:39 AM Wayne Thayer 
wrote:
> >
> >> On Wed, Apr 24, 2019 at 10:02 AM Ryan Sleevi  wrote:
> >>
> >>> Thank you David and Ryan! This appears to me to be a reasonable
> >>> improvement to our policy.
> >>>
> >>
> >> Brian: could I ask you to review the proposed change?
> >>
> >>
> >>> This does not, however, address the last part of what Brian proposes
> >>> - which is examining if, how many, and which CAs would fail to meet
> >>> these encoding requirements today, either in their roots,
> >>> subordinates, or leaf certificates.
> >>>
> >>>
> >> While I agree that this would be useful information, for the purpose
> >> of moving ahead with this policy change would it instead be
> >> reasonable to set an effective date and require certificates issued
> >> (notBefore) after that date to comply, putting the burden on CAs to
> >> verify their implementations rather than relying on someone else to do
that
> work?
> >>
> >
> > My understanding here is that the proposed text is not imposing a new
> > requirement, but more explicitly stating a requirement that is already
> > imposed by the BRs. AFAICT BRs require syntactically valid X.509
> > certificates, RFC 5280 defines what's syntactically valid, RFC 5280
> > defers to other documents about what is allowed for each algorithm
> > identifier, and this is an attempt to collect all those requirements
> > into one spot for convenience.
> >
> 
> I unintentionally let this drop off my radar.
> 
> I did some light analysis, based on analyzing simply the bytes of the cert
(i.e.
> without structural parsing), simply looking at whether or not one of the
prescribed
> sequences appears, first for SPKIs, then for signatures.
> 
> For SPKIs, I only found a total of 9 unexpired certs, so I've just
reproduced them
> here:
> -
> https://crt.sh/?c=ad567be233e98ac621e8b760005f37f1d7e916d73c602391771ab5f2
> 3f7af38b
> -
> https://crt.sh/?c=b719593d1e625e45f42ab3d1537e0a9c7a33c0a87244e7000db6157
> 1bc0fd98b
> -
> https://crt.sh/?c=541e29ce0aee8244a43b31e031208e6808a7e412d6c9cda6cd032d5
> 28ea0c690
> -
> https://crt.sh/?c=6101a94793441c3b85ac653703d62d5c65ca6457662b36ad7abd3ee
> 43d5eec11
> -
> https://crt.sh/?c=ca304b895d0d652da1c352dbda577f7c70c5f6741758e17a919a97d
> 063ad56c7
> -
> https://crt.sh/?c=91d876790b645196389d3c92a6b480969557192ecdd2bfeaaced6c0
> 7948d9d5c
> -
> https://crt.sh/?c=96185e2fadc17a5b896338a3fcce3647b3b2f9221c61c9624814c4d3
> 7b884dbb
> -
> https://crt.sh/?c=9a9ec285f834b421416e5e5ba45727deaf92adf37e76a82cdf6d45d0
> fba0728c
> - (Revoked)
> https://crt.sh/?c=5cf9ff16c5d1e128a2082df9d290d1571c1a8f2f782bc1cacd2b0437
> 094f0e13
> 
> Of the 8 unrevoked, they're all issued by a single CA - GlobalSign - and
are all
> RSA keys that lack the explicit NULL parameter, and thus violate the
requirements
> of https://tools.ietf.org/html/rfc3279#section-2.3.1
> 
> These are flagged by cablint (but not zlint), so that is an opportunity
for CAs to
> improve things - both in how they encode and how they lint.
> 
> I haven't (yet) gone through the Signature encodings, but that should
hopefully
> address the SPKI concerns. Of course, I may have botched things rather
> significantly in my queries, but at least sharing my data provides a way
for people
> to prove that :)
> 
> 
> >
> > It would be easier to understand if this is true if the proposed text
> > cited the RFCs, like RFC 4055, that actually impose the requirements
> > that result in the given encodings.
> >
> 
> Could you clarify, do you just mean adding references to each of the
example
> encodings (such as the above example, for the SPKI encoding)?
> ___
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy


smime.p7s
Description: S/MIME cryptographic signature
___
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy


Re: SSL private key for *.alipcsec.com embedded in PC client executables

2018-12-11 Thread Arvid Vermote via dev-security-policy
Based on the information reported in this thread GlobalSign has started the 
necessary activities to investigate this potential misuse. 

