Closed Bug 1397830 Opened 8 years ago Closed 8 years ago

EDICOM: Signing SHA-1 OCSP responses with unconstrained certificate

Categories

(CA Program :: CA Certificate Compliance, task)

task
Not set
normal

Tracking

(Not tracked)

RESOLVED FIXED

People

(Reporter: agwa-bugs, Assigned: rsantisteban)

Details

(Keywords: sec-other, Whiteboard: [ca-compliance] [ocsp-failure])

Attachments

(1 file)

4.81 KB, application/octet-stream
Details
Attached file OCSP Response
I just sent the following to EDICOM's problem reporting address (acedicom@edicomgroup.com). Note that in the April 2017 CA Communication, EDICOM stated that they were no longer using SHA-1 to sign OCSP responses: https://ccadb-public.secure.force.com/mozillacommunications/CACommRespWithTextAndTotalsReport?CommunicationId=a05o000003WrzBC&QuestionId=Q00020&QuestionIdForText=Q00026 Your OCSP responder at http://ocsp.acedicom.edicomgroup.com/acedicom01 signs OCSP responses with SHA-1 using a certificate that is trusted by Mozilla for server authentication. This is a violation of section 5.1.1 of Mozilla's Root Store Policy Version 2.5, which states: "CAs MAY sign SHA-1 hashes over OCSP responses only if the signing certificate contains an EKU extension which contains only the id-kp-ocspSigning EKU. ... CAs MUST NOT sign SHA-1 hashes over other data, including CT pre-certificates." Furthermore, since the response reflects an attacker-supplied nonce of arbitrary length, your OCSP responder could allow attackers to forge SHA-1 SSL certificates using a chosen-prefix attack as described here: https://www.mail-archive.com/dev-security-policy@lists.mozilla.org/msg02999.html I have attached a signed OCSP response as evidence. A copy of this report will be sent to Mozilla.
Raúl, Please reply in this bug very promptly to acknowledge that you have been informed of this bug, and provide a timeline for resolving the concern. Then please provide an incident report in this bug, as described here: https://wiki.mozilla.org/CA/Responding_To_A_Misissuance#Incident_Report
Assignee: kwilson → rsantisteban
After several months working on this, we have found technical issues with disabling SHA1 when signing OCSP responses. EDICOM decision was not to go on supporting previous Certification Authority Root since It was impossible meets all the technical requirements of the program. We will go on with the process of including the new Root (https://bugzilla.mozilla.org/show_bug.cgi?id=1239329) which meets all the requirements. So, since we are not issuing new server/client certificates with the old one, we suggest to start the process of removing our "ACEDICOM Root" from the trusted PKI Root. Kathleen, please help us with this in case we have to submit some kind of request indicating the date Mozilla can remove our CA. The main question for us is that this doesn't alter actual BUG https://bugzilla.mozilla.org/show_bug.cgi?id=1239329, because It was about including new Root.
(In reply to Raúl Santisteban from comment #2) > So, since we are not issuing new server/client certificates with the old > one, we suggest to start the process of removing our "ACEDICOM Root" from > the trusted PKI Root. I filed Bug #1400013 to remove the old ACEDICOM root cert. > The main question for us is that this doesn't alter actual BUG > https://bugzilla.mozilla.org/show_bug.cgi?id=1239329, because It was about > including new Root. The request for inclusion of the new root may still continue via Bug #1239329. However, that request is on hold, awaiting the CA to provide their BR Self Assessment... https://bugzilla.mozilla.org/show_bug.cgi?id=1239329#c22
It seems like this bug can be resolved, as the outcome is to remove the root? Gerv
Status: UNCONFIRMED → RESOLVED
Closed: 8 years ago
Resolution: --- → FIXED
Group: crypto-core-security → core-security-release

Kathleen, Wayne: I think the Security Issue flag can be removed?

(In reply to Ryan Sleevi from comment #5)

Kathleen, Wayne: I think the Security Issue flag can be removed?

Agreed. I'll ask someone to fix that.

Whiteboard: [ca-compliance]

Making public, per Kathleen.

Group: core-security-release
Product: NSS → CA Program
Whiteboard: [ca-compliance] → [ca-compliance] [ocsp-failure]
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: