Closed Bug 1391058 Opened 7 years ago Closed 7 years ago

PROCERT: Non-BR-Compliant Certificate Issuance

Categories

(CA Program :: CA Certificate Compliance, task)

task
Not set
normal

Tracking

(Not tracked)

RESOLVED DUPLICATE of bug 1403549

People

(Reporter: kathleen.a.wilson, Assigned: mozilla.psc.procert, NeedInfo)

References

Details

(Whiteboard: [ca-compliance] [uncategorized])

Attachments

(8 files)

The following problems have been found in certificates issued by your CA, and reported in the mozilla.dev.security.policy forum. Direct links to those discussions are provided for your convenience.

To continue inclusion of your CA’s root certificates in Mozilla’s Root Store, you must respond in this bug to provide the following information:
1) How your CA first became aware of the problems listed below (e.g. via a Problem Report, via the discussion in mozilla.dev.security.policy, or via this Bugzilla Bug), and the date.
2) Prompt confirmation that your CA has stopped issuing TLS/SSL certificates with the problems listed below.
3) Complete list of certificates that your CA finds with each of the listed issues during the remediation process. The recommended way to handle this is to ensure each certificate is logged to CT and then attach a CSV file/spreadsheet of the fingerprints or crt.sh IDs, with one list per distinct problem.
4) Summary of the problematic certificates. For each problem listed below: number of certs, date first and last certs with that problem were issued.
5) Explanation about how and why the mistakes were made, and not caught and fixed earlier.
6) List of steps your CA is taking to resolve the situation and ensure such issuance will not be repeated in the future, accompanied with a timeline of when your CA expects to accomplish these things.
7) Regular updates to confirm when those steps have been completed.

Note Section 4.9.1.1 of the CA/Browser Forum’s Baseline Requirements, which states:
“The CA SHALL revoke a Certificate within 24 hours if one or more of the following occurs: …
9. The CA is made aware that the Certificate was not issued in accordance with these Requirements or the CA’s Certificate Policy or Certification Practice Statement; 
10. The CA determines that any of the information appearing in the Certificate is inaccurate or misleading; …
14. Revocation is required by the CA’s Certificate Policy and/or Certification Practice Statement; or 
15. The technical content or format of the Certificate presents an unacceptable risk to Application Software Suppliers or Relying Parties (e.g. the CA/Browser Forum might determine that a deprecated cryptographic/signature algorithm or key size presents an unacceptable risk and that such Certificates should be revoked and replaced by CAs within a given period of time).

However, it is not our intent to introduce additional problems by forcing the immediate revocation of certificates that are not BR compliant when they do not pose an urgent security concern. Therefore, we request that your CA perform careful analysis of the situation. If there is justification to not revoke the problematic certificates, then explain those reasons and provide a timeline for when the bulks of the certificates will expire or be revoked/replaced. 

We expect that your forthcoming audit statements will indicate the findings of these problems. If your CA will not be revoking the certificates within 24 hours in accordance with the BRs, then that will also need to be listed as a finding in your CA’s BR audit statement.

We expect that your CA will work with your auditor (and supervisory body, as appropriate) and the Root Store(s) that your CA participates in to ensure your analysis of the risk and plan of remediation is acceptable. If your CA will not be revoking the problematic certificates as required by the BRs, then we recommend that you also contact the other root programs that your CA participates in to acknowledge this non-compliance and discuss what expectations their Root Programs have with respect to these certificates.


The problems reported for your CA in the mozilla.dev.security.policy forum are as follows:

** Failure to respond within 24 hours after Problem Report submitted
https://groups.google.com/d/msg/mozilla.dev.security.policy/PrsDfS8AMEk/w2AMK81jAQAJ
The problems were reported via your CA’s Problem Reporting Mechanism as listed here:
https://ccadb-public.secure.force.com/mozilla/CAInformationReport
Therefore, if this is the first time you have received notice of the problem(s) listed below, please review and fix your CA’s Problem Reporting Mechanism to ensure that it will work the next time someone reports a problem like this.

** Invalid dnsNames (e.g. invalid characters, internal names, and wildcards in the wrong position)
https://groups.google.com/d/msg/mozilla.dev.security.policy/CfyeeybBz9c/lmmUT4x2CAAJ
https://groups.google.com/d/msg/mozilla.dev.security.policy/D0poUHqiYMw/Pf5p0kB7CAAJ

** URI in dNSName SAN
https://groups.google.com/d/msg/mozilla.dev.security.policy/etp2Yz2fmM4/ayBTsfJnBgAJ

** Reserved IP addresses
https://groups.google.com/d/msg/mozilla.dev.security.policy/inocepURbNQ/MmkeMvhyCAAJ

** Common Name not in SAN
https://groups.google.com/d/msg/mozilla.dev.security.policy/K3sk5ZMv2DE/4oVzlN1xBgAJ
There is no wrong issue, let’s see


The SAN field is in fulfillment of the standard, please check the information registered bellow


Subject Alternative Name

    DNS Name=http://ripac.insopesca.gob.ve

     Other name:

     2.16.862.2.2=0c 0c 47 2d 32 30 30 30 30 33 33 39 2d 31

     IP Direction=190.9.130.7

    Other Name:

    1.3.6.1.2.1.32=0c 15 64 6e 73 31 2e 69 6e 73 6f 70 65 73 63 61 2e 6 7 6f 62 2e 76 65

 
• The DNS name can be solved without any problem, please check the pdf file attachment. That evidence fullfiment the CA Forum Ballon, According to the recommendation of Mozilla in the SAN must contain FQDN (the fully qualified domain name) of the contractor's server, which is fulfilled, as demonstrated in previous mail, what is not stipulated is whether it should contain http or not in the field, and I refer to the regulations of the CAB Forum at this point. Additionally, it complies with the RFC for the FQDN.  


• The first Other Name duly comply with the OID standard and corresponds to the RIF (company tax number in Venezuela) of the contracting company, this correspond a formal request from SUSCERTE (Venezuela Government Agency) and is regulated in our corresponding CPS and CP, the second Other Name corresponds to the primary DNS of the DNS registered by the contracting company, both are regulated by the OID registry and in our CPS and CP.


• The IP Address corresponds to a public IP address. This meets the requirements of the CA Forum.


Based on the evidence provided and the indicated standard, the issuance of the certificate was executed under standard and does not generate problems
(In reply to alejandrovolcan from comment #1)
> There is no wrong issue, let’s see
> 
> 
> The SAN field is in fulfillment of the standard, please check the
> information registered bellow
> 
> 
> Subject Alternative Name
> 
>     DNS Name=http://ripac.insopesca.gob.ve
> 
>      Other name:
> 
>      2.16.862.2.2=0c 0c 47 2d 32 30 30 30 30 33 33 39 2d 31
> 
>      IP Direction=190.9.130.7
> 
>     Other Name:
> 
>     1.3.6.1.2.1.32=0c 15 64 6e 73 31 2e 69 6e 73 6f 70 65 73 63 61 2e 6 7 6f
> 62 2e 76 65
> 
>  
> • The DNS name can be solved without any problem, please check the pdf file
> attachment. That evidence fullfiment the CA Forum Ballon, According to the
> recommendation of Mozilla in the SAN must contain FQDN (the fully qualified
> domain name) of the contractor's server, which is fulfilled, as demonstrated
> in previous mail, what is not stipulated is whether it should contain http
> or not in the field, and I refer to the regulations of the CAB Forum at this
> point. Additionally, it complies with the RFC for the FQDN.  

This is quite incorrect.

See RFC 5280, Section 4.2.1.6, which clearly states:

   When the subjectAltName extension contains a domain name system
   label, the domain name MUST be stored in the dNSName (an IA5String).
   The name MUST be in the "preferred name syntax", as specified by
   Section 3.5 of [RFC1034] and as modified by Section 2.1 of
   [RFC1123]. 

These give clear directions as to what the contents of this field are, aka the "LDH rule" (letters digits hyphens), which explicitly precludes : and /

However, even if one was not bothered to look at RFC 1034 or RFC 1123, the immediate following paragraph would hopefully be clear and unambiguous:

   When the subjectAltName extension contains a URI, the name MUST be
   stored in the uniformResourceIdentifier (an IA5String).

As this is a URI, it is clearly stored in the wrong field.

Even if we were to further ignore the RFCs, as PROCERT has, the Baseline Requirements are similarly clear and unambiguous in the definitions for this case:

A Domain Name is "The label assigned to a node in the Domain Name System."
A Fully-Qualified Domain Name is "A Domain Name that includes the labels of all superior nodes in the Internet Domain Name System"

The Baseline Requirements permit FQDNs to be placed in the dNSName of the subjectAltName. By including a URI, it is no longer a Domain Name or FQDN.

> 
> • The first Other Name duly comply with the OID standard and corresponds to
> the RIF (company tax number in Venezuela) of the contracting company, this
> correspond a formal request from SUSCERTE (Venezuela Government Agency) and
> is regulated in our corresponding CPS and CP, the second Other Name
> corresponds to the primary DNS of the DNS registered by the contracting
> company, both are regulated by the OID registry and in our CPS and CP.

That's great, but that's explicitly not permitted by the Baseline Requirements.

Section 7.1.4.2.1 states that, for the subjectAltName, "Each entry MUST be either a dNSName containing the Fully-Qualified Domain Name or an iPAddress containing the IP address of a server".

As the Other Name is neither of these types, it is a violation of the Baseline Requirements. As the Baseline Requirements supercede your CP/CPS (Per Section 2.2 of the Baseline Requirements), it is not acceptable to simply state that you've documented it as such.

