Sectigo: Failure to revoke within 24 hours
Categories
(CA Program :: CA Certificate Compliance, task)
Tracking
(Not tracked)
People
(Reporter: wthayer, Assigned: Robin.Alden)
References
Details
(Whiteboard: [ca-compliance] [leaf-revocation-delay])
| Reporter | ||
Comment 2•7 years ago
|
||
Updated•7 years ago
|
| Assignee | ||
Comment 3•7 years ago
|
||
| Reporter | ||
Comment 4•7 years ago
|
||
| Assignee | ||
Comment 5•7 years ago
|
||
Comment 6•6 years ago
|
||
Robin: Do you have updates from what's described in Comment #5? Do you have a date in which you'll be able to provide updates? Otherwise, it may be useful to switch to weekly updates, as described in https://wiki.mozilla.org/CA/Responding_To_An_Incident#Keeping_Us_Informed
Comment 7•6 years ago
|
||
Robin: Can you provide an update?
| Assignee | ||
Comment 8•6 years ago
|
||
We have the automated revocation mechanisms in outline form. I will post substantial details here by Thursday Jan 24th.
Updated•6 years ago
|
| Reporter | ||
Comment 9•6 years ago
|
||
Robin: it has been almost a month since you stated in comment #8 that you would provide more information.
| Assignee | ||
Comment 10•6 years ago
|
||
Our Self-service revocation portal will support these methods:
#1 If the certificate you want revoked was ordered by you directly from Sectigo (or previously from Comodo CA), log into your account with us and select the certificate to be revoked.
This mechanism is in place and has been for a long time.
#2 If the certificate you want revoked is one for which you hold the private key either because you generated the key in the first place or because you found the key on the internet, you may do one of the following:
#2a create a revocation token by appending the certificate serial number to the string "REVOKE:".
E.g. "REVOKE:23:b5:72:50:18:7d:2f:83:03:9e:27:09:34:0b:4d:eb"
Use the private key to generate a SHA-256 based signature over the revocation token. Send us the revocation token and the signature and we will revoke the certificate.
Instructions on the use of openssl to accomplish this will be given in the portal.
#2b send us the Certificate and the private key and we will revoke the certificate.
#3 If the certificate you want revoked has a domain that you control in its subject (in a subjectAlternativename:dNSName entry), you may ask us to revoke the certificate by demonstrating your control of the domain.
The portal will list the supported means of demonstrating control and provide straight-forward instructions.
You may choose to revoke one or more certificates by providing the serial numbers of the certificates to be revoked, or to request the revocation of all certificates containing this domain.
The portal will note that #2b discloses the private key to us and means that the key is compromised, and will recommend the use of #2a by preference.
Comment 11•6 years ago
|
||
Wayne: Is there any additional information you'd like for this incident report? I think we're at a point of closing it out.
While Comment #10 is not 'ideal' under a perfect world, I think the problems are fairly well-known within this space. I think it may be useful, in future communications, to perhaps survey CAs the methods on how they handle this, or to require the disclosure within the CP/CPS. The point of such an exercise would be to examine the broader industry and look to synthesize good practices into formal requirements. Certainly, the complexity within this space is one of the reasons Google was reticent to enable CT redaction, for example, so I don't think there's a clear or consistent "right" answer yet.
Updated•6 years ago
|
| Reporter | ||
Comment 12•6 years ago
|
||
Robin: please provide a status update on Sectigo's self-service revocation portal.
| Reporter | ||
Updated•6 years ago
|
| Assignee | ||
Comment 13•6 years ago
|
||
(In reply to Wayne Thayer [:wayne] from comment #12)
Robin: please provide a status update on Sectigo's self-service revocation portal.
It is in development now. We anticipate having it QA'd and live around the end of this month (July).
| Reporter | ||
Updated•6 years ago
|
| Assignee | ||
Comment 14•6 years ago
|
||
I apologize for the late response. I realize that we let the projected release date go by without providing an update.
This self-service revocation facility is still in development and is now expected to be released on 18-August-2019.
| Reporter | ||
Updated•6 years ago
|
| Assignee | ||
Comment 15•6 years ago
|
||
The self-service revocation portal was released on 18-August-2019.
Method 3 on that page, Revocation by proof of domain control, does not yet support wildcard domains but the portal is otherwise functional.
We expect the fix to the wildcard issue for method 3 to be released on 22nd September.
| Reporter | ||
Comment 16•6 years ago
|
||
Robin: thanks for the update. Despite the "wildcard issue" with the revocation portal. I consider remediation to be complete.
Updated•3 years ago
|
Updated•2 years ago
|
Description
•