Re: Unknown Intermediates

2017-06-29 Thread Bruce via dev-security-policy
On Friday, June 16, 2017 at 1:05:37 AM UTC-4, Tavis Ormandy wrote: > Hello, I was crawling the pkcs7 blobs in public pdf files and found some > intermediate certificates that don't appear in crt.sh. > > I forwarded them to Rob, I don't know if this is useful to anyone else, but > they're

Re: FW: Bit encoding (AW: Policy 2.6 Proposal: Add prohibition on CA key generation to policy)

2018-05-14 Thread Bruce via dev-security-policy
On Wednesday, May 9, 2018 at 11:42:56 PM UTC-4, Wayne Thayer wrote: > I think we have settled on the following resolution to this issue: > > Add the following to section 5.2 (Forbidden and Required Practices): > > CAs MUST NOT generate the key pairs for end-entity certificates that have > > an

Re: Incident report: Failure to verify authenticity for some partner requests

2018-01-12 Thread Bruce via dev-security-policy
On Wednesday, January 10, 2018 at 4:24:54 PM UTC-5, Tim Hollebeek wrote: > As you know, BR 3.2.5 requires CAs to verify the authenticity of a request > for an OV certificate through a Reliable Method of Communication (RMOC). > Email can be a RMOC, but in these cases, the email address was a

Re: Do We Now Require Separate Cross-certificates for SSL and S/MIME?

2018-07-17 Thread Bruce via dev-security-policy
On Monday, July 16, 2018 at 7:25:09 PM UTC-4, Wayne Thayer wrote: > On Fri, Jul 13, 2018 at 3:50 PM Tim Hollebeek via dev-security-policy < > dev-security-policy@lists.mozilla.org> wrote: > > > Yeah, I agree I don’t think it was intended. But now that I am aware of > > the issue, I think the

Re: DRAFT September 2018 CA Communication

2018-09-07 Thread Bruce via dev-security-policy
On Thursday, September 6, 2018 at 7:44:15 PM UTC-4, Wayne Thayer wrote: > All, > > I've drafted a new email and survey that I hope to send to all CAs in the > Mozilla program next week. it focuses on compliance with the new (2.6.1) > version of our Root Store Policy. I would appreciate your

Re: Do We Now Require Separate Cross-certificates for SSL and S/MIME?

2018-07-13 Thread Bruce via dev-security-policy
t; From: dev-security-policy [mailto:dev-security-policy- > > bounces+tim.hollebeek=digicert@lists.mozilla.org] On Behalf Of Bruce via > > dev-security-policy > > Sent: Thursday, July 12, 2018 10:28 AM > > To: mozilla-dev-security-pol...@lists.mozilla.org > > Subject: Re

Re: Do We Now Require Separate Cross-certificates for SSL and S/MIME?

2018-07-12 Thread Bruce via dev-security-policy
Note the BRs define Cross Certificate as "a certificate that is used to establish a trust relationship between two Root CAs." I think the intent was to technically restrict subordinate CAs or rather CAs which are online and issue end entity certificates. My assumption is that we want to 1) not

Re: Audits for new subCAs

2018-03-28 Thread Bruce via dev-security-policy
Entrust does the following: - Each subCA certificate is created through a audited ceremony. The auditor creates a report indicating the key ID and the CPS which was used for key generation. - When it is time for the subCA to go into production, an intermediate certificate is issued from a root.

Incident Report - IP Address in dNSName form

2018-03-26 Thread Bruce via dev-security-policy
Entrust issued two certificates where the IP Address was indicated in the dNSName form. Both certificates have been revoked. The bug has been resolved. Details of the incident report can be found here, https://bugzilla.mozilla.org/show_bug.cgi?id=1448986. Thanks, Bruce.