There is only one reason permissible to include an Other Name - and that is by invoking the terms in Section 9.16.3. I cannot find a detailed reference to the Law requiring such non-conformance in your CPS (https://www.procert.net.ve/documentos/AC-D-0003.pdf ), nor can I find record of such a message to questions@cabforum.org

> Based on the evidence provided and the indicated standard, the issuance of
> the certificate was executed under standard and does not generate problems

Based on the explicit references provided, the issuance of this certificate does not comply with the indicated technical standards nor the industry requirements. As such, it was misissued and non-compliant with the requirements for participation in the Mozilla Root Program.
There are three other unrevoked certificates that were identified and reported as misissued:


https://crt.sh/?id=99500277&opt=cablint

In addition to the disallowed Other Names, this certificate has an ipAddress SAN containing a Reserved IP Address. This is prohibited by Baseline Requirements section 7.1.4.2.1.


https://crt.sh/?id=175466182&opt=cablint

In addition to the disallowed Other Names, this certificate has contains dnsName SANs with Internal Names. This is prohibited by Baseline Requirements section 7.1.4.2.1.


https://crt.sh/?id=151828400&opt=cablint

In addition to the disallowed otherNames, this certificate has a subject commonName that is not present as a dnsName SAN. This is prohibited by Baseline Requirements section 7.1.4.2.2(a).
As reported on m.d.s.p., PROCERT is issuing certs with evidently non-random serial numbers:

https://www.mail-archive.com/dev-security-policy@lists.mozilla.org/msg07807.html

Here's a list of certs on misissued.com: https://misissued.com/batch/12/
PROCERT's OCSP responder seems to return an OCSP status of "Good" for unissued certificates, in violation of BR section 4.9.10.  This OCSP response is for the serial number badca000badca000badca000badca000badca000badca000badca000badca000badca000badca000badca000badca000badca000badca000badca000 which is unlikely to correspond to an issued certificate.

As a side note, the OCSP response is signed with SHA-1, and since it reflects an attacker-controlled serial number, is vulnerable to a chosen prefix attack.  This is not against policy but is certainly bad practice.
Can you please confirm that you received these four problem reports via email? If you didn't, please investigate and provide an explanation for why you didn't and what you're doing to fix it.

  From: Jonathan Rudenberg <jonathan@titanous.com>
  Subject: Misissuance - invalid characters in certificate SAN dnsNames
  Message-Id: <023889B5-9EA9-414E-8A9B-753A3452D1A3@titanous.com>
  Date: Mon, 7 Aug 2017 21:07:38 -0400
  To: contacto@procert.net.ve

  From: Jonathan Rudenberg <jonathan@titanous.com>
  Subject: Misissuance - Common Name not in SAN
  Message-Id: <3AAF71AB-8C11-43E0-8361-DEF14D5AB63C@titanous.com>
  Date: Mon, 7 Aug 2017 21:22:49 -0400
  To: contacto@procert.net.ve

  From: Jonathan Rudenberg <jonathan@titanous.com>
  Subject: Misissuance - reserved IP addresses
  Message-Id: <6F5A2E0C-293F-47A1-8E5A-270D9BE19502@titanous.com>
  Date: Sat, 12 Aug 2017 21:55:59 -0400
  To: contacto@procert.net.ve

  From: Jonathan Rudenberg <jonathan@titanous.com>
  Subject: Misissuance - invalid dnsNames 
  Message-Id: <9625EA61-CC2D-411A-A124-BF86A0D930A0@titanous.com>
  Date: Sun, 13 Aug 2017 00:43:29 -0400
  To: contacto@procert.net.ve
Kathleen: I am concerned about the lack of replies to comment #3, but even more concerned about the critical issues highlighted in Comment #4, Comment #5, and Comment #6. Holistically, this shows a lack of awareness or adherence to RFC5280 and the Baseline Requirements, particularly around well-publicized mitigations (for example, lessons learned from the active compromise of past CAs), and thus, this CA may be egregiously out of compliance with Mozilla policy.

PROCERT: Can you please indicate when you expect an updated reply, and if it is not within the next 48 hours, why the delay? Please note that the continued participation in the Mozilla Root Store will, in part, be judged based on how comprehensively you can report on the issues highlighted, the underlying causes, and the steps being taken to remedy. Absent a significantly compelling response, my advice would be that the community consider removing this root from distribution and/or moving to block it.
Test OCSP
certificate good

C:\OpenSSL-Win32\bin>openssl.exe ocsp -issuer PSCProcert.pem -cert prueba.pem -url http://ura.procert.net.ve/ocsp -text -noverify -no_nonce
OCSP Request Data:
    Version: 1 (0x0)
    Requestor List:
        Certificate ID:
          Hash Algorithm: sha1
          Issuer Name Hash: E6577AE996DAD0109B34FFCF7EC433EA16C891EA
          Issuer Key Hash: 410F1938AA997F420BA4D7279854A2174C2D5154
          Serial Number: 1F9E3DD8000000000CD7
OCSP Response Data:
    OCSP Response Status: successful (0x0)
    Response Type: Basic OCSP Response
    Version: 1 (0x0)
    Responder Id: 4C9E193241D33969F0AAC858944ED38296B1718C
    Produced At: Aug 23 13:14:04 2017 GMT
    Responses:
    Certificate ID:
      Hash Algorithm: sha1
      Issuer Name Hash: E6577AE996DAD0109B34FFCF7EC433EA16C891EA
      Issuer Key Hash: 410F1938AA997F420BA4D7279854A2174C2D5154
      Serial Number: 1F9E3DD8000000000CD7
    Cert Status: good
    This Update: Aug 22 15:36:32 2017 GMT
    Next Update: Aug 23 15:36:32 2017 GMT
        Response Single Extensions:
            1.3.6.1.4.1.311.21.4:
170823153632Z   .

    Signature Algorithm: sha1WithRSAEncryption
        15:dd:a7:f0:e3:1e:8d:c6:31:7c:7e:f2:ce:4b:11:37:60:2d:
        50:23:32:20:5f:b5:b0:a8:48:47:d6:4f:da:19:a8:cb:0e:f1:
        2f:76:d5:00:e5:c5:06:c2:bb:d4:c2:d6:6c:2f:a2:e5:d8:52:
        53:3b:4b:e7:40:9b:5b:63:97:2e:62:61:6f:53:cb:ab:ad:0f:
        58:28:5a:f4:79:10:bd:33:9b:a7:e5:19:cb:1e:8d:49:53:34:
        eb:ca:59:37:90:e7:c0:0a:cf:36:d7:fd:e5:24:ec:2a:f0:6f:
        57:e5:9f:15:bd:38:87:76:a8:0a:32:94:cd:3b:5d:00:75:a3:
        b6:1a
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            75:0b:a7:bd:00:00:00:00:09:8d
        Signature Algorithm: sha256WithRSAEncryption
        Issuer: emailAddress=contacto@procert.net.ve, L=Chacao, ST=Miranda, OU=Proveedor de Certificados PROCERT, O=Sistema Nacional de Certificacion Electronica, C=VE, CN=PSCProcert
        Validity
            Not Before: Dec 12 20:12:58 2016 GMT
            Not After : Dec 12 20:12:58 2017 GMT
        Subject: C=VE, O=PROCERT, CN=ura.procert.net.ve
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (1024 bit)
                Modulus:
                    00:9d:1c:28:86:f1:fd:a6:0a:60:56:91:e0:6f:01:
                    36:76:93:90:aa:d2:34:38:72:4c:4a:bd:86:d4:0d:
                    ce:46:34:d9:2e:21:0c:b4:93:fc:5b:ce:04:60:b5:
                    a1:63:46:22:30:43:37:03:ee:93:19:69:2e:08:d2:
                    9e:13:87:29:54:4e:fe:dd:ad:dc:c6:8e:1b:ac:a8:
                    df:6f:e6:e9:6d:88:d6:7b:a4:8e:1a:af:82:e4:f5:
                    b4:30:29:da:99:c4:6f:a0:e4:ce:39:28:24:ae:dd:
                    8b:44:3d:73:3a:85:09:85:22:8d:95:e2:bc:ef:8d:
                    a0:a9:3f:27:43:a5:be:b9:8b
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Extended Key Usage:
                OCSP Signing
            OCSP No Check:

            X509v3 Subject Key Identifier:
                4C:9E:19:32:41:D3:39:69:F0:AA:C8:58:94:4E:D3:82:96:B1:71:8C
            X509v3 Key Usage: critical
                Digital Signature
            X509v3 Authority Key Identifier:
                keyid:41:0F:19:38:AA:99:7F:42:0B:A4:D7:27:98:54:A2:17:4C:2D:51:54
                DirName:/CN=Autoridad de Certificacion Raiz del Estado Venezolano/C=VE/L=Caracas/ST=Distrito Capital/O=Sistema Nacional de Certificacion Electronica/OU=Superintendencia de Servicios de Certificacion Electronica/emailAddress=acraiz@suscerte.gob.ve
                serial:0B

            X509v3 Basic Constraints:
                CA:FALSE
            X509v3 Certificate Policies:
                Policy: 2.16.862.11.2.1
                  CPS: http://www.procert.net.ve/dpc-pc

