Incident report:

PROBLEM IN SUBJECT E (email) VALUE VALIDATION (deviation 5)
Telia got a preliminary CA audit report on 25th June 2018. One of its BR 
deviations was a statement that "Telia did not have controls to adequately 
verify the email address information (of SSL certificates)". Telia has always 
verified E values only visually and Registration officer (or certificate 
inspector in some cases) has to manually accept each value but only clearly 
incorrect values or syntactically incorrect values have been thus far rejected. 
Note! Subject E value has only informative meaning and often includes support 
email address related to the server and it can't be used for SMIME purposes.

Timeline of actions:
10-Jul-2018 Telia decided to completely stop inserting E values to OV 
certificates because of this deviation because Telia won't know how they could 
be reasonably verified otherwise. Plan is to implement this removal in 
September 2018. But before that Telia would like to get community opinion how E 
values are verified by other CAs and how they are supposed to be verified when 
BR text is like this "All other optional attributes, when present within the 
subject field, MUST contain information that has been verified by the CA." 
Before this discussion Telia plan is not to revoke previously enrolled OV 
certificates with visually verified E values.

Summary and details of problematic certificates:
Lots of existing Telia OV certificates have E value because Openssl which is 
one of the most common CSR generators automatically adds it to the CSR and old 
Telia process has accepted the values unless they are incorrect in visual 
verification or syntactically incorrect. Actual count and list of problematic E 
values will be generated in August 2018.

Explanation about how and why the mistakes were made or bugs introduced, and 
how they avoided detection until now:
Telia hasn't understand that E values should be verified using some other 
method than using visual check. Before this year it hasn't been on audit 
comments even though Telia E verification process has been same always.

Steps to fix:
1. listing of problematic certificates; Telia plan to do this in August 2018
2. community discussion how other CAs verify E and how they are supposed to be 
verified; planned to happen starting in August 2018 based on this bug
3. possible revocation or revalidation if community states that existing E 
values cause a security problem; will be done after public discussion


_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to