DigiCert: Underscores - CVS Pharmacy
Categories
(CA Program :: CA Certificate Compliance, task)
Tracking
(Not tracked)
People
(Reporter: jeremy.rowley, Assigned: brenda.bernal)
References
Details
(Whiteboard: [ca-compliance] [ov-misissuance])
User Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:64.0) Gecko/20100101 Firefox/64.0 Steps to reproduce: This is the first of the companies where I have information referenced by https://bugzilla.mozilla.org/show_bug.cgi?id=1515564 . We didn't receive permission to identify them by name, but we can say they are "Major Pharmacy Benefits Manager". The follow up requested information is that they have a blackout period from October 15-February 1. These blackout periods represent annual enrollment in benefits and when companies subscriber to new or modified plans. Unsurprisingly, this is their busiest time of the year. The certificates are: 67445bd22255feaedeeb9791d88d60f8 https://crt.sh/?id=15806036 52e74dc14d0c6c76f68e62e575964aba https://crt.sh/?id=15806037 06095344b72bbabd6cd10f5dbdc688e9 https://crt.sh/?id=15944127 7c0c3ddb652391a7268202bfd4a91e38 https://crt.sh/?id=16158275 192c2961a3f7b0450aaa8c6eaf125302 https://crt.sh/?id=18018590 2aa5f189cbe698a69c5e32504a8a6680 https://crt.sh/?id=18019190 109248039b4f476c7115d86531fe3e57 https://crt.sh/?id=18019888 0456341a964334f750f4e792a3fb8f77 https://crt.sh/?id=18021060 461bfe9cd2fac2cea23ab8fd9d096cd0 https://crt.sh/?id=18020962 01834d35d3d7a5a406ead082774d6e63 https://crt.sh/?id=18022527 505be82a14f8d400157872139643b2b0 https://crt.sh/?id=18021658 11ea6f4edfafc8c6248f8f487e109a5b https://crt.sh/?id=18022848 65f2eeedfc9c7d0854c83e349152abfa https://crt.sh/?id=18023281 10f082fe9bcf93ea0c0a4fb223ae1294 https://crt.sh/?id=18023904 3f9c4fdc0060720d9ee2042007f94c4a https://crt.sh/?id=18024039 208e7aff0247c2887a6d4ef7d1b400b6 https://crt.sh/?id=18024708 35faff98f4864aeb256b23012bdfb770 https://crt.sh/?id=18024575 359e30c3cd5387dd9b7f90b51a8b9346 https://crt.sh/?id=18024892 59e9ee5086b2f07f3d1b3405b5a75c00 https://crt.sh/?id=18025126 18ab5f52f789b12b765fc9d9aa18e672 https://crt.sh/?id=18025117 56dcb64ea65b24d8c4f013fe4a98aa41 https://crt.sh/?id=18025340 528dd479144840d26c5c75a9f97881fc https://crt.sh/?id=18025170 4d3ea144e9924dc06828ab23f11fef19 https://crt.sh/?id=18025443 078c09fe1b413359d94b2ab4d90edeb5 https://crt.sh/?id=18025544 789345552b410cc3db6ae77b1b1d9995 https://crt.sh/?id=18025397 34f43bbf33279aa5da82d5445f8c4c5f https://crt.sh/?id=18025637 354378848975c82a4763983d6db673a7 https://crt.sh/?id=18025585 5ca6b9b0889c2e08a1a9dea5e9ae4a62 https://crt.sh/?id=18025807 38950e698899f45eaa2ff57f92b6edd9 https://crt.sh/?id=18025911 023cb77924e1c2cead3d3cf5d25aeed6 https://crt.sh/?id=18026104 c9528e411e373d48d373ac5b5434a7 https://crt.sh/?id=18025850 3eed5acf9c5103b57ef4d05bfc251a94 https://crt.sh/?id=18026034 3705e4e7ff18251a267aa32743e8ec24 https://crt.sh/?id=18026229 4e6d929297f80203c02bdace9a9b60eb https://crt.sh/?id=18026355 5db909c5ff1c8193a1436839c427aa8c https://crt.sh/?id=18026404 15370808309e7c45220c6d090d7265cb https://crt.sh/?id=18026511 05a78f6a1d2ad92039cf3421f7021ba1 https://crt.sh/?id=18026588 415332ddb7633cfbd759df558773cf40 https://crt.sh/?id=18026471 48eb0d28b952ef01e01afa03b68bd9cc https://crt.sh/?id=18026649 6b77bf5e07357ad2622ea4db7f7a6839 https://crt.sh/?id=18026700 3e27dd272f9c3002ba8ffeee6f0419ae https://crt.sh/?id=18026820 62f829f2482d7eb302257f015c128427 https://crt.sh/?id=18027045 24d6476449e58913d99d409e71ffd3bd https://crt.sh/?id=18027019 5f7792309472a8c0ca9afa954ec8c979 https://crt.sh/?id=18027037 7f3e176b7469e58039fe62b983a7e289 https://crt.sh/?id=18026987 451ebbb3e3f50c9dbb44ec4c0e43a457 https://crt.sh/?id=18027105 758db81306e480a7b941bff69154a024 https://crt.sh/?id=18027060 650579d4600b3d412e4a7ff4d9f9ebaf https://crt.sh/?id=18027084 7f46303e73845014e03d8b0a32db1f15 https://crt.sh/?id=18027257 0cd76f731107709276eed07b39211aea https://crt.sh/?id=18027380 2f8198481cdcd0858901a0887dc3a54a https://crt.sh/?id=18027440 424e2db9852f42e3aa763c242d347e29 https://crt.sh/?id=18027493 