            X509v3 Issuer Alternative Name:
                DNS:procert.net.ve, othername:<unsupported>, othername:<unsupported>
    Signature Algorithm: sha256WithRSAEncryption
        38:05:28:31:f3:38:08:2e:b0:34:67:93:d3:85:e5:8d:46:a1:
        ba:e6:1d:5c:77:39:24:8e:52:0b:dd:c7:36:15:0b:04:08:b9:
        55:6d:e0:0a:55:02:39:0e:5b:24:3e:72:49:8b:d5:bb:59:28:
        58:a9:1d:fa:33:25:2f:92:08:f6:13:82:e4:25:f7:11:5a:0a:
        44:08:08:af:0a:6e:39:de:d8:82:de:2b:1f:34:b3:ee:0c:af:
        39:ff:47:8b:98:27:35:57:c3:7f:13:03:ef:7c:87:46:44:73:
        57:80:9e:f3:1d:5d:68:fd:93:70:ee:30:87:73:f6:54:24:c6:
        65:02:d5:da:2e:b6:d6:ae:1a:66:ce:c2:9e:fc:88:2e:88:6e:
        a7:58:71:55:89:1b:b1:f5:7a:73:31:d4:f2:ea:ef:35:e5:fe:
        d6:51:20:63:6c:42:90:16:f4:1c:2b:3f:ce:14:0c:f8:0d:c4:
        df:b0:38:95:0f:0a:d5:d2:05:41:03:e6:44:f6:3e:51:7c:c9:
        2c:3c:ef:aa:99:ba:d2:39:e0:48:b2:7c:12:d5:b1:44:6e:e6:
        99:90:2e:c0:bc:ac:b3:3d:73:25:bb:56:9b:84:c4:b9:75:7e:
        90:3d:fd:9a:b0:39:cb:7e:f0:f6:c1:59:c0:c6:7f:e2:4b:a6:
        59:da:46:bc:d7:98:5c:ff:ac:5f:b8:53:3b:a6:16:06:a6:8f:
        62:04:00:31:4b:04:1a:10:24:99:e8:3c:44:73:88:b5:1a:69:
        3d:59:a9:bb:86:45:33:cf:52:af:52:f5:5e:08:d6:b2:d9:14:
        e0:7f:05:5b:10:76:72:6e:05:4d:28:c9:0d:71:55:e8:80:f6:
        e8:a2:8d:88:63:d0:90:4c:e6:0f:e9:3f:7b:6c:14:2b:61:f2:
        49:2b:45:d9:12:3b:dd:bd:1b:01:95:0b:02:a6:84:db:c3:a5:
        40:20:f1:c4:3b:24:6b:b1:e5:25:76:a9:e7:04:4c:75:3f:a7:
        f8:58:8c:bd:aa:f7:5d:f4:8b:5d:31:0c:5e:51:9a:2c:78:67:
        d2:98:4e:7a:e5:85:e3:06:d8:5c:14:94:18:2f:75:4c:ab:80:
        04:a5:8d:14:3a:7a:d6:bb:10:a3:bf:75:82:e4:17:13:51:3c:
        d3:1c:6a:01:c5:13:1a:8d:ce:cc:0d:35:29:7c:2d:6d:6e:6d:
        af:8b:4d:97:ef:75:3f:a4:12:2c:e4:34:d8:c2:cf:39:0f:4e:
        9c:19:65:2e:5b:ac:d6:51:9f:30:32:9a:c7:ef:13:76:c2:4d:
        ee:7c:7a:52:c9:b3:a5:c2:90:52:44:af:97:0b:62:87:34:48:
        ca:aa:14:c5:8c:41:17:c8
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
prueba.pem: good
        This Update: Aug 22 15:36:32 2017 GMT
        Next Update: Aug 23 15:36:32 2017 GMT
-------------------------------------------------------------------------------------------------------
certificate revoked


C:\OpenSSL-Win32\bin>openssl.exe ocsp -issuer PSCProcert.pem -cert prueba.pem -url http://ura.procert.net.ve/ocsp -text -noverify -no_nonce
OCSP Request Data:
    Version: 1 (0x0)
    Requestor List:
        Certificate ID:
          Hash Algorithm: sha1
          Issuer Name Hash: E6577AE996DAD0109B34FFCF7EC433EA16C891EA
          Issuer Key Hash: 410F1938AA997F420BA4D7279854A2174C2D5154
          Serial Number: 1F9E3DD8000000000CD7
OCSP Response Data:
    OCSP Response Status: successful (0x0)
    Response Type: Basic OCSP Response
    Version: 1 (0x0)
    Responder Id: 4C9E193241D33969F0AAC858944ED38296B1718C
    Produced At: Aug 23 16:07:41 2017 GMT
    Responses:
    Certificate ID:
      Hash Algorithm: sha1
      Issuer Name Hash: E6577AE996DAD0109B34FFCF7EC433EA16C891EA
      Issuer Key Hash: 410F1938AA997F420BA4D7279854A2174C2D5154
      Serial Number: 1F9E3DD8000000000CD7
    Cert Status: revoked
    Revocation Time: Aug 23 13:26:27 2017 GMT
    Revocation Reason: superseded (0x4)
    This Update: Aug 23 15:36:34 2017 GMT
    Next Update: Aug 24 15:36:34 2017 GMT
        Response Single Extensions:
            1.3.6.1.4.1.311.21.4:
170824153634Z   .

    Signature Algorithm: sha1WithRSAEncryption
        16:8a:dc:76:0e:3c:05:b5:2e:3a:cb:c9:f0:22:02:08:0e:0e:
        76:49:fa:5f:1b:f0:7b:77:94:0f:3a:df:5a:e5:97:60:f3:b6:
        50:12:95:c8:48:26:80:e8:1d:5a:c9:f1:19:0c:4c:07:73:3f:
        ce:4e:ec:30:e6:d9:1d:8e:5b:26:68:a5:ce:c9:d7:4d:2b:f8:
        27:3b:8c:66:80:93:76:63:b9:8b:04:43:27:87:03:67:b1:05:
        31:25:62:7b:c0:8d:8f:3f:eb:19:e8:9e:09:51:40:0b:71:ad:
        9e:45:4d:99:48:d1:dc:fc:2b:d1:f4:e0:d5:86:df:2e:4c:35:
        4c:3d
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            75:0b:a7:bd:00:00:00:00:09:8d
        Signature Algorithm: sha256WithRSAEncryption
        Issuer: emailAddress=contacto@procert.net.ve, L=Chacao, ST=Miranda, OU=Proveedor de Certificados PROCERT, O=Sistema Nacional de Certificacion Electronica, C=VE, CN=PSCProcert
        Validity
            Not Before: Dec 12 20:12:58 2016 GMT
            Not After : Dec 12 20:12:58 2017 GMT
        Subject: C=VE, O=PROCERT, CN=ura.procert.net.ve
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (1024 bit)
                Modulus:
                    00:9d:1c:28:86:f1:fd:a6:0a:60:56:91:e0:6f:01:
                    36:76:93:90:aa:d2:34:38:72:4c:4a:bd:86:d4:0d:
                    ce:46:34:d9:2e:21:0c:b4:93:fc:5b:ce:04:60:b5:
                    a1:63:46:22:30:43:37:03:ee:93:19:69:2e:08:d2:
                    9e:13:87:29:54:4e:fe:dd:ad:dc:c6:8e:1b:ac:a8:
                    df:6f:e6:e9:6d:88:d6:7b:a4:8e:1a:af:82:e4:f5:
                    b4:30:29:da:99:c4:6f:a0:e4:ce:39:28:24:ae:dd:
                    8b:44:3d:73:3a:85:09:85:22:8d:95:e2:bc:ef:8d:
                    a0:a9:3f:27:43:a5:be:b9:8b
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Extended Key Usage:
                OCSP Signing
            OCSP No Check:

            X509v3 Subject Key Identifier:
                4C:9E:19:32:41:D3:39:69:F0:AA:C8:58:94:4E:D3:82:96:B1:71:8C
            X509v3 Key Usage: critical
                Digital Signature
            X509v3 Authority Key Identifier:
                keyid:41:0F:19:38:AA:99:7F:42:0B:A4:D7:27:98:54:A2:17:4C:2D:51:54
                DirName:/CN=Autoridad de Certificacion Raiz del Estado Venezolano/C=VE/L=Caracas/ST=Distrito Capital/O=Sistema Nacional de Certificacion Electronica/OU=Superintendencia de Servicios de Certificacion Electronica/emailAddress=acraiz@suscerte.gob.ve
                serial:0B

            X509v3 Basic Constraints:
                CA:FALSE
            X509v3 Certificate Policies:
                Policy: 2.16.862.11.2.1
                  CPS: http://www.procert.net.ve/dpc-pc

