RE: Sectigo: Failure to revoke certificate with compromised key

2020-05-15 Thread Robin Alden via dev-security-policy
=2081585376 has been revoked. I will include all of these details in the incident report which is in preparation. Regards Robin Alden Sectigo Limited > -Original Message- > From: dev-security-policy > On Behalf Of sandybar497--- via dev-security-policy > Sent: 07 May 2020 03:27 >

RE: Sectigo: Failure to revoke certificate with compromised key

2020-05-06 Thread Robin Alden via dev-security-policy
s://bugzilla.mozilla.org/show_bug.cgi?id=1635840 and I will follow up with an incident report in that bug. Regards Robin Alden Sectigo ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy

RE: Terms and Conditions that use technical measures to make it difficult to change CAs

2020-04-14 Thread Robin Alden via dev-security-policy
ctions concerning this certificate after it had been initially revoked, e.g. re-revoking if misissuance or subscriber key compromise were detected. Regards Robin Alden Sectigo Limited smime.p7s Description: S/MIME cryptographic signature

RE: Certificate OU= fields with missing O= field

2019-11-01 Thread Robin Alden via dev-security-policy
branding purposes, e.g. "issued through " > > or "SomeBrand SSL". > > > > That OU clearly doesn't have anything to do with the subject that > was validated, so I also consider that a misissue. > [Robin Alden] Kurt, Matthias, We are aware

RE: Question about the issuance of OCSP Responder Certificates by technically constrained CAs

2019-09-10 Thread Robin Alden via dev-security-policy
d-kp-OCSPSigning the only place we have observed them to require it is in the Microsoft Certificate Authority software. We have no reason to believe that their operating systems or browsers require EKU chaining for id-kp-OCSPSigning in the web PKI. Does anyone have any evidence to the contrary

RE: Comodo password exposed in GitHub allowed access to internal Comodo files

2019-07-30 Thread Robin Alden via dev-security-policy
Nick, Ángel, Sectigo is not affected by this incident. https://sectigo.com/blog/attention-journalists-and-researchers-dont-confuse-comodo-with-sectigo Regards Robin Alden Sectigo Limited > -Original Message- > From: Nick Lamb via dev-security-policy > Sent: 27 July 2

RE: CAA policy - ComodoCA or Sectigo?

2019-02-05 Thread Robin Alden via dev-security-policy
ity to use comodo.com for this purpose. We have always disclosed updates to our CAA domains to the CCADB promptly. Regards Robin Alden Sectigo Limited > -Original Message- > From: dev-security-policy > On Behalf Of Wayne Thayer via dev-security-policy > Sent: 05 February 2019 15:58

Re: Violation report - Comodo CA certificates revocation delays

2018-10-12 Thread Robin Alden via dev-security-policy
I understand the OP's concern and will respond to the bug shortly. Regards Robin Alden Comodo CA Ltd. ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy

RE: localhost.megasyncloopback.mega.nz private key in client

2018-08-09 Thread Robin Alden via dev-security-policy
variants of the abuse email addresses which are still active and were still receiving mail. This was corrected and this certificate was revoked after checking the key. Regards Robin Alden Comodo CA Ltd. > -Original Message- > From: Hanno Böck > Sent: 08 August 2018 15:18 &

Incident Report - Domain validation by CNAME with omitted underscore

2018-05-18 Thread Robin Alden via dev-security-policy
orm a fresh BR compliance review to help ensure that no other misunderstandings of the BRs persist. We are grateful to Andrew Ayer for the problem report. Regards Robin Alden CTO for SSL Email: robin.al...@comodoca.com ComodoCA.com ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy

RE: .tg Certificates Issued by Let's Encrypt

2017-11-16 Thread Robin Alden via dev-security-policy
when we blocked .tg. When we first got a heads-up about this we looked at the data and I said that it looked to me like 25th October was the transition to chaos, since that is when we issued the first of many gouv.tg certificates. I hope that helps a little. Regards Robin Alden Comodo CA Ltd