Arvid

On Tuesday, December 11, 2018 at 8:24:43 AM UTC+1, Mark Steward wrote:
> This time it's just hanging around in memory, no need to do anything
> about the anti-debug.
> 
> $ openssl x509 -noout -modulus -in 300288180.crt|md5sum
> f423a009387fb7a306673b517ed4f163  -
> $ openssl rsa -noout -modulus -in alibaba-localhost.key.pem|md5sum
> f423a009387fb7a306673b517ed4f163  -
> 
> You can verify that I've signed lorem ipsum with the following:
> 
> $ wget https://crt.sh/?d=300288180 -O 300288180.crt
> $ wget https://rack.ms/b/UsNQv74sfH40/msg.txt{,.sig-sha256.b64}
> $ openssl dgst -sha256 -verify <(openssl x509 -in 300288180.crt
> -pubkey -noout) -signature <(base64 -d msg.txt.sig-sha256.b64) msg.txt
> 
> As the domain name suggests, this is part of the
> AlibabaProtect/"Alibaba PC Safe Service" that comes bundled with the
> Youku client.
> 
> 
> Mark
> 
> 
> Mark
> On Tue, Dec 11, 2018 at 5:37 AM Xiaoyin Liu via dev-security-policy
>  wrote:
> >
> > Hello,
> >
> > I think I found a SSL certificate misuse issue, but I am not sure if this 
> > is indeed a misuse, so I want to ask about it on this list.
> >
> > Here is the issue: After I installed Youku Windows client 
> > (https://pd.youku.com/pc, installer: 
> > https://pcclient.download.youku.com/youkuclient/youkuclient_setup_7.6.7.11220.exe),
> >  it starts a local HTTPS server, listening on localhost:6691. Output of 
> > “openssl s_client -connect 127.0.0.1:6691” indicates that this local server 
> > uses a valid SSL certificate, issued to "Alibaba (China) Technology Co., 
> > Ltd.” CN=*.alipcsec.com, and issued by GlobalSign. It’s a publicly trusted 
> > OV cert, and is valid until Jan 13, 2019. Later, I found that 
> > local.alipcsec.com resolves to 127.0.0.1, and 
> > https://local.alipcsec.com:6691/ is used for inter-process communication.
> >
> > It’s clear that the private key for *.alipcsec.com is embedded in the 
> > executable, but all the executables that may embed the private key are 
> > packed by VMProtect, and the process has anti-debugging protection. I tried 
> > plenty of methods to extract the private key, but didn’t succeed. I 
> > reported this to Alibaba SRC anyway. They replied that they ignore this 
> > issue unless I can successfully extract the key.
> >
> > So is this a certificate misuse issue, even if the private key is 
> > obfuscated? If so, do I have to extract the private key first before the CA 