608d8024cfa04819d536786f818f74c8 https://crt.sh/?id=18027449 47a0be5dded051a86cf435fcca27e181 https://crt.sh/?id=18027383 1e0ca540a08598f180e21143d8db790f https://crt.sh/?id=18027471 68b47788707a26d77ab8628da448d453 https://crt.sh/?id=18027390 37611be416d736dcda41800d5e67558e https://crt.sh/?id=18027569 4fe3ceaa2c9dc8632e4f6427d790910b https://crt.sh/?id=18028274 7b800fb40f6ac9bb4c172e18b459d118 https://crt.sh/?id=18028275 47bb9032e90d25ee2afcfda16fea3bd4 https://crt.sh/?id=18028428 5c21ea9a8c08974d555655deb50b3e31 https://crt.sh/?id=18028538 4e5a7489a9d0a015994c14cfff5e645c https://crt.sh/?id=18028437 1255a82ad9bbfda11b2cee1147d61e6a https://crt.sh/?id=18028451 49b36013bd6c3d08577ae9814ac3beee https://crt.sh/?id=18028458 13dd5d79c44cdb00b93df43dc65f86fc https://crt.sh/?id=18028652 6a094d13a2e3440d64d6dfac638d57ac https://crt.sh/?id=18028655 71c7885057e40f129811fb1fcefd2097 https://crt.sh/?id=18028662 74a7b4177ba242fd7338e9a4a1df5890 https://crt.sh/?id=18028665 5e25ed875293905babc83843802553af https://crt.sh/?id=18028756 2a685431a4699784af78b363995212b5 https://crt.sh/?id=18028755 69aaa9cc2524d34bb52210005ae3e8a4 https://crt.sh/?id=18028771 2b7febfc0502efdc110559d5ef554ffc https://crt.sh/?id=18028773 19bf71d78a2f97e68ae6191588868f9e https://crt.sh/?id=18028796 7a71ceb77643f7e75ac89397be002b7b https://crt.sh/?id=18028871 2136a13c3a31c48c72764ae22bf6dea4 https://crt.sh/?id=18028881 2a57660063f8110ae0dac5a7b78928f9 https://crt.sh/?id=18028993 5962a42b5b9770ae8b7625629075695b https://crt.sh/?id=18029126 37c3592d9423087e87bb5c0a29c2c7b3 https://crt.sh/?id=18029218 532ee437dc15f2ac37c92504d9989098 https://crt.sh/?id=18029402 08ee00735878902bd4f77c21f727bd35 https://crt.sh/?id=18029515 06d22c048d6ea043c9b660fd73b3c7b5 https://crt.sh/?id=18030396 327a077bfeb9e215cc3acf42e4e291d4 https://crt.sh/?id=18987751 6f7580f1f3e2e58480aea57f42152eec https://crt.sh/?id=19618950 3c1e25aeabd5ae68b929af5196beb923 https://crt.sh/?id=19618982 0f42e137fb0c4da96e7dc6c4d7150ad8 https://crt.sh/?id=19618981 696399909917b2b75672dec65c184f70 https://crt.sh/?id=19619016 39c29e22e167afa0417474f68298f52f https://crt.sh/?id=20294817 06d01e058f5fd2d56fdc43ed320bdff1 https://crt.sh/?id=20585902 057f5449753f12145517f376036f4636 https://crt.sh/?id=21263756 760cb1857651511e948ba74187d26604 https://crt.sh/?id=21456231 44f55d976e480c88ed0cfd0e04f6dcea https://crt.sh/?id=21456233 737a8c6c7b63a1c9554c5d6e2778fc29 https://crt.sh/?id=21456236 129daeb5cf820ac220395f3c52fd52f2 https://crt.sh/?id=21566758 4e914db5203f5071a4da72e5fa59b094 https://crt.sh/?id=21566772 6f892ae9617a5c79844025f1a8eb532d https://crt.sh/?id=21566773 4d10228dd42b19aa8a11e9a9d61a5fb7 https://crt.sh/?id=21566777 3757fb14ddad6d25525c87c40d76015f https://crt.sh/?id=21566778 2a29878d3e2ca68935da158c621cf5c0 https://crt.sh/?id=21566788 44f19a5475f3d549258ed47dba8142f2 https://crt.sh/?id=21566789 35d149f4861b478c321da4b3693e2e43 https://crt.sh/?id=21566807 715db6947d30c212df34513c148c4c4f https://crt.sh/?id=21660987 4399147ee0ca3b135bf0f94b4ace3659 https://crt.sh/?id=23482299 3db2026ebe667acaa6b9194f966ec102 https://crt.sh/?id=23482276 1a3f0e2a0e3b5d234f119c9bfc1cfc50 https://crt.sh/?id=23482300 2dcc82fb72aa61186b91ba0825889c91 https://crt.sh/?id=23482291 336057c5dba7013dbf1672070d273a6a https://crt.sh/?id=23482308 65338f499b41b56d3ecc6073c7253e3f https://crt.sh/?id=23482273 208ae33d17719d2d1b5134eabe5ddc97 https://crt.sh/?id=23482340 18fb150aaa0753ff56224fcf73bfcb28 https://crt.sh/?id=23482332 07a8a915a6ae2606d1ece60c54a5f7f3 https://crt.sh/?id=24036891 1fbf0a7f4741b8f37207ba4437cb8c80 https://crt.sh/?id=24188280 50a067bf8aef8c3e36cc58c63286a0d5 https://crt.sh/?id=24982549 654844b4c0b4547c706308714b3ca381 https://crt.sh/?id=25074249 2f701715ba054bdeb91e6b80c46fb314 https://crt.sh/?id=31225124 316e8795cacb37c15e4c8e24dffe107c https://crt.sh/?id=31225220 5ade3b6d766679e47806bcff00a07f45 https://crt.sh/?id=31306095 6f1b99ece5ef6dde2e364a906818adfd https://crt.sh/?id=31306235 5320aea023233e0a1a4d7bd8157a1a88 https://crt.sh/?id=31306396 709313236e7cb5e42497021506cd9b65 https://crt.sh/?id=31306498 