On 16/10/17 15:13, Alex Gaynor via dev-security-policy wrote:
Hi all,

Today researchers announced a vulnerability they discovered in RSA keys
generated by a particular piece of firmware, which allows practical
factorization of the private key given just the public key.

Full details of the research here:
https://crocs.fi.muni.cz/public/papers/rsa_ccs17

There is a publicly available tool for testing keys here:
https://github.com/crocs-muni/roca

I'd encourage CAs to proactive check all of their issued certificates,
particularly S/MIME/client certs, since this affects common smartcard
implementations.

Comodo CA became aware of the ROCA vulnerability (CVE-2017-15361) on Monday 16th October at 12:45 UTC.

We immediately downloaded the key testing tools from https://github.com/crocs-muni/roca and set about implementing the ROCA check in crt.sh. Having completed this implementation work on Tuesday 17th October, a report of all ROCA fingerprints found on crt.sh was published to m.d.s.p / https://misissued.com/batch/28/ on Wednesday 18th October.

We then set about scanning (for ROCA fingerprints) all of the certs that we'd ever issued. This scan completed on Friday 20th October and found 175 certificates with ROCA fingerprints. Only 33 of these certs had not yet expired:
  9 Server Authentication certificates
  24 S/MIME certificates

crt.sh links for the 9 serverAuth certs:
  [www.]my.intellectscada.com
    https://crt.sh/?id=6169662
  [*.]crd.bc.ca
    https://crt.sh/?id=248616628
    https://crt.sh/?id=248616633
    https://crt.sh/?id=248616641
  [www.]gsappre01.nu.com
    https://crt.sh/?id=248616637
    https://crt.sh/?id=248616648
  [www.]scada.nelha.net
    https://crt.sh/?id=14815246
    https://crt.sh/?id=248616640
  [www.]scada.nelha.org
    https://crt.sh/?id=248616645

A report was made available to our Validation/Support teams, who set about contacting the affected customers and revoking the certificates. The last of these certificates was revoked on 2nd November.

On Tuesday 31st October we implemented the ROCA vulnerability check in our PKCS#10 CSR parsing code, and on Thursday 2nd November we implemented the ROCA vulnerability check in our SPKAC (<keygen>) and CRMF (RFC2511) parsing code. These changes were deployed to our production CA system on Sunday 5th November.

On Monday 6th November, we scanned the certificates that we'd issued between 20th October and 5th November. 8 further server authentication certificates were found, all for subdomains of the same registered domain. We will get these revoked and then post the details.

--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to