Hi Fotis,

You need to file this as a bugzilla bug.

Thank you,

Burton

On Sun, 10 Mar 2019 at 18:34, Fotis Loukos via dev-security-policy <
dev-security-policy@lists.mozilla.org> wrote:

> SSL.com has been following the recent discussions at
> mozilla.dev.security.policy regarding the behavior of EJBCA based CAs in
> the matter of serial number generation.
>
> SSL.com is using EJBCA internally and is affected by the same issue.
> After consulting with our auditors, we would like to post a preliminary
> report of our findings.
>
> ### How your CA first became aware of the problem (e.g. via a problem
> report submitted to your Problem Reporting Mechanism, a discussion in
> mozilla.dev.security.policy, a Bugzilla bug, or internal self-audit),
> and the time and date.
>
> SSL.com has been following discussion of this issue in
> mozilla.dev.security.policy and initiated a review on 05/03/2019.
>
> ### A timeline of the actions your CA took in response. A timeline is a
> date-and-time-stamped sequence of all relevant events. This may include
> events before the incident was reported, such as when a particular
> requirement became applicable, or a document changed, or a bug was
> introduced, or an audit was done.
>
> - 10/07/2016 - Ballot 164 on Certificate Serial Number Entropy is voted.
> - 30/09/2016 - Ballot 164 enters into effect.
> - 05/03/2019 - Initial review initiated.
> - 05/03/2019 - Confirmed issue exists in SSL.com certificates.
> - 05/03/2019 - Tested and deployed correction to production systems.
> - 06/03/2019 - A full plan for the revocation of all certificates has
> been initiated. We plan on revoking all certificates within 30 days.
>
> ### Whether your CA has stopped, or has not yet stopped, issuing
> certificates with the problem. A statement that you have will be
> considered a pledge to the community; a statement that you have not
> requires an explanation.
>
> A patch was deployed as soon as we confirmed that the issue exists in
> SSL.com certificates. Certificate issuance has been resumed with serials
> meeting all requirements.
>
> ### A summary of the problematic certificates. For each problem: number
> of certs, and the date the first and last certs with that problem were
> issued.
>
> - 6931 End Entity TLS Certificates
>
> We will post an update that will include all S/MIME and CA certificate
> information.
>
> ### The complete certificate data for the problematic certificates. The
> recommended way to provide this is to ensure each certificate is logged
> to CT and then list the fingerprints or crt.sh IDs, either in the report
> or as an attached spreadsheet, with one list per distinct problem.
>
> Please find attached the file tlseelist.txt containing the fingerprints
> of all affected end entity TLS certificates. S/MIME and CA certificate
> information will be posted during an update.
>
> ### Explanation about how and why the mistakes were made or bugs
> introduced, and how they avoided detection until now.
>
> EJBCA's method of generating serial numbers has led to a discrepancy
> between expected and actual behavior and output, such that any CA using
> EJBCA with the default settings will encounter this issue (and be
> therefore in violation of BR 7.1).
>
> ### List of steps your CA is taking to resolve the situation and ensure
> such issuance will not be repeated in the future, accompanied with a
> timeline of when your CA expects to accomplish these things.
>
> The number of bits of entropy used for the generation of serial numbers
> has been increased to 127.
>
> In addition to remediation related to this issue, we will initiate a
> review of other technical requirements of CA/B Forum and how they are
> implemented by EJBCA in order to ensure no more problematic practices
> are followed.
>
> SSL.com intends to exceed minimum technical requirements where ever
> possible to guard against similar issues in the future and ensure the
> highest possible level of security and compliance.
>
> Regards,
> Fotis
>
> --
> Fotis Loukos, PhD
> Director of Security Architecture
> SSL Corp
> e: fot...@ssl.com
> w: https://www.ssl.com
> _______________________________________________
> dev-security-policy mailing list
> dev-security-policy@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
dev-security-policy@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to