6dead098368b47908e121860d56ffacd https://crt.sh/?id=31306511 7eec5c22379bdfb7b886f81ce6d56a07 https://crt.sh/?id=31306808 2508d668c975efd994a3c55569a75e37 https://crt.sh/?id=31307248 5b963a5dbeab8f1cb4e828a746a0c497 https://crt.sh/?id=31307367 541574545a4bfc46355e65b91d4235a7 https://crt.sh/?id=31307504 5dbedeec13f61a7f121a0ced00fa3983 https://crt.sh/?id=31307505 5ad5c7a93ad953378e8d78a3cce30080 https://crt.sh/?id=31307507 313170bda9d8fe2fdda27de2c7093183 https://crt.sh/?id=31307534 7b308b5e383c207366a2d53d11f2c1bf https://crt.sh/?id=31307539 66db4bc46e927c46da2d8d8ff9fa19e5 https://crt.sh/?id=31307543 3b2a646f852e0d72d9199010bd4c2b23 https://crt.sh/?id=31307544 70272fa465e75a78a7f3621cd50fc654 https://crt.sh/?id=31307545 53b9737f3327c8c8558a445c5a360c91 https://crt.sh/?id=31307546 2c8bbae04bd04c9b9dce83d8edad4c5b https://crt.sh/?id=31307552 25ac1c53f225b792999922b806efefcd https://crt.sh/?id=31307553 662bc46e17bb68f8f027b98665968aff https://crt.sh/?id=31307556 cab5a87c7880107a8266bc917a7d1c https://crt.sh/?id=31307568 3c4bd3520206898b1563da5daa202d33 https://crt.sh/?id=31307567 17deaa2a59183831fe2e6e39bca30bd4 https://crt.sh/?id=31307587 29916fdac34027768efed01b02739da0 https://crt.sh/?id=31307586 34c9307ea175829b571094931a652cbc https://crt.sh/?id=31307594 043a410a42c94bc7942bcc8a11cf65d7 https://crt.sh/?id=31307595 41010916c1ea4e5134530ea0d508e530 https://crt.sh/?id=31307608 50f42a1b1a9b5b409d332930f68c01cc https://crt.sh/?id=31307612 492b85a1447f21f854dba859b5d9e81a https://crt.sh/?id=31307613 0a7f2d8e480a5e93d8e2e359c5b0ef32 https://crt.sh/?id=31307614 5aa127f343105a3eff39def6db3b4a7d https://crt.sh/?id=31307624 0eb21717a8a3a3d932b7e238e0246750 https://crt.sh/?id=31307632 25fa9d36a8d2235e59de794e68c1bf1f https://crt.sh/?id=31307633 4ad9d938e61a8011c4633fab89bff0bf https://crt.sh/?id=31307648 3ed7cc00cedc36e45760e748fe1f2ed3 https://crt.sh/?id=31307656 57bc987edb831fd35588bdc1ec9322a6 https://crt.sh/?id=31307657 401971c410b47542b46ed0f8d5161d50 https://crt.sh/?id=31307670 7a39efbc0ee3213edb561ff1947fe414 https://crt.sh/?id=31307705 7027617d41ee70f7638025238f501cf7 https://crt.sh/?id=31307759 31a38b009dff5eeaf2ad902307d3de71 https://crt.sh/?id=31307747 5192972cd1bfd7bb6e177a35c6615987 https://crt.sh/?id=31307749 7aabd23e80be9cf2cdbbf977a4129080 https://crt.sh/?id=31307765 4e273056bd077b6a94c0243bfe1604b8 https://crt.sh/?id=31307772 1c149b6faa304f639e54ac150a604484 https://crt.sh/?id=31307786 2b38cccdbbf2bbb3f87250a2be651159 https://crt.sh/?id=31307810 075fb745bf1942bb2566d8d30a233a51 https://crt.sh/?id=35419975 584a74e23c92cbf8c319f86a8ac8a92c https://crt.sh/?id=35419905 0a043b332f0a197c39250f3dc13c9111 https://crt.sh/?id=35420082 2406f92bb820180d00f18f4d5d557305 https://crt.sh/?id=35419982 0c75895c20fb58d7b111114652300903 https://crt.sh/?id=35420048 3c736286ba00c7ed2f1894e05519d070 https://crt.sh/?id=35420075 5281acb3554268f76dd036d280762bf4 https://crt.sh/?id=35420137 0830cd3fc1d1eceb48fcbe90b7fea6bd https://crt.sh/?id=35420065 2078e58004ec88dcec69bb665b47c0c4 https://crt.sh/?id=35420275 1ab475d89c0019e2af875d675a4b94ce https://crt.sh/?id=35420265 7971fec52f58599a255f9405734ba537 https://crt.sh/?id=35420298 5364cc6084e5705517db081e7aa0042e https://crt.sh/?id=41001122 1f74bf6a2dc175632382b612a9cef5ea https://crt.sh/?id=41001120 3703726629184df0b7be062c5e21e1cd https://crt.sh/?id=41001119 58f864b60e9f020a114e9ca3695c83fe https://crt.sh/?id=41001118 641767db2e2cc630cc6b70db6e62447f https://crt.sh/?id=41744438 443cb09d2eb85da60fb67b92a3666010 https://crt.sh/?id=46281655 2638b31d24c3344ff73d9086b3007ccd https://crt.sh/?id=48158433 258a0f4da249511f7c99e39c0d7823e1 https://crt.sh/?id=48173804 14c467efa61467f73a53ed3794797269 https://crt.sh/?id=48315924 3a0799eb03b6cd56dcf60d5a46e504a1 https://crt.sh/?id=48440200 46411cd30d346cf55fc758b2c64f3679 https://crt.sh/?id=48634112 6bc46cc415d2070b1d40a39b08670f25 https://crt.sh/?id=50220239 03ec3e7858aca04b6b3c3c3d97900520 https://crt.sh/?id=50232662 7509661a48b93f04e593c8d30ee03bdc https://crt.sh/?id=56035640 02bc7a682237a2e3a4026f1db4adb243 https://crt.sh/?id=56035639 