Re: Certificate with Debian weak key issued by Let's Encrypt

2017-09-18 Thread josh--- via dev-security-policy
A report regarding this incident has been published on the Let's Encrypt community site: https://community.letsencrypt.org/t/2017-09-09-late-weak-key-revocation/42519 The text is copied here: On July 16, 2017 it was reported to Let’s Encrypt by researcher Hanno Böck that it was possible to

Re: Certificate with Debian weak key issued by Let's Encrypt

2017-09-11 Thread Alex Gaynor via dev-security-policy
I'd like to push a bit harder on searching for more systemic remediations. "We forgot to get around to revoking it" is a pretty common element of CAs' post-mortems, I think it'd be good for us to dig deeper. For example, does Let's Encrypt have a runbook that gets used on misissuance reports? Is

Re: Certificate with Debian weak key issued by Let's Encrypt

2017-09-11 Thread josh--- via dev-security-policy
This was simple human error. There isn't a programmatic fix. Our team is planning to scan our database for weak keys again early this week. In any case, any weak key certs issued prior to our July 20 fix will expire in at most 37 days. On Monday, September 11, 2017 at 8:24:49 AM UTC-5, Alex

Re: Certificate with Debian weak key issued by Let's Encrypt

2017-09-09 Thread josh--- via dev-security-policy
Thank you for bringing this oversight to our attention. The certificate in question has been revoked. The original incident report from July 16 was accidentally considered closed on the basis of a fix for our infrastructure without actually revoking the certificate that led to the report.

Certificate with Debian weak key issued by Let's Encrypt

2017-09-09 Thread Hanno Böck via dev-security-policy
Hi, A while ago I tested how some CAs would react to certificate requests with debian weak keys. I was able to get a certificate from Let's Encrypt with a debian weak key. Here is it: https://crt.sh/?id=173588030 I reported this to Let's Encrypt. They told me that they are aware they weren't