            X509v3 Issuer Alternative Name:
                DNS:procert.net.ve, othername:<unsupported>, othername:<unsupported>
    Signature Algorithm: sha256WithRSAEncryption
        38:05:28:31:f3:38:08:2e:b0:34:67:93:d3:85:e5:8d:46:a1:
        ba:e6:1d:5c:77:39:24:8e:52:0b:dd:c7:36:15:0b:04:08:b9:
        55:6d:e0:0a:55:02:39:0e:5b:24:3e:72:49:8b:d5:bb:59:28:
        58:a9:1d:fa:33:25:2f:92:08:f6:13:82:e4:25:f7:11:5a:0a:
        44:08:08:af:0a:6e:39:de:d8:82:de:2b:1f:34:b3:ee:0c:af:
        39:ff:47:8b:98:27:35:57:c3:7f:13:03:ef:7c:87:46:44:73:
        57:80:9e:f3:1d:5d:68:fd:93:70:ee:30:87:73:f6:54:24:c6:
        65:02:d5:da:2e:b6:d6:ae:1a:66:ce:c2:9e:fc:88:2e:88:6e:
        a7:58:71:55:89:1b:b1:f5:7a:73:31:d4:f2:ea:ef:35:e5:fe:
        d6:51:20:63:6c:42:90:16:f4:1c:2b:3f:ce:14:0c:f8:0d:c4:
        df:b0:38:95:0f:0a:d5:d2:05:41:03:e6:44:f6:3e:51:7c:c9:
        2c:3c:ef:aa:99:ba:d2:39:e0:48:b2:7c:12:d5:b1:44:6e:e6:
        99:90:2e:c0:bc:ac:b3:3d:73:25:bb:56:9b:84:c4:b9:75:7e:
        90:3d:fd:9a:b0:39:cb:7e:f0:f6:c1:59:c0:c6:7f:e2:4b:a6:
        59:da:46:bc:d7:98:5c:ff:ac:5f:b8:53:3b:a6:16:06:a6:8f:
        62:04:00:31:4b:04:1a:10:24:99:e8:3c:44:73:88:b5:1a:69:
        3d:59:a9:bb:86:45:33:cf:52:af:52:f5:5e:08:d6:b2:d9:14:
        e0:7f:05:5b:10:76:72:6e:05:4d:28:c9:0d:71:55:e8:80:f6:
        e8:a2:8d:88:63:d0:90:4c:e6:0f:e9:3f:7b:6c:14:2b:61:f2:
        49:2b:45:d9:12:3b:dd:bd:1b:01:95:0b:02:a6:84:db:c3:a5:
        40:20:f1:c4:3b:24:6b:b1:e5:25:76:a9:e7:04:4c:75:3f:a7:
        f8:58:8c:bd:aa:f7:5d:f4:8b:5d:31:0c:5e:51:9a:2c:78:67:
        d2:98:4e:7a:e5:85:e3:06:d8:5c:14:94:18:2f:75:4c:ab:80:
        04:a5:8d:14:3a:7a:d6:bb:10:a3:bf:75:82:e4:17:13:51:3c:
        d3:1c:6a:01:c5:13:1a:8d:ce:cc:0d:35:29:7c:2d:6d:6e:6d:
        af:8b:4d:97:ef:75:3f:a4:12:2c:e4:34:d8:c2:cf:39:0f:4e:
        9c:19:65:2e:5b:ac:d6:51:9f:30:32:9a:c7:ef:13:76:c2:4d:
        ee:7c:7a:52:c9:b3:a5:c2:90:52:44:af:97:0b:62:87:34:48:
        ca:aa:14:c5:8c:41:17:c8
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
prueba.pem: revoked
        This Update: Aug 23 15:36:34 2017 GMT
        Next Update: Aug 24 15:36:34 2017 GMT
Operador: the issue raised is that your OCSP responder returns "good" for non-existent certificates, not for revoked certificates. (That would be an even bigger problem!) Can you address that concern?

Gerv
I recommend, please 
supply command or method, which are used for testing, to give a better response 
thanks
comment #1 Action Taken = Certificate revoked
comment #6 Action Taken =  The test was performed with a certificate not issued by the CA Procert
Test responder ocsp

Certificate not issued by CA PROCERT

C:\OpenSSL-Win32\bin>openssl.exe ocsp -issuer PSCProcert.pem -cert ssl.pem -url http://ura.procert.net.ve/ocsp -text -noverify -no_nonce
OCSP Request Data:
    Version: 1 (0x0)
    Requestor List:
        Certificate ID:
          Hash Algorithm: sha1
          Issuer Name Hash: B1B439179016B797795011F160B9D4A23CDBEDEE
          Issuer Key Hash: 410F1938AA997F420BA4D7279854A2174C2D5154
          Serial Number: 0100212588B0FA59A777EF057B6627DF
Responder Error: unauthorized (6)

comment #4 Action Taken = Is being corrected

comment #5 Action Taken = Working on it

At the same time, steps are being taken to avoid these drawbacks
Operador,

The example certificate you provided to demonstrate OCSP responses has a 1024-bit RSA keys, which is a violation of the BRs:
- https://crt.sh/?id=197068798&opt=cablint

Can you please provide the full post-mortem details that Kathleen described for this issue -- in particular I'd say that it's imperative that you scan your database of certificates to see if there are more instances of issuance of certificates with disallowed weak keys.
(In reply to Alex Gaynor [:Alex_Gaynor] from comment #13)
> Operador,
> 
> The example certificate you provided to demonstrate OCSP responses has a
> 1024-bit RSA keys, which is a violation of the BRs:
> - https://crt.sh/?id=197068798&opt=cablint
> 
> Can you please provide the full post-mortem details that Kathleen described
> for this issue -- in particular I'd say that it's imperative that you scan
> your database of certificates to see if there are more instances of issuance
> of certificates with disallowed weak keys.

The certificate that is referenced is expired, is it 2012, the company policy is maintained in the database as reference or historical data, PSC PROCERT does not issue certificates with 1024 key since 2013


Comment 3 We are communicating with the companies for the referral of the affected certificates, and then issue the certificates again, modifying the details that are mentioned, in a 48 hours that certificates are revoked and issued
The certificate I linked is not expired, it expires in December of 2017.
Comment 14 edit PSC PROCERT does not issue certificates with 1024 key since 2010
The certificate is "Google Internet Authority G2" was used to test the response of the ocsp, responding to comment # 6, the certificate is not from the CA PSC Procert

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----



PSC PROCERT does not issue certificates with 1024 keys since 2010
(In reply to Operador from comment #12)
> comment #1 Action Taken = Certificate revoked
> comment #6 Action Taken =  The test was performed with a certificate not
> issued by the CA Procert
> Test responder ocsp
> 
> Certificate not issued by CA PROCERT
> 
> C:\OpenSSL-Win32\bin>openssl.exe ocsp -issuer PSCProcert.pem -cert ssl.pem
> -url http://ura.procert.net.ve/ocsp -text -noverify -no_nonce
> OCSP Request Data:
>     Version: 1 (0x0)
>     Requestor List:
>         Certificate ID:
>           Hash Algorithm: sha1
>           Issuer Name Hash: B1B439179016B797795011F160B9D4A23CDBEDEE
>           Issuer Key Hash: 410F1938AA997F420BA4D7279854A2174C2D5154
>           Serial Number: 0100212588B0FA59A777EF057B6627DF
> Responder Error: unauthorized (6)
> 
> comment #4 Action Taken = Is being corrected
> 
> comment #5 Action Taken = Working on it
> 
> At the same time, steps are being taken to avoid these drawbacks

This does not address the issue in comment 6. Observe:

openssl ocsp -issuer PSCProcert.pem -serial 1234567890123456789012345678901234567890 -url http://ura.procert.net.ve/ocsp -text -noverify -no_nonce

OCSP Request Data:
    Version: 1 (0x0)
    Requestor List:
        Certificate ID:
          Hash Algorithm: sha1
          Issuer Name Hash: E6577AE996DAD0109B34FFCF7EC433EA16C891EA
          Issuer Key Hash: 410F1938AA997F420BA4D7279854A2174C2D5154
          Serial Number: 03A0C92075C0DBF3B8ACBC5F96CE3F0AD2
OCSP Response Data:
...snip...
1234567890123456789012345678901234567890: good
	This Update: Aug 23 15:36:34 2017 GMT
	Next Update: Aug 24 15:36:34 2017 GMT

Any serial number provided that is not revoked is returning a good response. Baseline requirements explicitly forbids this behavior in section 4.9.10 (and it has been this way for over 4 years).

(In reply to alejandrovolcan from comment #16)
> Comment 14 edit PSC PROCERT does not issue certificates with 1024 key since
> 2010

This statement is directly contradicted by the certificate Alex has already linked (https://crt.sh/?id=197068798&opt=cablint).
PSC Procert has not issued a 1024 certificate since 2010 for end users,
We keep working properly and responding to each of the comments provided in the forum.

In-depth analysis of this situation is taking place simultaneously.

Communicate with each of the customers of the affected certificates. For its prompt revocation and acquisition of a new certificate, in a way that does not cause significant inconvenience to end users
(In reply to Operador from comment #19)
> PSC Procert has not issued a 1024 certificate since 2010 for end users,

Have you issued a 1024-bit certificate for any party, including PSC Procert?

That is, in the totality of certificates issued since 2010, do any contain a subjectPublicKeyInfo which contains a key size less than 2048 bits?

If so, then please list them, consistent with
> 3) Complete list of certificates that your CA finds with each of the listed issues during the remediation process. The recommended way to handle this is to ensure each certificate is logged to CT and then attach a CSV file/spreadsheet of the fingerprints or crt.sh IDs, with one list per distinct problem.
Good afternoon

Comment 20

We have reviewed the comments, actually when the query is done using the serial parameter, and query returns a response "good", we are reviewing this to prevent it from happening, but this type of query is not common since the standard  and instructions from other authorities indicates that it must give the certificate for validating, this with the -cert parameter, an example of this we can see in the following query examples

****** Activate Certificate ******

openssl ocsp -issuer procert.cer -cert activo.cer -url http://ura.procert.net.ve/ocsp -noverify -text
OCSP Request Data:
    Version: 1 (0x0)
    Requestor List:
        Certificate ID:
          Hash Algorithm: sha1
          Issuer Name Hash: E6577AE996DAD0109B34FFCF7EC433EA16C891EA
          Issuer Key Hash: 410F1938AA997F420BA4D7279854A2174C2D5154
          Serial Number: 1ADB2884000000000888
    Request Extensions:
        OCSP Nonce: 
            0410B5210C291E6933A93488C06C1A503B63
OCSP Response Data:
    OCSP Response Status: successful (0x0)
    Response Type: Basic OCSP Response
    Version: 1 (0x0)
    Responder Id: 4164657A16535457E7C33ABA3F779F3CD0BEEA27
    Produced At: Aug 24 22:30:59 2017 GMT
    Responses:
    Certificate ID:
      Hash Algorithm: sha1
      Issuer Name Hash: E6577AE996DAD0109B34FFCF7EC433EA16C891EA
      Issuer Key Hash: 410F1938AA997F420BA4D7279854A2174C2D5154
      Serial Number: 1ADB2884000000000888
    Cert Status: good
    This Update: Aug 24 15:36:36 2017 GMT
    Next Update: Aug 25 15:36:36 2017 GMT
        Response Single Extensions:
            1.3.6.1.4.1.311.21.4: 
170825153636Z   .