4a1ab346e4f89b7818b5e60409fac89c https://crt.sh/?id=56035705 0a95861c600ce536b7086639a01cda5b https://crt.sh/?id=56035866 1e23b75463d5d5dd767b4fd46cfb2206 https://crt.sh/?id=56035879 3957cfb57b18eb8f64986a896cf12137 https://crt.sh/?id=56376628 3cb1abc5fc5d2f5cff49666598610b69 https://crt.sh/?id=56376635 3ce105ebdf4dbe1e91ab2ea5db1cc445 https://crt.sh/?id=56376520 0c322bb30450c82ca966873a11f7ea1a https://crt.sh/?id=56376627 50f18cba53fe05733527247d2d2471e1 https://crt.sh/?id=56981693 6ac1593b0f3211fe39700d58b04e66e3 https://crt.sh/?id=58720767 4b0f7f17c4b73189b8828b86d4a746ac https://crt.sh/?id=58734196 57971d58cc21a58e588d435eeba21ae2 https://crt.sh/?id=59125817 5a3e1228c378f41a0828f755d28f7cd7 https://crt.sh/?id=59255553 2ee34de4c3f7f8e2c46960cbb625c1cd https://crt.sh/?id=59255782 40d8a34e136cc11e6928f39194916b2f https://crt.sh/?id=59255796 03a30102b5a05993146ac9b0851129fb https://crt.sh/?id=59255774 17b0c912db2f4cb4c28bf3df95b279a6 https://crt.sh/?id=59255785 16295f692611fe3c80a512674713c581 https://crt.sh/?id=59255786 265ea3e64a52ca56be6b3b03275c0636 https://crt.sh/?id=73048232 60f5ecbb401219193dc778572bc60b26 https://crt.sh/?id=76770006 127276265b24a2c85cacac66af3b1e9b https://crt.sh/?id=76770016 4c079636cdac89d76ac98fff7a08f274 https://crt.sh/?id=76802781 0c9d4ee72e917ba3a6f4e1b7096c37e0 https://crt.sh/?id=88203012 2f570eb37e62275b5c69750a4050dc49 https://crt.sh/?id=98104332 7c494ff7277d776dabf68916820132a1 https://crt.sh/?id=108364192 3a076b403942ba6cce4df0d653add0da https://crt.sh/?id=108364188 23ecb16d972a3e8a701ee7796563c0b0 https://crt.sh/?id=108364191 582a3d0dc4b86282464d69b3781cbba7 https://crt.sh/?id=108364190 20a44e6155e8bd4fe80ccdbdd08648c0 https://crt.sh/?id=108364193 52832f46ad3752dfb31b0bbea1791feb https://crt.sh/?id=108364194 480dc3be159671517e0a73f9f07839fe https://crt.sh/?id=118423082 3dc26e72014d72fc0341fe780b4b0855 https://crt.sh/?id=124407871 4bb55ea977613503bf73552cf8169061 https://crt.sh/?id=124407855 2870303b9b13b53d533f543adfcf7c89 https://crt.sh/?id=124407865 5dedcd12fa9c7fa6fd20cf13adaf7abb https://crt.sh/?id=124407866 229c29ae54ebc61cbe2c026d22836d5f https://crt.sh/?id=124720612 045b5e8ddc1741090c98c97036187bb7 https://crt.sh/?id=124713413 6465423564731be15f9eadabb1eb1702 https://crt.sh/?id=154896584 7c08d8f80d5010618151fc5f038c92a8 https://crt.sh/?id=154896586 4983e1c6122e4b0ce8dc3c1011d23a23 https://crt.sh/?id=158715746 3b7264ca13c11cb2d4a9225160040ab1 https://crt.sh/?id=159320641 1faf5870dcaad315efb2e0dfdbc1ead6 https://crt.sh/?id=167855126 29a5ec146c09dc4a7f42e707f9684b52 https://crt.sh/?id=167883854 0c71b3cff47b4a5cdfe021b42225f450 https://crt.sh/?id=167883855 4e1967a9b2adebf0549faeaa5938e054 https://crt.sh/?id=170429183 6791802e7680cbf3d180a9b1764f98a6 https://crt.sh/?id=172742708 33cc35c2f9fea3ad7439f283ee669573 https://crt.sh/?id=188559470 2ed73b584748cda244649180fb6d4f11 https://crt.sh/?id=188559447 7ced6c4f6dd1a1330a3643d33b671853 https://crt.sh/?id=188559453 4b1f9b27e77ed51d20461eec14d84cbd https://crt.sh/?id=188559473 76254beb5bf1c0ffa58c4e61ca02660a https://crt.sh/?id=192546540 400e3035ab3ff071bcf8c7fd5a407887 https://crt.sh/?id=200748333 1a90f10f1b5c583784e3ce95f9cd2236 https://crt.sh/?id=201316075 254dc96dd44d94136c3ba1a593397ad0 https://crt.sh/?id=205723804 2c967ae6765e7eebe896bfaaf00e82e9 https://crt.sh/?id=208943705 59b92d578038ea2dc8a6b05cb74dbd5d https://crt.sh/?id=210092209 1c77295159063ca78ae4b73b094185c3 https://crt.sh/?id=210185237 1bf79e9c7c54951c11de1ce9af0a490c https://crt.sh/?id=218375953 12c3fd38a2e667b8fbb39049b5207e7d https://crt.sh/?id=218375970 6e12d284f343cdc89dfff68408ce7e14 https://crt.sh/?id=218375988 471ee0cd8fb1e493ebc416e2728cfb27 https://crt.sh/?id=218375942 1d969cac9738d57ad6e57aadadbc12f8 https://crt.sh/?id=218375944 64894fdeeb1ece7ce26dc84f958f7538 https://crt.sh/?id=218375946 747dba78367795be9aecd79b857f3744 https://crt.sh/?id=218375948 23c899c42b49ae18cc543b78a9e4d3ff https://crt.sh/?id=218375949 6a76b57a5fe2dca798d4a9b35b0e8988 https://crt.sh/?id=218375950 7bcad887fa089f8a9c6ba2dbac6ef63f https://crt.sh/?id=218375951 39823debffc92acb9efc8ef1471b32db https://crt.sh/?id=218375969 734a10edaa9a58008477f3c73a5b63ed https://crt.sh/?id=218375968 1f24659cc341f9c830613cdb38d91371 https://crt.sh/?id=218492381 35853d718aadf4feedfbb2d642dd59af https://crt.sh/?id=218492535 70f83e8c31f9887f6e12b965682ce296 https://crt.sh/?id=218492815 57694dc34ad8bd4bc0485d9fbdae104e https://crt.sh/?id=218492966 5fd705d3b1420d3e0b2a2dff99e6ef96 https://crt.sh/?id=218493013 3c5f2f57d43ddbc1516c19ec1362429d https://crt.sh/?id=218492250 2679d9bfd80a8b37891ed1521592ee2f https://crt.sh/?id=218492379 16921ff4305b95d11a5980d754fc4878 https://crt.sh/?id=218492537 482ddb654c974e8da8557ecf25e62070 https://crt.sh/?id=218492651 67fab84b2cb0069e88101a6cab4e1f98 https://crt.sh/?id=218492703 32c8848c845184e833481383e14b1708 https://crt.sh/?id=218492814 57b59052fa4bdcff71c43dbd73971afd https://crt.sh/?id=218492831 1745c1882d0b0bb7b5ff946b4eb91c41 https://crt.sh/?id=218493014 61ce9d827950e1149a933b250f82c043 https://crt.sh/?id=218493023 3d87e72152722c1da23ff66bea707cda https://crt.sh/?id=218928133 680f63d8b6ec593d02593c762687edc4 https://crt.sh/?id=220939016 5f039a008f89490123e855808ad8b151 https://crt.sh/?id=220939030 7b05b2ac8ef737758bf32074685b7020 https://crt.sh/?id=224763330 36cdb9c5c6b93f1e8320c27786b90f08 https://crt.sh/?id=224763374 5842da861c593795b738c30bd4b45b07 https://crt.sh/?id=224763186 62d124a1095360fb75e7a7e97d6b0dbb https://crt.sh/?id=224763220 260087a2de99ababf366c84263ae572e https://crt.sh/?id=224763221 0683992795efac4716b142822f14a859 https://crt.sh/?id=224763278 17a5532698727ed15c3b2a83b7517f63 https://crt.sh/?id=224763277 608d23d4983e76f49112244593f073dd https://crt.sh/?id=224763287 04282c05691ecab84660902a2947f6af https://crt.sh/?id=224763288 77c0256fe0cd5d977667868ed667a545 https://crt.sh/?id=224763332 6c4d3770e0d112f509c7a638f5b746e8 https://crt.sh/?id=224763334 430acc5e769afe076cc740f38b5f0757 https://crt.sh/?id=224763345 082ba63e14a1d548149bb726213c94ef https://crt.sh/?id=224763370 4bc5f24f6adf048c754fc12f8c54920f https://crt.sh/?id=224763371 17e7950c1abc30425dcd4ee0b8f29e43 https://crt.sh/?id=224763383 35003fa133e252ad8196c795efd28e44 https://crt.sh/?id=224763410 24ad633566b4af463447a0aa65c26abc https://crt.sh/?id=224763411 61e39f4ce34d65ad7760dcb2192cebc8 https://crt.sh/?id=224763417 36e803210cbe79bb443c88e184d84a86 https://crt.sh/?id=232961893 2bc902616764f4846b675feab4263588 https://crt.sh/?id=232961603 5bb15d213c1910060b32277b7e5ad07a https://crt.sh/?id=232961599 3b7cd9ea99c805912504749c7143b99c https://crt.sh/?id=253368616 7e8546974b82685b39c62631d6237199 https://crt.sh/?id=259443531 0e6ef1621eab0f10c63ef2aaebab5d2d https://crt.sh/?id=272911464 02ba28080f341cb53a7b368026f64641 https://crt.sh/?id=296922495 0d6177e212ceade6333a602f3d474253 https://crt.sh/?id=296922499 0a040a32a71c7ff64dde38e626d4f4d3 https://crt.sh/?id=296922510 05e69eebe7b36ba6ca12c6aba6131d88 https://crt.sh/?id=296922553 06fc5035a117a150b593389bde9baeb5 https://crt.sh/?id=296922578 0d8cc159f93e9b5c8368d22c4d71edc1 https://crt.sh/?id=296922580 02b4f3eeddb1e4e1cfff5372537d1870 https://crt.sh/?id=296922589 0ab674e553d44ef4250d1b56fca31373 https://crt.sh/?id=296948101 0399e96657049a930eaa6c714a5e1bdd https://crt.sh/?id=296922608 0705fe7b1b2194fdb0b8b3dfa585734f https://crt.sh/?id=296922610 013548f8e481507535f11988a58b3a60 https://crt.sh/?id=296922661 0b958ab3ec2018d144a0b0e215fc598a https://crt.sh/?id=296922666 03ffe1e33f0990b6da339604e3daac5f https://crt.sh/?id=296922687 0eaf0a5c2eef0ac0c1a4bfc271ddd596 https://crt.sh/?id=296922689 06e56573d2a3a3e9bd363f66ec0dce51 https://crt.sh/?id=296922691 0b35f4ba90c55425909a805f7192ec91 https://crt.sh/?id=296922695 05c33e5bcadc5db849e990b040a56c33 https://crt.sh/?id=296922697 06bdec0208f2facb9c610ea269d8fa42 https://crt.sh/?id=296922702 0d37a84d85d1c689ac47716cf8e03b2a https://crt.sh/?id=296926712 0b458a46a5a4bbd95e01ff83bcfd642f https://crt.sh/?id=296922391 0e1cf285916ea84195c0929c03571eb3 https://crt.sh/?id=296922590 04d03f8a4b8ef8461c501b099c276a5f https://crt.sh/?id=296922700 0c7a378f07548d2d89ae6c3a29f71678 