> > can revoke the cert?
> >
> > Thank you!
> >
> > Best,
> > Xiaoyin Liu
> >
> > Here is the certificate:
> > -BEGIN CERTIFICATE-
> > MIIHTjCCBjagAwIBAgIMCpI/GtuuSFspBu4EMA0GCSqGSIb3DQEBCwUAMGYxCzAJ
> > BgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMTwwOgYDVQQDEzNH
> > bG9iYWxTaWduIE9yZ2FuaXphdGlvbiBWYWxpZGF0aW9uIENBIC0gU0hBMjU2IC0g
> > RzIwHhcNMTgwMTEyMDgxMTA1WhcNMTkwMTEzMDgxMTA1WjB7MQswCQYDVQQGEwJD
> > TjERMA8GA1UECBMIWmhlSmlhbmcxETAPBgNVBAcTCEhhbmdaaG91MS0wKwYDVQQK
> > EyRBbGliYWJhIChDaGluYSkgVGVjaG5vbG9neSBDby4sIEx0ZC4xFzAVBgNVBAMM
> > DiouYWxpcGNzZWMuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
> > 9PJcPzpUNRJeA8+YF8cRZEn75q+fSsWWkm6JfIlOKorYXwYJB80de4+Bia3AgzfO
> > wqwWfPGrRYh5OY4ujjsKF5XkWG22SLlzi5xB9zAeVKHYTo2U6aKrKnht9XyYvnZX
> > ocIuaSxkqq4rQ9UwiEYB6lvy8RY1orYu33HtrGD5W3w9SWf2AwB0rCNp0BeSRaGB
> > JEEXzgVECbL+deJZgZflae1gQ9q4PftDHuGXLNe8PLYq2D4+oKbYvbYtI9WKIMuh
> > 1dL70QBbcW0y4jFr2/337H8/KhBaCb3ZBZQI4LUnYL8RVeAVJFpX/PuiHMh9uNTm
> > oW1if7XQswJCWx3td5tWiwIDAQABo4ID5TCCA+EwDgYDVR0PAQH/BAQDAgWgMIGg
> > BggrBgEFBQcBAQSBkzCBkDBNBggrBgEFBQcwAoZBaHR0cDovL3NlY3VyZS5nbG9i
> > YWxzaWduLmNvbS9jYWNlcnQvZ3Nvcmdhbml6YXRpb252YWxzaGEyZzJyMS5jcnQw
> > PwYIKwYBBQUHMAGGM2h0dHA6Ly9vY3NwMi5nbG9iYWxzaWduLmNvbS9nc29yZ2Fu
> > aXphdGlvbnZhbHNoYTJnMjBWBgNVHSAETzBNMEEGCSsGAQQBoDIBFDA0MDIGCCsG
> > AQUFBwIBFiZodHRwczovL3d3dy5nbG9iYWxzaWduLmNvbS9yZXBvc2l0b3J5LzAI
> > BgZngQwBAgIwCQYDVR0TBAIwADBJBgNVHR8EQjBAMD6gPKA6hjhodHRwOi8vY3Js
> > Lmdsb2JhbHNpZ24uY29tL2dzL2dzb3JnYW5pemF0aW9udmFsc2hhMmcyLmNybDAn
> > BgNVHREEIDAegg4qLmFsaXBjc2VjLmNvbYIMYWxpcGNzZWMuY29tMB0GA1UdJQQW
> > MBQGCCsGAQUFBwMBBggrBgEFBQcDAjAdBgNVHQ4EFgQUoIFBQJomlUEiLibD+luC
> > PKGhbykwHwYDVR0jBBgwFoAUlt5h8b0cFilTHMDMfTuDAEDmGnwwggH0BgorBgEE
> > AdZ5AgQCBIIB5ASCAeAB3gB2AN3rHSt6DU+mIIuBrYFocH4ujp0B1VyIjT0RxM22
> > 7L7MAAABYOlsKGEAAAQDAEcwRQIhANem+QHeaxpf7wmjtQe6rdbf5o/JKiM6aVgy
> > 0gnJk/UTAiBNZ0newmCtHi/f1uzmmzWNeVIl4apUko2yChwTUJObMAB1AKS5CZC0
> > GFgUh7sTosxncAo8NZgE+RvfuON3zQ7IDdwQAAABYOlsJ/wAAAQDAEYwRAIgUAxl
> > oaOwXSSPUdDmix7rwcaD2/QAiQcj0Iij14ZB5dMCIG0hAMD7iukwI28DIgy+StxR
> > 2B1LB1PLyMGa1ByTxyx6AHUAVhQGmi/XwuzT9eG9RLI+x0Z2ubyZEVzA75SYVdaJ
> > 0N0AAAFg6WwodQAABAMARjBEAiB5dRrIvSx5euaya6RItzL6bbRt4QtLj3XbrU5d
> > hpLOqgIgTTN315YeiNg+dYmtCCCU1OG56IhScJsP0Kac+JmrI98AdgDuS723dc5g
> > uuFCaR+r4Z5mow9+X7By2IMAxHuJeqj9ywAAAWDpbCrrAAAEAwBHMEUCIAvmesN/
> > F1V57QuX69pubfx7pW2tCJRHREznZOZbEniVAiEA37SmlQQYZhAUFJ02dE5SfNlE
> >