    Response Extensions:
        OCSP Nonce: 
            0410B5210C291E6933A93488C06C1A503B63
    Signature Algorithm: sha1WithRSAEncryption
         8d:3a:43:a7:65:6f:8b:b7:55:e0:d8:8b:42:3d:e2:6e:df:8b:
         5e:7f:06:0c:78:60:f5:e9:75:55:82:95:88:ca:f8:a7:f5:13:
         e0:ca:fb:33:88:a3:79:0d:91:cf:5e:b3:6d:b8:5c:b5:3f:fa:
         b3:e8:dc:a3:8b:8d:6b:41:ba:33:ff:fd:5c:ed:00:b4:23:8d:
         45:dc:53:51:46:d7:dc:96:85:89:1a:b6:24:10:e3:ed:25:22:
         51:a9:e2:08:bb:85:39:b5:2a:5c:a4:04:ba:81:4a:8c:22:07:
         cd:31:ae:d2:2e:d0:b4:d5:71:6a:c7:9f:ee:5d:fd:61:18:57:
         39:4d:9c:cc:ff:75:b7:eb:93:31:da:ce:59:4a:ad:e9:f8:a2:
         0d:76:7c:a4:be:fa:4f:60:0e:cd:7a:1d:0e:9b:25:a9:50:97:
         d9:03:ee:82:19:46:9a:e5:36:57:7f:0c:bd:7f:4d:12:91:c4:
         3f:03:57:b8:90:db:7d:b3:09:2f:fa:f3:64:3c:6b:c0:64:15:
         f9:3a:c8:5f:07:dd:60:26:a1:c7:19:18:1c:10:23:f7:ea:79:
         57:1d:a4:85:f9:85:37:62:bd:65:a9:2f:84:ea:79:6c:25:85:
         ac:82:eb:99:6d:9c:84:07:8f:5a:20:95:fb:12:83:0f:93:db:
         76:1d:be:2f
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            14:76:cd:06:00:00:00:00:0c:e4
    Signature Algorithm: sha256WithRSAEncryption
        Issuer: emailAddress=contacto@procert.net.ve, L=Chacao, ST=Miranda, OU=Proveedor de Certificados PROCERT, O=Sistema Nacional de Certificacion Electronica, C=VE, CN=PSCProcert
        Validity
            Not Before: Aug 24 11:46:15 2017 GMT
            Not After : Aug 24 11:46:15 2018 GMT
        Subject: C=VE, O=PROCERT, CN=ura.procert.net.ve
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (2048 bit)
                Modulus:
                    00:ac:9f:27:49:96:7c:23:06:82:c7:55:93:2a:d3:
                    ed:4d:18:31:7f:99:e4:59:3c:6e:41:65:58:b6:5d:
                    a0:82:d5:06:cf:38:ed:e5:59:fa:2b:ef:e0:e5:de:
                    66:d3:82:d9:6c:a5:ea:c5:7f:5e:58:1a:72:2e:ad:
                    fc:53:ff:ce:e2:03:51:e9:f0:59:8f:63:01:c9:a2:
                    74:69:20:14:5e:22:f1:65:1a:ef:73:0f:f2:9a:ba:
                    84:08:3a:09:28:40:a5:97:77:71:82:30:50:06:12:
                    56:90:a1:7a:b8:68:cc:5e:61:7a:04:5d:bb:cf:af:
                    61:6a:80:a6:d8:4e:a5:02:e9:12:6e:1b:1c:f2:76:
                    04:a6:61:a2:c1:39:fc:cb:62:9a:2d:53:64:d5:96:
                    3e:9e:3f:fd:de:e4:ca:92:f6:b6:fa:e0:28:eb:ea:
                    69:ab:70:bb:9e:ab:12:08:f2:97:07:8c:58:72:15:
                    37:72:dd:82:fc:32:e5:24:da:85:b4:a2:3f:a6:57:
                    94:b8:8f:09:e5:b1:e5:59:e7:d5:20:5a:35:ae:85:
                    a0:ee:5a:ea:b1:d6:3e:28:7e:99:b2:02:34:1a:75:
                    de:34:6c:1e:54:73:02:71:bc:cf:30:18:f1:85:f9:
                    eb:6c:2b:6f:4a:67:65:73:34:65:fe:49:3d:ca:a1:
                    d7:5b
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Extended Key Usage: 
                OCSP Signing
            OCSP No Check: 

            X509v3 Subject Key Identifier: 
                41:64:65:7A:16:53:54:57:E7:C3:3A:BA:3F:77:9F:3C:D0:BE:EA:27
            X509v3 Key Usage: critical
                Digital Signature
            X509v3 Authority Key Identifier: 
                keyid:41:0F:19:38:AA:99:7F:42:0B:A4:D7:27:98:54:A2:17:4C:2D:51:54
                DirName:/CN=Autoridad de Certificacion Raiz del Estado Venezolano/C=VE/L=Caracas/ST=Distrito Capital/O=Sistema Nacional de Certificacion Electronica/OU=Superintendencia de Servicios de Certificacion Electronica/emailAddress=acraiz@suscerte.gob.ve
                serial:0B

            X509v3 Basic Constraints: 
                CA:FALSE
            X509v3 Certificate Policies: 
                Policy: 2.16.862.11.2.1
                  CPS: http://www.procert.net.ve/dpc-pc

            X509v3 Issuer Alternative Name: 
                DNS:procert.net.ve, othername:<unsupported>, othername:<unsupported>
    Signature Algorithm: sha256WithRSAEncryption
         81:cf:41:12:82:f0:b2:38:6e:b1:93:6d:95:d3:89:d6:7c:67:
         3e:4e:6c:ee:84:86:10:ea:c9:30:da:a4:70:56:bf:ba:ee:ed:
         db:ad:c4:7b:c2:50:ba:42:f1:8e:9e:10:d6:42:93:a4:e2:39:
         ee:72:c7:f7:be:b3:35:b6:9f:b5:73:48:e8:9a:4d:86:44:ab:
         ee:f0:bf:9b:92:e8:28:f1:5c:b6:e5:18:02:49:03:ea:45:36:
         16:28:3c:cc:8f:c8:79:88:6b:02:4a:07:96:ca:6c:6d:b5:c6:
         0c:1f:12:13:5f:65:61:0c:5d:ec:d9:53:81:02:aa:ca:ea:39:
         20:7b:40:ad:4a:2e:22:38:d0:38:ff:1e:d6:15:11:b6:71:ef:
         c7:3b:46:47:f6:3b:17:91:f0:bf:9c:e5:82:e6:0c:7e:b8:4e:
         93:62:72:57:6c:ee:ec:44:c2:a0:b5:22:cf:17:37:8f:05:7d:
         6d:95:18:4c:4d:0e:35:4d:61:1e:d5:38:f8:81:a6:92:ca:87:
         5f:90:76:76:b2:85:2c:9d:fe:16:e3:42:76:13:4a:ef:1f:f1:
         1f:42:a5:be:04:24:cf:4a:7f:77:6a:b7:3e:a1:87:d1:65:20:
         9e:48:43:01:65:28:5d:2a:95:ed:e3:0c:b6:c0:bd:63:23:b4:
         ea:fa:26:63:0b:35:f1:7f:2a:e9:f3:b6:b8:36:b8:30:02:6b:
         b0:96:c4:46:38:54:16:bd:da:d7:da:ba:d3:bb:ab:b8:fe:fb:
         cd:29:10:69:30:49:6b:5e:fe:20:cf:b5:51:b2:10:41:c5:af:
         3a:af:e8:32:0a:e0:df:93:1f:d9:4d:aa:b8:3f:e8:b4:6b:48:
         e1:b5:dd:17:8e:36:12:11:f0:89:c7:6a:ef:a4:58:d4:92:9a:
         84:9d:eb:1c:0f:0b:cc:05:c9:2d:17:67:91:7b:43:23:ac:ba:
         bb:c7:4c:70:52:0d:b4:61:5e:d9:72:02:6f:16:95:b3:c4:a2:
         52:71:4a:36:db:56:bd:05:98:9d:5d:f5:e4:ac:ab:f7:0d:74:
         e9:e0:a5:51:e0:87:70:e8:75:2b:fb:27:bd:d7:60:69:d8:d8:
         31:9a:86:e7:23:fa:76:b7:6c:32:83:a8:65:96:ff:04:e6:f9:
         72:19:88:f4:81:98:8d:d8:48:44:16:f6:e8:54:0a:e3:d6:b3:
         0d:55:cd:b9:6e:69:a6:f4:a2:06:5b:78:0f:fa:b4:8b:ee:79:
         4c:a9:de:21:25:65:71:e8:3c:4a:d5:07:3a:4b:57:ca:e8:ad:
         39:a0:af:0c:dd:c6:e0:f3:07:02:bf:c1:74:69:4e:ce:c4:30:
         4d:32:1b:59:ac:af:03:a0
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
activo.cer: good
	This Update: Aug 24 15:36:36 2017 GMT
	Next Update: Aug 25 15:36:36 2017 GMT


****** Revoked Certifcate ******

openssl ocsp -issuer procert.cer -cert alere.cer -url http://ura.procert.net.ve/ocsp -noverify -text
OCSP Request Data:
    Version: 1 (0x0)
    Requestor List:
        Certificate ID:
          Hash Algorithm: sha1
          Issuer Name Hash: E6577AE996DAD0109B34FFCF7EC433EA16C891EA
          Issuer Key Hash: 410F1938AA997F420BA4D7279854A2174C2D5154
          Serial Number: 6910DED30000000008B2
    Request Extensions:
        OCSP Nonce: 
            04104FF970951C7AB2541A9487C846161514
OCSP Response Data:
    OCSP Response Status: successful (0x0)
    Response Type: Basic OCSP Response
    Version: 1 (0x0)
    Responder Id: E2600CD2D324A934D6DDEF3EE56E9E201E06A4C6
    Produced At: Aug 24 22:31:56 2017 GMT
    Responses:
    Certificate ID:
      Hash Algorithm: sha1
      Issuer Name Hash: E6577AE996DAD0109B34FFCF7EC433EA16C891EA
      Issuer Key Hash: 410F1938AA997F420BA4D7279854A2174C2D5154
      Serial Number: 6910DED30000000008B2
    Cert Status: revoked
    Revocation Time: Oct 21 20:25:13 2016 GMT
    This Update: Aug 24 15:36:36 2017 GMT
    Next Update: Aug 25 15:36:36 2017 GMT
        Response Single Extensions:
            1.3.6.1.4.1.311.21.4: 
170825153636Z   .