Re: CA Communication: Underscores in dNSNames

2018-11-14 Thread Bruce via dev-security-policy
Hi Wayne, I wanted to get some clarification. For example, let's say that a Subscriber has a 1 year certificate which expires on 30 January 2019. On 15 January 2019, the remaining validity period is less than 30 days; as such, I interpret that the certificate does not have to be revoked. On

Incident Report - Entrust did not revoke all certificates with underscore characters before the 15 January 2019 dealine

2019-01-21 Thread Bruce via dev-security-policy
On January 18, 2019, Entrust discovered that 9 SSL certificates with underscore characters which were issued for more than 30 days were not revoked before 15 January 2019. All certificates were revoked on 18 January 2019. Details of the incident report can be found here,

Re: s/MIME certs and authentication

2018-12-13 Thread Bruce via dev-security-policy
On Wednesday, December 12, 2018 at 7:59:46 PM UTC-5, Jeremy Rowley wrote: > Some systems look like they verify the email address/domain name at issuance > and then never again for the same account. Other systems verify the email > address and domain every 825 days. The last set verifies the email

Incident report - Certificate issued with '-' in ST field

2018-12-04 Thread Bruce via dev-security-policy
On November 19, 2018 an SSL certificate was issued with '-' in the ST field of the subject DN. The certificate has been revoked. Details of the incident report can be found here, https://bugzilla.mozilla.org/show_bug.cgi?id=1512018. Thanks, Bruce.

Incident Report - Entrust Datacard issued certificates with the incorrect Organization Name

2019-03-15 Thread Bruce via dev-security-policy
On March 7, 2019, Entrust Datacard discovered that SSL certificates with the wrong Organization value were issued to a customer. The investigation was completed 15 March 2019. Details of the incident report can be found here, https://bugzilla.mozilla.org/show_bug.cgi?id=1535735. All

Re: Entrust Root Certification Authority - G4 Inclusion Request

2019-08-13 Thread Bruce via dev-security-policy
On Friday, July 26, 2019 at 1:25:13 PM UTC-4, Wayne Thayer wrote: > ==Bad== > * The most recent BR audit report lists two additional qualifications > related to the Network Security requirements: > ** During the Period, there were instances of some Certificate Systems not > undergoing a

Re: Entrust Root Certification Authority - G4 Inclusion Request

2019-07-29 Thread Bruce via dev-security-policy
On Friday, July 26, 2019 at 1:25:13 PM UTC-4, Wayne Thayer wrote: > ==Meh== > * BR section 2.2 requires section 4.2 of a CA’s CP and/or CPS to “clearly > specify the set of Issuer Domain Names that the CA recognises in CAA > "issue" or "issuewild" records as permitting it to issue.” The Entrust

Re: Entrust Root Certification Authority - G4 Inclusion Request

2019-07-26 Thread Bruce via dev-security-policy
On Friday, July 26, 2019 at 1:45:06 PM UTC-4, Ryan Sleevi wrote: > (In a personal capacity, as normally noted but making sure to extra-note it > here) > > Hi Wayne, > > It wasn't clear to me from the inclusion request, did Entrust give a reason > for the requested addition? For example, do they

Re: Entrust Root Certification Authority - G4 Inclusion Request

2019-10-07 Thread Bruce via dev-security-policy
On Monday, July 29, 2019 at 5:22:19 PM UTC-4, Bruce wrote: > We will update section 4.2 and 9.12.3 in the next release of the CPS. The CPS Has been updated to address the above issues, see

Re: Is issuing a certificate for a previously-reported compromised private key misissuance?

2020-03-23 Thread Bruce via dev-security-policy
On Thursday, March 19, 2020 at 2:02:39 AM UTC-4, Matt Palmer wrote: > 1. *Are* there explicit prohibitions on issuing a certificate for a private >key which has been previously submitted *to that CA* as compromised >(assuming, of course, that the prior submission was valid), and I'm just

Re: Policy 2.7.1: MRSP Issue #153: Cradle-to-Grave Contiguous Audits

2021-03-11 Thread Bruce via dev-security-policy
n of key > destruction that would be covered by an audit/auditor's statement. > On Fri, Mar 5, 2021 at 9:46 AM Bruce via dev-security-policy < > dev-secur...@lists.mozilla.org> wrote: > One more question for clarification as I want to make sure we understand how to get ou

Re: Policy 2.7.1: MRSP Issue #153: Cradle-to-Grave Contiguous Audits

2021-03-05 Thread Bruce via dev-security-policy
On Thursday, February 25, 2021 at 2:30:52 PM UTC-5, bwi...@mozilla.com wrote: > I haven't seen any response to my question about whether there is still a > concern over the language "as evidenced by a Qualified Auditor's key > destruction report". > I did add "This cradle-to-grave audit