Buypass incident report: Certificate issued with incorrect postal code

2019-10-07 Thread Mads Egil Henriksveen via dev-security-policy
Hi This is an incident report for one certificate issued by Buypass on September 23rd 2019 noncompliant with BR 7.1. The certificate, issued to a Swedish organization, has an error in the subject:postalCode field. The postalCode value is set to 2153 while the correct value should be 21532. ===

RE: Buypass Incident Report - intermediate certificates noncompliant with BR 7.1

2019-03-27 Thread Mads Egil Henriksveen via dev-security-policy
We do not intend to revoke the end-user certificates. We consider this to be a compliance issue for the CA certificates only. The CAs (i.e. the private keys) and end-user certificates issued from the CAs are not affected. Regards Mads -Original Message- From: dev-security-policy On B

Buypass Incident Report - intermediate certificates noncompliant with BR 7.1

2019-03-26 Thread Mads Egil Henriksveen via dev-security-policy
Hi This is an incident report for two intermediate certificates issued by Buypass in December 2016 noncompliant with BR 7.1. ===How your CA first became aware of the problem (e.g. via a problem report submitted to your Problem Reporting Mechanism, a discussion in mozilla.dev.security.polic

Pre-Incident Report - Buypass certificates noncompliant with BR 7.1

2019-03-21 Thread Mads Egil Henriksveen via dev-security-policy
We are aware that Buypass is on the list of CAs that have been noncompliant with BR 7.1. We will send an Incident Report within the next few days. Regards Mads ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lis

RE: CCADB disclosure of id-kp-emailProtection intermediates

2018-04-11 Thread Mads Egil Henriksveen via dev-security-policy
Hi One of the non-technically-constrained intermediate certificates on the list [2] below is issued by Buypass and this was revoked today - see https://crt.sh/?id=157337628. This was done to be compliant with Section 5.3.1 of Mozilla Root Store Policy v 2.5 [1] - as specified in Action 1 of N

RE: TLS-SNI-01 and compliance with BRs

2018-01-31 Thread Mads Egil Henriksveen via dev-security-policy
Hi Wayne Buypass has used the TLS-SNI-01 method in our ACME Pilot running since last summer. We have issued some certificates using this method - less than 60 certificates are still active and not revoked, most of them are issued to internal users and systems. We stopped using this method im

Incident report: Certificates with error in subject: postalCode

2017-11-01 Thread Mads Egil Henriksveen via dev-security-policy
Hi Late last week we discovered three certificates issued from Buypass with an error in the subject:PostalCode for one dutch company. One of these certificates is available at https://crt.sh/?id=212774960 The postalcode should have been '3707BK' as registered in the European Business Register

RE: (Mis)-Issuance on CAA Timeout in DNSSEC signed zone

2017-09-12 Thread Mads Egil Henriksveen via dev-security-policy
Hi Buypass received the problem report at 2017-09-12 00:06 and started investigating early this morning. After investigating what happened we identified an error in our system solution when we have a CAA RR lookup failure. In this case, the DNS CAA RR lookup timed out several times and we mis

RE: OCSP Responders Are An Attack Vector For SHA-1 Collisions

2016-03-10 Thread Mads Egil Henriksveen
infrastructure. Regards Mads -Original Message- From: dev-security-policy [mailto:dev-security-policy-bounces+mads.henriksveen=buypass...@lists.mozilla.org] On Behalf Of Mads Egil Henriksveen Sent: 9. mars 2016 18:53 To: Andrew Ayer; mozilla-dev-security-pol...@lists.mozilla.org Subject: RE

RE: OCSP Responders Are An Attack Vector For SHA-1 Collisions

2016-03-09 Thread Mads Egil Henriksveen
Hi Andrew Thank you for making us aware of this issue with our OCSP responder. We did make a major change in our CAs some years ago where we among other things established a new OCSP responder for all Buypass CAs used for SSL/TLS-certificates (including Buypass Class 2 CA 1). However, the origi

RE: New requirement: certlint testing

2016-02-11 Thread Mads Egil Henriksveen
The entropy requirement is not that important for certificates signed by a Root CA, because a Root CA and its private key must be kept offline or air gapped and will not be exposed to the same threats as an "online CA" signing Subscriber certificates. The main cause for the entropy requiremen