    Response Extensions:
        OCSP Nonce: 
            04104FF970951C7AB2541A9487C846161514
    Signature Algorithm: sha1WithRSAEncryption
         12:7a:51:7d:d1:a0:64:f1:77:8c:f6:20:33:04:66:26:4c:98:
         6b:04:2c:9d:1f:fb:b9:8c:20:70:e9:3a:d4:75:8c:88:27:29:
         11:d2:df:a4:b4:4e:fb:e8:d4:da:8f:f6:1f:85:5d:20:25:ed:
         26:65:58:42:47:6f:30:fd:a4:a1:95:e4:62:9f:4c:5d:33:c6:
         61:2b:4f:3c:f4:e0:c2:68:d2:03:ec:3a:3c:ce:15:8b:f3:61:
         a9:f6:43:36:f9:3b:39:d6:c6:16:c7:a7:d8:af:0c:c5:d1:e1:
         52:39:54:63:56:f8:07:7d:6e:47:7a:72:70:d4:30:81:b3:44:
         f0:8e:71:7f:27:68:e7:a2:62:e5:05:ac:0f:a2:65:0b:d4:f8:
         39:df:00:9a:eb:0b:23:cc:56:df:57:cf:ee:91:dd:0b:fb:82:
         79:0d:e8:c6:92:f7:80:d5:ee:30:e4:1c:81:8d:f8:0f:bf:33:
         14:e3:dc:67:49:c9:fb:c9:0e:ff:50:db:20:d6:4d:d7:52:88:
         14:76:a7:68:69:40:24:9b:41:60:f0:7e:87:f4:41:84:e7:04:
         3e:10:18:74:df:0a:b6:c9:d3:56:ec:46:bd:34:7e:47:ec:fa:
         a5:ba:5e:1f:08:a0:b0:a9:0e:c2:7f:da:d4:08:bf:29:a1:eb:
         b5:c1:6f:b8
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            14:78:da:fa:00:00:00:00:0c:e5
    Signature Algorithm: sha256WithRSAEncryption
        Issuer: emailAddress=contacto@procert.net.ve, L=Chacao, ST=Miranda, OU=Proveedor de Certificados PROCERT, O=Sistema Nacional de Certificacion Electronica, C=VE, CN=PSCProcert
        Validity
            Not Before: Aug 24 11:48:29 2017 GMT
            Not After : Aug 24 11:48:29 2018 GMT
        Subject: C=VE, O=PROCERT, CN=ura.procert.net.ve
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (2048 bit)
                Modulus:
                    00:ce:71:27:bd:59:38:3a:c7:94:4e:45:5c:67:a5:
                    1f:cb:53:fe:cb:e1:47:7b:9d:7e:43:ee:ba:be:c2:
                    86:a5:1d:61:e5:ae:f2:ae:27:8e:f1:46:08:96:be:
                    43:b5:cd:58:72:3c:47:27:31:3e:68:8d:30:2d:48:
                    5d:6b:bf:53:c7:98:d5:43:9e:83:7e:a9:83:49:86:
                    04:10:50:25:a8:26:ad:b5:f7:ad:f4:e5:91:35:2f:
                    29:a4:88:9c:35:3e:6b:31:9c:06:d8:08:45:e1:d1:
                    37:86:58:25:79:7a:d0:d1:a5:01:b1:ef:20:43:5d:
                    7f:1a:49:21:ff:9d:0c:82:79:d3:78:59:bb:fd:00:
                    cf:b2:a1:f2:70:d2:1b:f0:26:6d:cc:42:52:0b:a0:
                    73:c8:bf:3a:b0:01:47:f2:cb:b0:f2:48:60:9a:ef:
                    de:13:00:b9:5f:42:f3:92:13:7e:e2:50:ed:6e:40:
                    0f:7d:04:13:c2:0f:7e:29:74:2e:21:87:24:ec:66:
                    fc:16:36:e6:9d:70:0a:5a:6a:74:84:c3:4a:c0:d1:
                    e3:f4:33:ce:50:cd:8d:0e:b4:fc:0f:e9:c3:95:1e:
                    86:56:20:d4:c7:81:7b:75:13:0e:4b:09:cb:be:49:
                    40:37:18:8c:43:0f:ea:39:b4:b1:38:d8:53:eb:89:
                    8a:01
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Extended Key Usage: 
                OCSP Signing
            OCSP No Check: 

            X509v3 Subject Key Identifier: 
                E2:60:0C:D2:D3:24:A9:34:D6:DD:EF:3E:E5:6E:9E:20:1E:06:A4:C6
            X509v3 Key Usage: critical
                Digital Signature
            X509v3 Authority Key Identifier: 
                keyid:41:0F:19:38:AA:99:7F:42:0B:A4:D7:27:98:54:A2:17:4C:2D:51:54
                DirName:/CN=Autoridad de Certificacion Raiz del Estado Venezolano/C=VE/L=Caracas/ST=Distrito Capital/O=Sistema Nacional de Certificacion Electronica/OU=Superintendencia de Servicios de Certificacion Electronica/emailAddress=acraiz@suscerte.gob.ve
                serial:0B

            X509v3 Basic Constraints: 
                CA:FALSE
            X509v3 Certificate Policies: 
                Policy: 2.16.862.11.2.1
                  CPS: http://www.procert.net.ve/dpc-pc

            X509v3 Issuer Alternative Name: 
                DNS:procert.net.ve, othername:<unsupported>, othername:<unsupported>
    Signature Algorithm: sha256WithRSAEncryption
         99:54:2e:3a:20:7b:51:26:b1:99:f8:81:3f:64:3a:94:1d:ca:
         d0:b2:37:85:7b:13:fd:9a:c1:b5:d7:bb:09:b5:a0:75:d1:0f:
         82:9f:e2:93:fd:1e:eb:c0:84:9f:59:87:23:2a:f5:e1:0e:25:
         69:c8:f3:a1:33:b4:6f:cb:4f:84:6a:6a:b5:56:d5:ba:d5:44:
         c7:3e:c3:a1:83:96:be:54:04:4f:b3:14:3d:0b:6e:69:4e:e4:
         9a:09:02:c3:bd:4f:9d:5b:2c:3e:86:e7:7f:7c:f3:97:90:15:
         d0:7b:db:2b:da:95:a0:97:3c:20:18:92:cf:ad:e0:0d:1b:49:
         70:33:fa:b5:ec:70:d8:e6:05:af:2c:aa:9e:d5:c2:a1:1c:d8:
         e7:f7:af:81:a6:63:67:ff:c1:7a:93:d4:6b:10:19:0d:77:5e:
         6b:c1:e5:18:da:39:a7:e7:67:20:74:0a:b0:63:48:a3:ff:47:
         22:1a:30:c4:42:93:b7:33:2a:eb:9d:16:9b:a5:42:ba:6d:20:
         c9:ad:e2:1c:2b:a2:41:94:6e:64:df:b5:78:59:77:f4:58:6d:
         b8:68:3c:51:fe:78:36:e2:df:c3:3c:f8:71:8f:bc:53:e1:db:
         30:c0:22:d7:2c:a4:aa:0b:a7:4e:24:36:d2:f0:ec:a8:6d:d7:
         45:e6:7b:15:42:25:03:c0:33:5d:60:2e:51:f8:f2:ad:fa:82:
         84:40:33:88:45:ed:0f:46:78:f8:19:c8:93:d1:0b:55:61:6d:
         91:63:e5:e8:b1:d0:7b:71:33:c6:ec:9b:fa:bb:e0:f6:f7:4b:
         b7:34:9e:24:73:b7:9b:27:c4:f7:a8:8c:c7:ff:ab:47:f5:4b:
         b9:94:87:15:00:29:54:12:2a:2b:b2:1f:34:26:c1:06:db:17:
         e0:b2:cb:5f:ca:ba:ab:f2:b4:76:d5:70:06:68:be:3b:95:b0:
         9b:6c:9b:ab:f0:f5:31:a4:7b:39:02:b5:3c:15:58:7c:56:fb:
         b5:fd:03:b6:ff:6c:8f:ba:7b:57:bb:3a:c4:c7:dc:a6:f7:3e:
         c9:07:97:1b:f0:5d:a9:9b:61:80:1c:d0:da:a6:46:8b:c6:3d:
         56:8b:ac:5e:39:60:8a:c5:a1:27:e6:5f:e1:5e:d6:0c:16:47:
         b2:f3:d3:14:4f:77:9f:50:5b:cb:08:89:06:75:18:af:be:3b:
         b2:03:6a:21:5c:0c:c7:07:0c:11:4a:88:c9:92:bb:4d:c7:9c:
         50:30:2b:93:85:49:b4:c8:a0:bd:98:c3:8d:73:fa:6e:01:23:
         b8:4b:23:bc:2d:2f:2c:6f:30:3e:83:6c:5a:15:25:69:f4:66:
         e3:af:fd:cc:21:f5:18:2c
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
alere.cer: revoked
	This Update: Aug 24 15:36:36 2017 GMT
	Next Update: Aug 25 15:36:36 2017 GMT
	Revocation Time: Oct 21 20:25:13 2016 GMT

