On 05/12/2018 19:45, Wayne Thayer wrote:
..On Wed, Dec 5, 2018 at 1:58 PM dr. Sándor Szőke via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:
6./
Explanation about how and why the mistakes were made or bugs introduced,
and how they avoided detection until now.

Microsec manages the CISCO VPN cerver certificates separately from the TLS
certificates. The policy of the CISCO VPN servers was not changed when the
validity of the TLS certificates changed from 3 years to 2 years in March
2018.


Why wasn't the policy for Cisco VPN servers updated? This points to a
deeper failure to properly manage all of the profiles used to issue
certificates that chain to publicly-trusted roots, and I would like to
better understand what went wrong and how it will be prevented in the
future?

Adding some more questions on to this: does Microsec have any other non-TLS cert policies that they "manage separately" from the TLS ones (no matter how infrequently used), and if so how many, and have you verified how any of those might qualify as TLS certs and thus fall under the BR, and if so, that they abide by this validity BR?

~ Gijs
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to