Re: Apple: Non-Compliant Serial Numbers

2019-04-05 Thread certification_authority--- via dev-security-policy
> 1. How many of the 54,583 certificates are issued to Apple owned and > operated servers and services and how many not. All impacted certificates were issued to Apple entities > 2. What kinds of practical issues are delaying the replacement of > certificates on any such Apple operated

Re: Entropy of certificate serial number

2019-04-05 Thread Lijun Liao via dev-security-policy
Hi Tim, Thanks for your reply. First to your questions: 1. The purpose of serial number is to identify the certificate, not to make it secure. It will be used in the CRL, OCSP, etc. as identifier. 2. Unfortually yes, you can change the SAN and some non-critical extensions to get the same hash

RE: Entropy of certificate serial number

2019-04-05 Thread Tim Shirley via dev-security-policy
If it were possible to do what you're suggesting, there's no reason you'd need to use the serial number for it. You could just as easily add that randomness in an additional SAN, or a certificate extension that the browser didn't care about. In fact, since the BRs require SHA-256 as a minimum

Re: Entropy of certificate serial number

2019-04-05 Thread Lijun Liao via dev-security-policy
With random serial numbers an adversary does not even need to guess the serial number. Consider the following attack, the adversary finds a certificate with weak hash algorithm. He adds his host to the SAN field, then he tries to find out a positive serial number up to 20 octets which results in

Re: Entropy of certificate serial number

2019-04-05 Thread Alex Gaynor via dev-security-policy
Hi Lijun, Entropy is required in serial numbers to protect against weak hash functions -- historically exploitation of MD5's weakness was possible because CAs used sequential serial numbers, thus allowing an attacker to pre-compute hash prefixes, because they could predict future data that would

Entropy of certificate serial number

2019-04-05 Thread Lijun Liao via dev-security-policy
In the last days, the issue related to the 63 bit serial number by using the default configuration of EJBCA poped up in many forums. Could someone please explain why the BR requires the minimal entropy to be 64 bit? Best regards Lijun ___