****** Certificate not issued by PSC PROCERT ******

openssl ocsp -issuer procert.cer -cert other.crt -url http://ura.procert.net.ve/ocsp -noverify -text
OCSP Request Data:
    Version: 1 (0x0)
    Requestor List:
        Certificate ID:
          Hash Algorithm: sha1
          Issuer Name Hash: 5FDE1FB98448CCFDD9C8895B6DD19FEDA6D3FB11
          Issuer Key Hash: 410F1938AA997F420BA4D7279854A2174C2D5154
          Serial Number: 10E8CA61CDB9BD16C9C6107B898F08E7
    Request Extensions:
        OCSP Nonce: 
            04102710801AE9A1AF49843533BE37A06B2A
Responder Error: unauthorized (6)


Comment 4

With the certificates that present problems, we are contacting the clients for the remission of these certificates, we hope that before Monday 28-08-17 this activity will culminate and solving the present bug
(In reply to alejandrovolcan from comment #21)
> We have reviewed the comments, actually when the query is done using the
> serial parameter, and query returns a response "good", we are reviewing this
> to prevent it from happening, but this type of query is not common since the
> standard 

However, this type of query is precisely what happens if you suffer a security breach and an attacker issues some certificates that you don't know about. This is what happened in the Diginotar case, and this is why the Baseline Requirements have prohibited returning "good" for unknown serial numbers for the past however-many years.

Gerv
Note there are still outstanding questions, such as in Comment #20.
Flags: needinfo?(mozilla.psc.procert)
A Procert representative suggested at the tail of comment #21 that rolling out replacement certificates should have been completed before August 28, which was yesterday. As of 19:29 UTC, two of the certificates mentioned in comment #4 remain unrevoked: https://crt.sh/?id=175466182&opt=cablint, with private DNS names, and https://crt.sh/?id=151828400&opt=cablint, with a non-SAN CN. The former certificate is in fact still being served from https://mail.fospuca.com/.

Procert has been aware of these misissuances for weeks and has been unable to take effective action. I am concerned about the technical and administrative capabilities of this CA.
comment 24

We waiting for a windows in our clients services to issue the new certificate and revoque the previos certificate. We already send a remainder email to the clients
Attached you can find the information of the annual audit of PSC PROCERT
comment 6
about the OCSP response we already asked the software vendor in order to get update or patch to resolve this issue, will be back as soon as possible
comment 5
About the serial number, we check the observation and validate our system. Please check the certificate in the URL www.procert.net.ve and validate the serial number
First at all, we declared that PROCERT is concerning to comply all the international regulation. We work continually in improve our procedures and systems. We apply the correctives to the problems declared into the bug and creates a new procedure inside PROCERT to prevent futures issues in those topics. We check and please find the inform:

SSL issue
There are some issues declared into the Bug. We detected problems issue in some certificates. PROCERT staff proceeded with the validation of this point, detected the problem and solve.

Actions: We Contacted the clients and agree a revocation date, revoke all the certificates with problem and reissue the certificates with the standard complying, check the correct application of CA Browser Forum, implant a regular training program (including test (operational and theory) to our staff in order to prevent and solve any issue, finally proceed with a dismissal of one operator.

Serial Number:
After a technical validation, we proceeded to check the status of our certificates serial numbers. After CA configuration we validate and now we can inform that PROCERT certificates has 19 octets and more of 64 bits.  

OCSP issue - pending action:
We have a problem with the OSCP Service. We found the Microsoft resolution for this problem in Microsoft TechNet. https://support.microsoft.com/en-us/help/2960124/the-online-responder-service-does-not-return-a-deterministic-good-for

Microsoft
This problem occurs because the OCSP does not verify with a confirmed source that the certificate was actually issued by its corresponding Certificate Authority. Instead, if a certificate is not included in the CRL, the Online Responder service assumes that the certificate is valid and returns a value of GOOD.

Status
Microsoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section.
Microsoft

Resolution
To resolve this issue in Windows 8.1 or Windows Server 2012 R2, install update 2967917. For more information, click the following article number to view the article in the Microsoft Knowledge Base: July 2014 update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 

PROCERT action:
When we applied the Microsoft tool, the system shows this message “In the Value data box, type the path to the directory you created in step 3 of the directory structure procedure and that contains the issued serial numbers, and then click OK.”. 

We refresh or restart the service, then, the OSCP registry is automatically deleted.

For testing we use different versions of Windows Server (2008, 2012 and 2016) all the versions present the same result.

Additionally we ask for an answer at Microsoft TechNet please https://social.technet.microsoft.com/Forums/windowsserver/es-ES/981f6e48-dc25-4eeb-a1d6-0bc72b9b4fc9/ocsp-online-responder-service-assume-a-certificate-that-is-not-included-in-the-crl-as-a-valid-and?forum=winserversecurity

Now we stay contacting Microsoft in order to obtain and adequate procedure or batch.

In paralleled we work in our own OCSP software.
As evidence, please validate a view of a Serial Number from a PROCERT certificate
(In reply to Oscar Lovera from comment #29)
> To resolve this issue in Windows 8.1 or Windows Server 2012 R2, install
> update 2967917. For more information, click the following article number to
> view the article in the Microsoft Knowledge Base: July 2014 update rollup
> for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 

Why did your OCSP server not already have installed an "update rollup" patch which is dated July 2014? When was that server last updated?

Gerv
PSC procert has a policy of periodic updating, following the weekly update scheme of microsoft, for example in our server was installed the last update KB4022750
the situation raised by the OCSP, and as indicated in comment 29 has been tested with recent server versions (2016) and the problem persists, reason for why we escalate to microsoft in order to solve this issue, That is the real issue here
PSC PROCERT is always open to observations to improve our policies and procedures, until the moment we have resolved all the observations based on the present bug and stay attention
We have a open ticket with Microsoft in order to solve the OCSP issue. The Ticket is 117091516348421.
Attached file Information update
PSC PROCERT in order to keep updated information about the bug, attach an update of each response that has been given previously in all points raised
In the following link you can find the CPS in English language

https://www.procert.net.ve/documentos/CPS-PROCERT.pdf
Attached file Mozilla SSL.xlsx
Comment on attachment 8910943 [details]
Information update

Revocation proceeded as indicated in the attached file. Additional measures were taken to modify processes and included in the CPS and SSL PC pressures of the CA Browser Forum
The following text serves to extend already the information previously given by the PSC PROCERT

We proceed to report on the compliances made by PROCERT. This action extends the information already sent to the forum.

PROCERT already has mechanisms to request the revocation of SSL certificates via telephone and email. From October 2, 2017 users can also request revocation through the website, through a registration system that will send secure email with password that the user must provide in turn to confirm the revocation of SSL and proceed in the AC. Comment 4

Already the mechanisms and means of validation of the OCSP was changed on the web page of PROCERT see https://www.procert.net.ve/eng/ca.html

In reference to the serial number, we can indicate comment 30 this point is solved,in order to comply with section 4.1.2.2 of RFC 5280

   RFC 5280 “Given the uniqueness requirements above, serial numbers can be
   expected to contain long integers. Certificate users MUST be able to
   handle serial Number values up to 20 octets. Conforming CAs MUST NOT
   use serial Number values longer than 20 octets”

SSL Certificates. Revocation proceeded as indicated in the attached file. Additional measures were taken to modify processes and included in the CPS and SSL PC pressures of the CA Browser Forum

The rest of the observations were followed according to the standard and the applicable norms and always in consideration of the observations of Mozilla.

The annual audit was provided on the forum.
Comment on attachment 8912895 [details]
Mozilla SSL.xlsx

Revocation proceeded as indicated in the attached file. Additional measures were taken to modify processes and included in the CPS and SSL PC pressures of the CA Browser Forum
Dear Mozilla CA Root Team,
 
After reviewing Mr. Gervase's reply, referring to the exclusion of the PSC PROCERT from the Mozilla trust repository and having seen the antecedents existing in multiple previous cases, it is evident that in all cases it was offered through the bug of a mechanism of remediation and the ACs were adequately informed about the open observations and even in some cases are closed with simple statements about how the case is remedied.
 
The technical aspects indicated in the bug and its answers are included below:
 
1.     Serial Number does not meet the standard.
RFC 5280, in section 4.1.2.2 states the following:
 
“4.1.2.2. Serial Number
The serial number MUST be a positive integer assigned by the CA to each certificate. It MUST be unique for each certificate issued by a given CA (i.e., the issuer name and serial number identify a unique certificate).  CAs MUST force the serialNumber to be a non-negative integer.
Given the uniqueness requirements above, serial numbers can be expected to contain long integers. Certificate users MUST be able to handle serialNumber values up to 20 octets. Conforming CAs MUST NOT use serialNumber values longer than 20 octets.
Note: Non-conforming CAs may issue certificates with serial numbers that are negative or zero. Certificate users SHOULD be prepared to gracefully handle such certificates”
 
In addition, section 7.1 of the BR indicates the following:
 
“Effective September 30, 2016, CAs SHALL    generate non‐sequential Certificate serial      numbers greater     than zero      (0) containing          at least   64 bits          of output       from   a        CSPRNG.”
 
PSC PROCERT works with the Microsoft cryptography service, which has a CSPRNG inside the CryptoAPI library suite, which includes a CryptGenRandom function, which is a cryptographically secure pseudo-random number generator, this function was found by default in the generation of the short serial numbers, therefore we proceeded to modify the registry of the CA and activate the option of high serial, which comes by default deactivated (0), we proceeded to activate this registry, so that serials are generated under the parameters of the standard.
 
