https://bugzilla.mozilla.org/show_bug.cgi?id=1531817 has been created to
track this issue.

On Wed, Feb 27, 2019 at 10:52 PM Jeremy Rowley via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> Hi Cynthia,
>
> We've figured out what happened with your certificate but are still
> looking at whether other certificates were issued using the same process. I
> don't have enough information to file an incident report yet, but I wanted
> to give you the update I promised earlier.
>
> Basically, here's what happened:
> 1. A validation agent took an email address provided during a chat session
> with you and set that email as a WHOIS admin email address. This email
> qualified as a constructed email (admin@domain)
> 2. The system marked the WHOIS as unavailable for automated parsing
> (generally, this happens if we are being throttled or the WHOIS info is
> behind a CAPTCHA), which allows a validation agent to manually upload a
> WHOIS document
> 3. The WHOIS document uploaded was a screen capture of WHOIS information
> that did not match the domain being requested but was close enough that the
> mis-match went unnoticed.
> 4. The validation agent specified the approval scope as id-addr.arpa which
> is normal for a domain approved by the admin listed in WHOIS. As a
> constructed email, the approval scope should have been limited to the scope
> set by the constructed address.
> 5. The validation agent specified that the email address listed in WHOIS
> matched the email address provided by you (admin@domain) and sent the
> email to authorize the legit cert
> 6 . When the validation completed successfully, the validation authorized
> your account for all certificates with the in-addr.arpa domain. This was
> because the scope was improperly set based on the validation agent's
> improper specification of the source of the email address.
> 7. During the review, no one noticed that the WHOIS document did not match
> the verification email nor did anyone notice that the email used for
> verification was actually a constructed email instead of the WHOIS admin
> email.
> 8. The mis-issued certificate essentially "piggy-backed" on the previous
> verification because of the erroneous approval scope set by the validation
> staff.
>
> Make sense?
>
> We shut down manual WHOIS verification while we figure out how to improve
> the process and eliminate validation mistakes like this. We'll post another
> update after we figure out how to improve the process and after the data
> review is complete.
>
> Jeremy
>
> -----Original Message-----
> From: dev-security-policy <dev-security-policy-boun...@lists.mozilla.org>
> On Behalf Of Cynthia Revström via dev-security-policy
> Sent: Tuesday, February 26, 2019 4:17 PM
> To: Matthew Hardeman <mharde...@gmail.com>
> Cc: dev-security-policy@lists.mozilla.org; b...@benjojo.co.uk
> Subject: Re: Possible DigiCert in-addr.arpa Mis-issuance
>
> I am not so sure that is proper to have .arpa domains in the SANs.
>
> But I think the larger issue I think is that this might allow for non
> in-addr.arpa domains to be used as well.
>
> It was just that I just tried to get a cert for my domain for a test to
> see if that would be issued.
>
> And upon verifying the domain via email, I saw that on the page linked in
> the email it had an option along the lines of "Authorize in-addr.arpa for
> all orders on account #123456" (not that exact text but the same meaning).
>
> Now I am not sure if this would work, but I suspect if for example I got
> DNS control over cynthia.site.google.com, I could get a cert for
> google.com if this is a systemic issue and not just a one off.
>
> - Cynthia
>
> On 2019-02-27 00:10, Matthew Hardeman wrote:
> > Is it even proper to have a SAN dnsName in in-addr.arpa ever?
> >
> > While in-addr.arpa IS a real DNS heirarchy under the .arpa TLD, it
> > rarely has anything other than PTR and NS records defined.
> >
> > Here this was clearly achieved by creating a CNAME record for
> > 69.168.110.79.in-addr.arpa pointed to cynthia.re <http://cynthia.re>.
> >
> > I've never seen any software or documentation anywhere attempting to
> > utilize a reverse-IP formatted in-addr.arpa address as though it were
> > a normal host name for resolution.  I wonder whether this isn't a case
> > that should just be treated as an invalid domain for purposes of SAN
> > dnsName (like .local).
> >
> > On Tue, Feb 26, 2019 at 1:05 PM Jeremy Rowley via dev-security-policy
> > <dev-security-policy@lists.mozilla.org
> > <mailto:dev-security-policy@lists.mozilla.org>> wrote:
> >
> >     Thanks Cynthia. We are investigating and will report back shortly.
> >     ________________________________
> >     From: dev-security-policy
> >     <dev-security-policy-boun...@lists.mozilla.org
> >     <mailto:dev-security-policy-boun...@lists.mozilla.org>> on behalf
> >     of Cynthia Revström via dev-security-policy
> >     <dev-security-policy@lists.mozilla.org
> >     <mailto:dev-security-policy@lists.mozilla.org>>
> >     Sent: Tuesday, February 26, 2019 12:02:20 PM
> >     To: dev-security-policy@lists.mozilla.org
> >     <mailto:dev-security-policy@lists.mozilla.org>
> >     Cc: b...@benjojo.co.uk <mailto:b...@benjojo.co.uk>
> >     Subject: Possible DigiCert in-addr.arpa Mis-issuance
> >
> >     Hello dev.security.policy
> >
> >
> >     Apologies if I have made any mistakes in how I post, this is my first
> >     time posting here. Anyway:
> >
> >
> >     I have managed to issue a certificate with a FQDN in the SAN that I
> do
> >     not have control of via Digicert.
> >
> >
> >     The precert is here: https://crt.sh/?id=1231411316
> >
> >     SHA256:
> >     651B68C520492A44A5E99A1D6C99099573E8B53DEDBC69166F60685863B390D1
> >
> >
> >     I have notified Digicert who responded back with a generic response
> >     followed by the certificate being revoked through OCSP. However I
> >     believe that this should be wider investigated, since this cert was
> >     issued by me adding 69.168.110.79.in-addr.arpa to my SAN, a DNS area
> >     that I do control though reverse DNS.
> >
> >
> >     When I verified 5.168.110.79.in-addr.arpa (same subdomain), I noticed
> >     that the whole of in-addr.arpa became validated on my account,
> instead
> >     of just my small section of it (168.110.79.in-addr.arpa at best).
> >
> >
> >     To test if digicert had just in fact mis-validated a FQDN, I
> >     tested with
> >     the reverse DNS address of 192.168.1.1, and it worked and Digicert
> >     issued me a certificate with 1.1.168.192.in-addr.arpa on it.
> >
> >
> >     Is there anything else dev.security.policy needs to do with this?
> This
> >     seems like a clear case of mis issuance. It's also not clear if
> >     in-addr.arpa should even be issuable.
> >
> >
> >     I would like to take a moment to thank Ben Cartwright-Cox and
> >     igloo22225
> >     in pointing out this violation.
> >
> >
> >     Regards
> >
> >     Cynthia Revström
> >
> >     _______________________________________________
> >     dev-security-policy mailing list
> >     dev-security-policy@lists.mozilla.org
> >     <mailto:dev-security-policy@lists.mozilla.org>
> >     https://lists.mozilla.org/listinfo/dev-security-policy
> >     _______________________________________________
> >     dev-security-policy mailing list
> >     dev-security-policy@lists.mozilla.org
> >     <mailto:dev-security-policy@lists.mozilla.org>
> >     https://lists.mozilla.org/listinfo/dev-security-policy
> >
> _______________________________________________
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
> _______________________________________________
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to