RE: Francisco Partners acquires Comodo certificate authority business

2017-11-01 Thread Robin Alden via dev-security-policy
Peter, As you noted in your post to the cryptography list, Francisco Partners' website states that they exited from their investment in Blue Coat. https://www.franciscopartners.com/investments/blue-coat?sector=Comms-Securit y=1200 Regards Robin Alden Comodo > -Original Mess

RE: Francisco Partners acquires Comodo certificate authority business

2017-11-01 Thread Robin Alden via dev-security-policy
s policies or procedures, or the secure locations from which we operate our CA infrastructure. The operational personnel in Comodo CA Limited will not change. The certificate validation teams will remain unchanged. Regards Robin Alden & Rob Stradling Comodo CA Ltd.

RE: Compliance with 7.1.4.2.1 (internal names revocation)

2017-01-09 Thread Robin Alden
twork Security - Version 2.1" http://www.webtrust.org/principles-and-criteria/item83666.pdf Those criteria specifically call out 7.1.4.2.1 and the 1 October 2016 date. Regards Robin Alden Comodo > -Original Message- > From: dev-security-policy [mailto:dev-security-policy- > b

RE: Compliance with 7.1.4.2.1 (internal names revocation)

2017-01-09 Thread Robin Alden
diligence. Regards Robin Alden Comodo > -Original Message- > From: dev-security-policy On Behalf Of Nick Lamb > Sent: 06 January 2017 09:52 > To: mozilla-dev-security-pol...@lists.mozilla.org > Subject: Re: Compliance with 7.1.4.2.1 (internal names revocation) > >

RE: Comodo issued a certificate for an extension

2016-11-10 Thread Robin Alden
hods-of-domain-control-validation-dcv Regards Robin Alden Comodo ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy

RE: Incident Report - certificate with 'sb' as a SAN:dnsName

2016-11-10 Thread Robin Alden
customer requested www.DOMAIN, because that was the case in which we also added DOMAIN into the SAN. No certificates were issued for *.[tld] Regards Robin Alden Comodo ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy

RE: Comodo issued a certificate for an extension

2016-11-10 Thread Robin Alden
o their policy regardless of whether the CA/B has ratified it by then. Comodo will have implemented some or all of the new validation methods described in Ballot 169 before 1 March 2017. Comodo will be withdrawing any and all validation methods which do not conform with Ballot 169, and/or which rely o

RE: Incident Report - certificate with 'sb' as a SAN:dnsName

2016-11-10 Thread Robin Alden
Gervase Markham, on 04 October 2016 07:10, said.. > Thank you for this report. > > On 27/09/16 02:07, Robin Alden wrote: > > When we use an 'agreed-upon change to website' method to prove > domain > > control, we consider proof of control of 'www.' as also > > provi

RE: Incident Report - OCR

2016-10-21 Thread Robin Alden
d it was approved and published on 19th October. I apologize for the tardy production and release of our report. Referring to the release of our report rather than our internal response to the report we received, there were too many fingers in this particular pie and that made for a slow relea

Incident Report - OCR

2016-10-19 Thread Robin Alden
estrictions on the use of that information) are offered. Robin Alden Comodo CA Ltd. [1] https://crt.sh/?id=47045653 [2] https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.4.1.pdf [3] http://www.heise.de/newsticker/meldung/Zertifikats-Klau-Fatale-Sehschwaeche- bei-Comodo-3354229.html sm

RE: Comodo issued a certificate for an extension

2016-09-25 Thread Robin Alden
. That certificate (https://crt.sh/?id=34242572) was revoked yesterday morning. We will issue a report tomorrow (26th September). Regards Robin Alden Comodo > -Original Message- > From: dev-security-policy [mailto:dev-security-policy- > bounces+robin=comodo@lists.mozilla.org] On Behalf

RE: Server certificate domain validation bug

2016-08-11 Thread Robin Alden
Hi Nick, Sorry for the slow reply. > -Original Message- > From: Nick Lamb > Sent: 30 July 2016 00:04 > To: mozilla-dev-security-pol...@lists.mozilla.org > > Hi Robin, > > On Friday, 29 July 2016 18:54:56 UTC+1, Robin Alden wrote: > >

RE: Server certificate domain validation bug

2016-08-11 Thread Robin Alden
Enterprise's policy in regard to the approval of issuance of certificates for its domains being up to scratch. Regards Robin Alden Comodo smime.p7s Description: S/MIME cryptographic signature ___ dev-security-policy mailing list dev-security-policy@lis

Server certificate domain validation bug

2016-07-29 Thread Robin Alden
our policy obligations. Regards Robin Alden Comodo This email has also been posted to pub...@cabforum.org <mailto:pub...@cabforum.org> ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozil

RE: Name issues in public certificates

2015-11-19 Thread Robin Alden
Peter said.. > While I realize that it is not clear cut in many contexts, RFC 5280 is > rather clear cut. The authors clearly wanted to avoid stumbling and > being eaten by a grue, so they wrote: > >When the subjectAltName extension contains a domain name system >label, the domain name

RE: Policy about root cert transfers

2015-06-23 Thread Robin Alden
not acquired a root from Comodo. Regards Robin Alden Comodo ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-security-policy

RE: Consequences of mis-issuance under CNNIC

2015-04-02 Thread Robin Alden
Peter Gutmann said.. I was using IT news stories as the source, e.g. IDG's 'Secure' advertising tool PrivDog compromises HTTPS security: Instead, the problem was tracked down to another advertising-related application called PrivDog, which was built with the involvement of Comodo's

RE: Consequences of mis-issuance under CNNIC

2015-03-31 Thread Robin Alden
Peter Gutmann said.. Daniel Micay danielmi...@gmail.com writes: CNNIC is known to have produced and distributed malware for the purpose of mass surveillance and censorship. TeliaSonera aided totalitarian governments, Comodo provided the PrivDog MITM software, and that's just the first

RE: address prefixes allowed for domain control validation

2015-03-23 Thread Robin Alden
@ 7.6% administrator@ 7.5% postmaster@ 4.5% Regards Robin Alden Comodo smime.p7s Description: S/MIME cryptographic signature ___ dev-security-policy mailing list dev-security-policy@lists.mozilla.org https://lists.mozilla.org

RE: address prefixes allowed for domain control validation

2015-03-23 Thread Robin Alden
Robin said.. Of all email-based domain control validation we perform those email addresses (on the same domain being applied for) are used as follows: admin@ 33.9% hostmaster@ 7.8% webmaster@ 7.6% administrator@ 7.5% postmaster@ 4.5%

RE: KIR S.A. Root Inclusion Request

2014-09-25 Thread Robin Alden
to 'unsuspend'. You can't transition back from 'revoked' to valid. http://www.ietf.org/rfc/rfc5280.txt 3.3. Revocation ... An entry MUST NOT be removed from the CRL until it appears on one regularly scheduled CRL issued beyond the revoked certificate's validity period. Regards Robin Alden

RE: Client certs

2014-09-25 Thread Robin Alden
Hi Gerv, I can send out a million client certificates for negligible cost. That is especially attractive cost-wise for an existing system that I have to increase the security of (say over username and password), but which has not been identified as needing 2 factor authentication.

Mail list playing up?

2014-07-31 Thread Robin Alden
The posts to this thread by Robin Alden (me), Moudrick Dadashov, and Kyle Hamilton didn't make it to the Google Groups view. This isn't a complaint so much as a heads-up, that the google groups view of the list is broken and if you rely on the Google Groups view you are missing out on parts

RE: Proposal: Advocate to get Section 9.3.1 (Reserved Certificate Policy Identifiers) made mandatory.

2014-07-23 Thread Robin Alden
+1 Robin -Original Message- From: Jeremy Rowley [mailto:jeremy.row...@digicert.com] Sent: 23 July 2014 16:05 To: 'Moudrick M. Dadashov'; 'Robin Alden'; 'Gervase Markham'; nick.l...@lugatech.com; mozilla-dev-security-pol...@lists.mozilla.org Subject: RE: Proposal: Advocate to get