In the following link you can see an example of a certificate with the appropriate serial number
 
https://crt.sh/?id=204446748
 
After this action was taken, we proceeded to recognize the certificates with these problems and were notified to our clients that they should be revoked and reissued, the certificates denounced in the bug are revoked.
 
PSC PROCERT is not the only one to present this case, QuoVadis and SwissSign, presented the same situation and the remediation was accepted.
 
https://bugzilla.mozilla.org/show_bug.cgi?id=1391063
 
https://bugzilla.mozilla.org/show_bug.cgi?id=1391066
 
 
Note that the answers offered by QuoVadis and SwissSign were simple and not detailed; such as those offered by PROCERT, the response and follow-up on compliance was further expanded. We do not understand then why for other cases apply and for PROCERT not ?.
 
2.-      Issues with SSL Certificates
       Issue D: URI in CN and dnsName SAN (December 2016)
       Issue G: Internal IP Address in SAN (March 2015 - March 2017)
       Issue I: CN Not Also In SAN (March 2016 - June 2017)
       Issue K: Internal DNS Names in Certificates (May - June 2017)
       Issue L: helloburgershack.com (June - July 2017)
 
2.1.    Issue R: Incorrect Encoding of or Inappropriate Use of TeletexString (December 2015 - August 2017)
Taking into account what was stated in the bug, the BR was reviewed and it indicates the following in section 7.1.4.2.2
 
“j. Other Subject Attributes
All      other  optional        attributes,     when  present         within  the          subject         field,   MUST contain information that    has     been          verified         by      the     CA.              Optional       attributes      MUST NOT contain metadata      such   as      ‘.’,       ‘‐‘,      and    ‘         ‘         (i.e.          space) characters,  and/or any other      indication      that    the     value          is        absent,         incomplete,   or       not     applicable.e.”
 
In addition, section 7.4.2.1 states the following
 
“7.1.4.2.1. Subject Alternative Name Extension
Certificate Field: extensions:subjectAltName
Required/Optional: Required      
Contents: This        extension      MUST contain         at       least   one          entry. Each   entry MUST  be either a    dNSName     containing the          Fully‐Qualified Domain Name      or       an      iPAddress     containing the     IP address    of       a        server.
The    CA     MUST confirm        that    the     Applicant      controls          the     Fully‐Qualified Domain      Name or IP   address        or       has          been   granted        the    right   to use it        by      the     Domain          Name Registrant or IP       address        assignee,      as appropriate.”
 
In order to remedy this situation, the affected customers were notified that the certificates had to be revoked and issued again, modifying the data with problems, then notified and with the window of time for customers to take these changes into account. level of their systems, the certificates were revoked and issued correctly.
 
To avoid these errors in the future, PSC PROCERT proceeded to modify the CPS and PC, adding a section to inform our customers that any request for SSL certificate must comply with the standard of the CA Browser Forum, also within our system a filter was applied to avoid accepting the following parameters
 
1. Characters "-", ",", ".", ":", "/", And " " (Issue D)
2. Private IP addresses (Issue G)
3. Domains ending in * .local (Issue K)
4. Character accentuation (eg or) (Issue R)
5. Validator that both the CN and the SAN are the same values (Issue I)
 
In addition to establishing internal review and validation mechanisms with the personnel that analyze the CSR and support our clients. A tool will also be incorporated to automate the analysis of CSRs. Such software is currently being tested in our quality environment to enter production.
 
2.2.    Issue N: Other Names in Certificate SAN (2011 - August 2017
Referring to Issue N, the BR was reviewed and it was found that section 7.1.4.2.2 section i indicates the following
“i. Other Subject Attributes
All other optional attributes, when present within the subject field, MUST contain information that has been verified by the CA.”
 
This indicates that another field can be included as long as it is information verified by the CA, in this case PSC PROCERT verifies the number of RIF that is the tax identification number of company in Venezuela of each company, which by definition is a registry destined to the legal control of taxes and in which natural or juridical persons, communities and entities or groups without legal personality, susceptible by reason of the goods or activities, of being subject or responsible for the Income Tax, the tax retention agents, and residents abroad without permanent establishment or fixed base, provided that the cause of the enrichment is or occurs in Venezuela. In conclusion, it is a requirement of Law in Venezuela and the company that omits to place it is sanctioned. Even PSC PROCERT can be sanctioned by the government in case of failure to include such information in the certificates.
 
Each company that signs a contract with PSC PROCERT must present a copy of the RIF and the same is proceeded to validate against the national tax office, which in the case of Venezuela is SENIAT; The SUSCERTE that is the governing entity that regulates in Venezuela requires that in the structure of the certificate this information is placed in a field of the certificate identified with an OID for this purpose, which is 2.16.862.2.
 
Therefore, it can be concluded that the standard is fulfilled and there is no default as such in Issue N.
 
There are similar cases with accepted remediation
CertSign
https://bugzilla.mozilla.org/show_bug.cgi?id=1390979
 
GoDaddy
https://bugzilla.mozilla.org/show_bug.cgi?id=1391429
 
Entrust
https://bugzilla.mozilla.org/show_bug.cgi?id=1390996
 
The responses provided by PSC PROCERT are in line with those provided for similar cases by the CA’s above.
 
3.       Issue T: Inappropriate Key Usage Value of "Key Agreement" (October 2016 - August 2017)
Certificates with this Issue were revoked and notified to customers. In order to prevent this situation from being repeated, we proceeded to review the template with which the certificates were issued and the key Agreement was eliminated among the uses, in addition it was enabled so that this option can NOT be used later
 
4.       Issue V: Failure to Respond Quickly To Problem Reports (August 2017)
At this point and about the rapid response, we point out that at all times we have demonstrated since we were notified, willingness to solve this problem. Certificates that did not generate impact were automatically revoked.
 
Please find attached our CPS and the evidence of SSL revocation.
 
Please consider this evidence in order to reopen the PSC PROCERT case.
Attached file CPS Edition N- 22.pdf
Attached file Mozilla SSL (2).xlsx
Please note that individual comparisons is not equivalent; the sum totality of issues - and how they have been handled, the timeliness of the response, and the thoroughness of the response - all factor in. Focusing on shared, individual issues demonstrates a failure to grasp the overall impact that the sum totality has upon trust, and how the process and incident response and management - from start to finish - is handled.


> https://bugzilla.mozilla.org/show_bug.cgi?id=1391063
>  
> https://bugzilla.mozilla.org/show_bug.cgi?id=1391066
>  
>  
> Note that the answers offered by QuoVadis and SwissSign were simple and not
> detailed; such as those offered by PROCERT, the response and follow-up on
> compliance was further expanded. We do not understand then why for other
> cases apply and for PROCERT not ?.

This is, of course, not true.

For example, consider Comment #5, dated 2017-08-16. Note that PROCERT did not meaningfully respond to this issue to acknowledge a change until Comment #29, on 2017-09-06. Compare https://bugzilla.mozilla.org/show_bug.cgi?id=1391063#c0 (2017-08-16) to https://bugzilla.mozilla.org/show_bug.cgi?id=1391063#c4 (2017-08-18) and the facts surrounding it.

The attempt to suggest these are equivalent responses demonstrates the underlying issue, which is a substantial lack of appreciation for the seriousness of the issues or the expectations upon CAs

> To avoid these errors in the future, PSC PROCERT proceeded to modify the CPS
> and PC, adding a section to inform our customers that any request for SSL
> certificate must comply with the standard of the CA Browser Forum, also
> within our system a filter was applied to avoid accepting the following
> parameters

This was already required for 5 years (since the BRs), and for 3 years (since 2014) for Mozilla. I hope you can see why this is not particularly reassuring that you didn't already have such a control.

> In addition to establishing internal review and validation mechanisms with
> the personnel that analyze the CSR and support our clients. A tool will also
> be incorporated to automate the analysis of CSRs. Such software is currently
> being tested in our quality environment to enter production.

This fails to respond to the substance of the issue - of why PROCERT was in non-compliance so long, failed to detect such non-compliance, and failed to monitor and update its systems according to the Baseline Requirements.


> Therefore, it can be concluded that the standard is fulfilled and there is
> no default as such in Issue N.

This is, of course, false, considering the text you quoted in the very message. 

7.1.4.2.1. Subject Alternative Name Extension
Certificate Field: extensions:subjectAltName
Required/Optional: Required      
Contents: This        extension      MUST contain         at       least   one          entry. Each   entry MUST  be either a    dNSName     containing the          Fully‐Qualified Domain Name      or       an      iPAddress     containing the     IP address    of       a        server.

An otherName is neither a dNSName nor an iPAddress. Therefore, this is violated.

This is an example of the concerns with PROCERT not understanding or appreciating the technical requirements, and overall undermines faith in PROCERT.


> 4.       Issue V: Failure to Respond Quickly To Problem Reports (August 2017)
> At this point and about the rapid response, we point out that at all times
> we have demonstrated since we were notified, willingness to solve this
> problem. Certificates that did not generate impact were automatically
> revoked.

The level of understanding and thoroughness is clearly not met through these responses.
Gerv: Is this a Resolved/WontFix or Resolved/Duplicate in light of https://bugzilla.mozilla.org/show_bug.cgi?id=1403549 and https://bugzilla.mozilla.org/show_bug.cgi?id=1405862
Flags: needinfo?(gerv)
Status: NEW → RESOLVED
Closed: 7 years ago
Flags: needinfo?(gerv)
Resolution: --- → DUPLICATE
Product: NSS → CA Program
Whiteboard: [ca-compliance] → [ca-compliance] [uncategorized]
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: