QuoVadis / Freistaat Bayern: Non-BR-compliant Key Usage
Categories
(CA Program :: CA Certificate Compliance, task)
Tracking
(Not tracked)
People
(Reporter: rob, Assigned: stephen.davidson)
Details
(Whiteboard: [ca-compliance] [ov-misissuance])
Comment 1•7 years ago
|
||
Updated•7 years ago
|
Comment 2•7 years ago
|
||
Updated•7 years ago
|
Comment 3•7 years ago
|
||
Comment 4•7 years ago
|
||
Comment 5•6 years ago
|
||
Comment 6•6 years ago
|
||
Comment 7•6 years ago
|
||
Stephen: Do you have an update?
| Assignee | ||
Comment 8•6 years ago
|
||
As described previously, for their name-constrained CA Freistaat Bayern uses an "off the shelf" PKI which does not, at this stage, support full pre-issuance linting.
However, their certificate management system (CMS/RA) does include a variety of filters and templates, which have been improved to better address this error and other BR requirements. It does not, however, deliver a full zLint coverage. Freistaat Bayern has focussed on changes to their CMS that would allow them to interface with a managed PKI for trusted TLS certificates, and we have agreed that they will transition to a managed PKI during 2019.
We continue post-issuance linting of Freistaat Bayern, as well as monitoring using an internally-developed tool.
Comment 9•6 years ago
|
||
Trying to summarize this discussion.
- The issue manifest as an invalid keyUsage for an end-entity certificate (Comment #0)
- The root cause was diagnosed as the certificate management software copying over fields from the CSR into the final certificate without the appropriate review or configuration. (Comment #2)
- The steps taken are:
- Implemented The CA software is now configured to configure keyUsage and extendedKeyUsage based on certificate profile (Comment #2)
- Implemented The RA/CMS software is also configured to validate parameters before sending to the CA (Comment #2)
- Implemented QuoVadis performs post-issuance linting and internal monitoring
- Pending - 2019 EOY The CA software will transition to a managed CA at some point during 2019 (Comment #8)
I think the only question from this is for more details on the post-issuance linting to be shared. This helps discover and develop industry best practice, by understanding how CAs are performing post-issuance linting and how they are designing such controls to operate reliably.
Updated•6 years ago
|
| Assignee | ||
Comment 10•6 years ago
|
||
Hi Ryan: We monitor external CAs using several tools:
- An internal tool aka CertNod which conducts post-issuance linting by checking CT logs for certs issued by a given subCA, and sends email alerts when certs with ERROR or FATAL are found. CertNod uses zLint as the source for its lints.
- Daily sanity checks using crt.sh.
- An internally developed monitoring tool which provides daily updates from the external subCA of domains in issued certs which are screened against the domains validated by QuoVadis and included in nameConstraints for the subCA. Although certs that defy the nameConstraints should not work in browsers, this alert gives insight into the subCA's compliance with agreements.
Comment 11•6 years ago
|
||
Thanks Stephen! I think that is an incredibly helpful level of detail, and also highlights an expected practice being captured - namely, overseeing technically constrained sub-CAs for compliance.
Wayne, I think Comment #9 summarizes things, if you have any other questions
Comment 12•6 years ago
|
||
I have no further questions, but I do think this bug should remain open, and Quovadis should provide periodic updates, until the transition to managed infrastructure is completed.
| Assignee | ||
Comment 13•6 years ago
|
||
A contract was executed wherein Freistaat Bayern ceased issuance from this subCA as of July 10, 2019 and the subCA will be revoked by QuoVadis as of Dec 30, 2019. Technical changes were confirmed that prevent routine issuance of certificates from the subCA, and we continue to monitor to confirm that no issuance occurs through the time of revocation.
| Assignee | ||
Comment 14•5 years ago
|
||
The following versions of the CA were revoked on 30 December.
| ICA | Serial | Thumb |
|---|---|---|
| Bayerische SSL-CA-2018-01 | 44915f9e749ae3af4f9b67f6ff1c82b45f444bbf | 52B63D1BD08E83BDC723D7B1FE962CEC1806E7F53F76F2C70858CA35293A1DC1 |
| Bayerische SSL-CA-2018-01 | 22559aace2195a18cf8e404896b94132a8dc4ccf | C84AE01ECD202DAFBEEE1F0E679646DE8CCD653D7846718A3B5F4E129324298A |
| Bayerische SSL-CA-2018-01 | 5dced5064c9e3513c0524ad49972fbc5d37e7713 | 0F751035C18E1D392E9CC557C57E94A55D12FBB086F26A4529E2613625BFD13C |
The subCA had been reissued several times within its validity amending nameConstraints. No prior versions of this CA remain valid.
We request that this bug be marked resolved.
Comment 15•5 years ago
|
||
Thanks. Confirming this shows as revoked (cessationOfOperation) for all three sub-CAs with this subject disclosed via CT via both OCSP and CRL.
Updated•5 years ago
|
Updated•3 years ago
|
Updated•2 years ago
|
Updated•1 year ago
|
Description
•