https://crt.sh/?id=296922321 0d28e3934648558319cbc59109948118 https://crt.sh/?id=296946993 0c023c44bcc3139c0c772531de4827c9 https://crt.sh/?id=296922366 08bcdce91ffa44c25899e011424f785e https://crt.sh/?id=296922419 0fed701d9af3b6cb4f7fa1bfcbf5a915 https://crt.sh/?id=296922458 06c44292eb3d2b88b2c263964aef3629 https://crt.sh/?id=296922493 07ad70e166d6796781243188bb3e2027 https://crt.sh/?id=296922512 0a5a44b47b402efac8ed81bad92e8afd https://crt.sh/?id=296922574 0be473b7c40bae0bfb1b1154f6a82d6f https://crt.sh/?id=296922669 0c3e64c8af488f3dc1c32a7bb1f97607 https://crt.sh/?id=296922364 0c3a59be6409201adbf919479d1e931c https://crt.sh/?id=296922365 0a42b4f147ae7291df61692278799308 https://crt.sh/?id=296922414 01fedfc6b3889aadce442db9125ed8e1 https://crt.sh/?id=296922551 09c9def4933ae6e1abb29f6c7b7aeb60 https://crt.sh/?id=306059030 0be630019c642b8b9e9fbbb2f3e44fdd https://crt.sh/?id=311884656 09e82e26b9e3e1b18bb2951c016e793b https://crt.sh/?id=311884679 0120f6a47387cbc91eb50817a2b985cf https://crt.sh/?id=311891010 04396ee112fb3c6c35cfd47fe8d8155b https://crt.sh/?id=313983791 0acb5eeb3c87c84f548beeb018f09467 https://crt.sh/?id=318645732 0759925e3dbd229f7555ff549ce7e8fb https://crt.sh/?id=318696838 02a4563f97eedce9eb74dd3cd2c09cec https://crt.sh/?id=323481848 075a779b38067c8cacebd1ef57871c01 https://crt.sh/?id=325895256 0c2f5fe88424cb44fe8513ea60796a77 https://crt.sh/?id=338299100 0a0f192696dda61a6f6c1958be8964a7 https://crt.sh/?id=355745155 07e4cc0fee62fb6839d58160d2ecbfa0 https://crt.sh/?id=356136781 0ef46d310ba28055cbe3654ec3e703e6 https://crt.sh/?id=356606368 05b769f47fb313283c34fe2afcf69be3 https://crt.sh/?id=368994445 03fcf5adebf6f816b0c7124dabd380e3 https://crt.sh/?id=438172292 0ac092a0d7c228c55d0c3d9da0be81c6 https://crt.sh/?id=480511602 0a9b2808c88b36ce15e70b39fc1c8b95 https://crt.sh/?id=493519562 0242480a94e6426a955e0ed7fcfdbc74 https://crt.sh/?id=493519670 056abffc522b25954404d1cfcd434a55 https://crt.sh/?id=493520462 0ad9cc3ed799fd00ed17f23ea20203af https://crt.sh/?id=508222437 0ac25abea4253a9754bfab6fb941f728 https://crt.sh/?id=508222552 0bf9a37ff30c90a310cc59fa9461c140 https://crt.sh/?id=508221860 070256e32574a9a22d4121ad5b94218a https://crt.sh/?id=509869387 08c97a407448bb480b8e9a431994393b https://crt.sh/?id=509868916 0248a134a422c14766050b281df7a148 https://crt.sh/?id=509868921 06a6b3079b07a03a5fd5e3d02c438418 https://crt.sh/?id=511816320 0123865ab8fc8f6bad283d53d1395bf0 https://crt.sh/?id=511816328 076765fbec64d549f9395a8bbbb7be18 https://crt.sh/?id=511816322 05d10c5d560dda8e9b8af609c49cd375 https://crt.sh/?id=526224863 032df73e687e5f0755564eb142d1cc47 https://crt.sh/?id=606681579 0399644eee168145b1b942d912f891b8 https://crt.sh/?id=615930676 0ff900890d42a817985187e24c11e945 https://crt.sh/?id=615931252 0d72725ddb10fa4e1cd6a1ae2aad6b7c https://crt.sh/?id=615931257 06413d80733298590d976786f462f540 https://crt.sh/?id=627188575 01b316b0eea87c561ee5b18c89ea8e0f https://crt.sh/?id=635938547 06927c072fdfa4e7ceac78db14fff858 https://crt.sh/?id=667182614 0a231c25b1f2f13f9038e3caa42fdf66 https://crt.sh/?id=709938975 049f6ea294c2611c99a626f88ea0f748 https://crt.sh/?id=672703418 07ec282ab6036200698111da572690c7 https://crt.sh/?id=675070363 07f2f73e861d22a4db361444d8dccfce https://crt.sh/?id=675070320 0db83a823b5d2c6b00fb29e93cfa75f1 https://crt.sh/?id=684581732 0887b6b1a28a7ccc055dd6b53bc09bd4 https://crt.sh/?id=684581651 064e8f1b3ff1e70290e5e37dbdd6b217 https://crt.sh/?id=684581806 0a29320a4c77327522aeb7e8b94194e7 https://crt.sh/?id=698005053 071272ad74789d6fc0ce8ab8fe4dc17f https://crt.sh/?id=698171373 05234d7778ab62f8a2457a88781f2df5 https://crt.sh/?id=700451004 0321fcedf95a2e5c9287a6eccfd2d4a0 https://crt.sh/?id=719012435 03e27ae3449dc47049bdefe741748c7e https://crt.sh/?id=722324245 08bfa3b069972af7769c1df7c470e9f0 https://crt.sh/?id=722326218 070e0c6551eda173434b31c656311776 https://crt.sh/?id=722323579 0e137ff794deaa106335da82f2b3a6e3 https://crt.sh/?id=722323863 04f65e9127f8e5890ba303741036873a https://crt.sh/?id=722115663 0a5ce3d1c77c7c3c15f2b5965e602328 https://crt.sh/?id=722324654 015c6f3635ced5673a329490e4f179cf https://crt.sh/?id=722326223 09d538ea8912474a86bef6452dbf3e46 https://crt.sh/?id=722326192 021ed11e330d22d8467e05c9e6470085 https://crt.sh/?id=722326706 0ef1cf22b26be22597daa2362de5f3ed https://crt.sh/?id=722326195 057090f2190b6547651dd465e1bfa0cb https://crt.sh/?id=724663338 019b9b7f84aa275e88ca626997791ed6 https://crt.sh/?id=724514264 09cee89425abdac209020b42fcb4f375 https://crt.sh/?id=735191141 0968f81dd996925023e207848718212c https://crt.sh/?id=735191941 0f79cd1cba4d065b31b59fe3a5953d70 https://crt.sh/?id=735191992 05c64ca1094212e8036cbf7227216652 https://crt.sh/?id=736911672 0d3e7c10d6f6511ec4aae66dc859d4cd https://crt.sh/?id=748219103 013441fe9fe1f217d1bbca4051b4a20a https://crt.sh/?id=767703657 08c14e4350e79f31824806baa832878e https://crt.sh/?id=767902631 05d3a78a4f0967d213312ad0bcf52c78 https://crt.sh/?id=767902702 081c0b3225c210a174af16c46cfec900 https://crt.sh/?id=767704309 0afbe8673337e99eb975a56b4eb1cc87 https://crt.sh/?id=767704365 0d55eab6c6296a684d3443d1a8b95a57 https://crt.sh/?id=767903024 0316c5b129d12170177a12111af98ab0 https://crt.sh/?id=767903178 08581317a3fedbdeb0786c29830857c5 https://crt.sh/?id=767705252 0d1f1a7aa1487688d5deab9ba6497c2b https://crt.sh/?id=767903213 099a2cd3d7e9c964a7cd068657ab3eb7 https://crt.sh/?id=767903196 03f61e406bc3b08cac346cafacf4e50e https://crt.sh/?id=767704414 09f07c05f35970277a78e32620f6844c https://crt.sh/?id=767903260 0dc6ff761a83a3e758ef750da7beb340 https://crt.sh/?id=767697565 03ef7b40babf23a794c0f1798e2cab9d https://crt.sh/?id=767902849 04c6179eb1bad969f3895a25fdf5643b https://crt.sh/?id=767903052 0a44fdf715320175cbeb87b057cc7c54 https://crt.sh/?id=767903244 05a095e944200df84c61fe3cf915ba40 https://crt.sh/?id=767903571 0b1ae5e3725cb852f9114979ed959b8b https://crt.sh/?id=767903254 They plan on replacing all certificates by April 30th. They can't be replaced before then because of the code freeze and the risk of an outage. Because these are critical part of the enrollment systems, replacing the certs requires internal full stack validation and coordination with the external partners and customers. Coordinating a replacement on this takes weeks because of the application testing required. The systems use publicly trusted certificates because they are accessed by corporations everywhere to enroll employees in benefits and systems. Browser use is essential during these periods. The 30 day certificates do not help because the code freeze doesn't permit certificate changes. The main difficulty is the external buyoff by the corporate partners and the testing required. Changing certificates and domains together takes about the same effort.
Comment 1•5 years ago
|
||
Jeremy, Thanks for filing this. Unfortunately, there's still missing details, although hints of it are in the messages you've shared on the list. For example, you mentioned "The actual revocation occurs sometime between Jan 15 and April 30" For this set of certificates, it's necessary that we have a clearer understanding about what the migration plan looks like. Similarly, in analyzing what you present as the risks, you say 30 day certificates don't help because the code freeze doesn't permit certificate changes - but it's unclear how long that freeze lasts, when progress will begin, and how progress will be measured. It sounds like you're saying that changing certificates takes as much work as changing the entire domain name - is that correct? Concretely: 1) When does the code freeze end? 2) When do certificates start to: * Be replaced (e.g. with 30 day certificates) * Be rendered obsolete (e.g. due to domain changes or switching to wildcard certificates) 3) What are the progress milestones to expect * For example, "We expect that the majority will be replaced from February to March by renaming the host." * For example, "For those that renaming the host is difficult, we expect to transition to 30 day certificates." * For example, "We're working with the customer to get more concrete plans. We think roughly X, but will have a closer idea of what certificates are most problematic by Y."
Comment 2•5 years ago
|
||
Discussion is at https://groups.google.com/d/msg/mozilla.dev.security.policy/0oy4uTEVnus/pnywuWbmBwAJ
Assignee | ||
Comment 4•5 years ago
|
||
This is in response to Ryan's questions for clarification. 1) When does the code freeze end? There are two freeze dates that are important. 1st, 10/15 through 2/1. This is the Annual Enrollment Period for certain major health plans. 2nd, 12/1 through 2/1 this is the Welcome season for people to access their new or modified Pharmacy Benefits plans. These are our absolute busiest volume times of the year, and are critical to our customers so they can successfully navigate they prescription benefits. 2) When do certificates start to: * Be replaced (e.g. with 30 day certificates) * Be rendered obsolete (e.g. due to domain changes or switching to wildcard certificates) Certificates are starting to be replaced now, in the lower level environments (small subset of the total list). Planning for the remaining is happening and will continue through January. We will start swapping out the remaining certificates by February 15th and target completion of the certificate swaps by the end of March. 3) What are the progress milestones to expect During our Code freezes, we can’t accept a risk to change out significant pieces of our technology. Replacing these certs requires not only internal full stack validation, but also coordination with the large population of external partners and customers. That isn’t feasible to manage in the window that we have been given, especially since this is in the code freezes. Coordinating a change of this nature takes many weeks due to the number of the parties involved in the application testing.
Comment 5•5 years ago
|
||
(In reply to Brenda Bernal from comment #4) > This is in response to Ryan's questions for clarification. > > 1) When does the code freeze end? > There are two freeze dates that are important. 1st, 10/15 through 2/1. > This is the Annual Enrollment Period for certain major health plans. 2nd, > 12/1 through 2/1 this is the Welcome season for people to access their new > or modified Pharmacy Benefits plans. These are our absolute busiest volume > times of the year, and are critical to our customers so they can > successfully navigate they prescription benefits. Thanks for clarifying. To make sure I've got it summarized: There are two different freezes, both of which end on 2/1, correct? > > 2) When do certificates start to: > * Be replaced (e.g. with 30 day certificates) > * Be rendered obsolete (e.g. due to domain changes or switching to wildcard > certificates) > > Certificates are starting to be replaced now, in the lower level > environments (small subset of the total list). Planning for the remaining > is happening and will continue through January. We will start swapping out > the remaining certificates by February 15th and target completion of the > certificate swaps by the end of March. To clarify: The goal is to have existing certificates swapped with 30-day, underscore-carrying certificates by EOM March, is that correct? > 3) What are the progress milestones to expect > > During our Code freezes, we can’t accept a risk to change out significant > pieces of our technology. Replacing these certs requires not only internal > full stack validation, but also coordination with the large population of > external partners and customers. That isn’t feasible to manage in the > window that we have been given, especially since this is in the code > freezes. Coordinating a change of this nature takes many weeks due to the > number of the parties involved in the application testing. This didn't quite answer the question, but it looks like the previous answer provided many of these details, so I want to make sure I've got it summarized correctly: - Now - 2019-01-30: Planning for migration for all existing certificates (to...?) - 2019-02-01: Freeze is lifted - 2019-02-15: Migration begins (to... 30 day certs? non-underscore hosts?) - 2019-03-31: Migration complete - 2019-04-01: No new underscore certificates are needed or will be issued Is that right? If so, I think the core questions are: * Is this conflating changing the host name (which, understandably, can be more risky for an organization) with swapping the certificate to a 30 day certificate? That is, could the migration to shorter-lived certificates be completed independent of the name migration, and thus completed sooner? I'm wanting to confirm this was explored, and if it was ruled out, we've got it documented why it was ruled out. * Could you explain a bit more about the two week gap in February between 02-01 and 02-15? It would seem like the migration could begin immediately, but perhaps I've misunderstood the timeline. * Can you confirm that the expectation is that on-or-after 2019-04-01, no new underscore certificates are expected, as captured in SC12?
Assignee | ||
Comment 6•5 years ago
|
||
Replying the follow-up questions from Ryan: 1) Correct, two different freezes, both of which end on 2/1. 2) The certificate swap will be for non-underscore certificates. 3) The timeline is correct with one clarification below: - 2019-02-01: Freeze is lifted - 2019-02-15: Migration begins to non-underscore - 2019-03-31: Migration complete - 2019-04-01: No new underscore certificates are needed or will be issued Core questions responses: * Is this conflating changing the host name (which, understandably, can be more risky for an organization) with swapping the certificate to a 30 day certificate? That is, could the migration to shorter-lived certificates be completed independent of the name migration, and thus completed sooner? I'm wanting to confirm this was explored, and if it was ruled out, we've got it documented why it was ruled out. Based on our analysis, the effort requires the same due diligence and shakeout testing, so we are going to just move to the non-underscore hostnames and certs. * Could you explain a bit more about the two week gap in February between 02-01 and 02-15? It would seem like the migration could begin immediately, but perhaps I've misunderstood the timeline. The expectation is it will start between 2/1 and 2/15, the commitment is it will start by 2/15, based on schedule coordination across all the systems, partners, and customers. * Can you confirm that the expectation is that on-or-after 2019-04-01, no new underscore certificates are expected, as captured in SC12? Correct.
Comment 7•5 years ago
|
||
(In reply to Brenda Bernal from comment #6) > 2) The certificate swap will be for non-underscore certificates. > <snip> > Core questions responses: > > > * Is this conflating changing the host name (which, understandably, can be > > more risky for an organization) with swapping the certificate to a 30 day > > certificate? That is, could the migration to shorter-lived certificates be > > completed independent of the name migration, and thus completed sooner? I'm > > wanting to confirm this was explored, and if it was ruled out, we've got it > > documented why it was ruled out. > > Based on our analysis, the effort requires the same due diligence and > shakeout testing, so we are going to just move to the non-underscore > hostnames and certs. Just to make sure it's captured, Wayne had posed a question on list specific to this that looked unanswered: > I agree that more information is needed here. My hypothetical is that of a > critical vulnerability in one of Organization One's systems being > discovered on 16-Oct. Does Organization One hold off on patching until Feb? > If not, what makes these certificates different? Why is so much > coordination required if they are just used in browsers? Was a risk > assessment performed to evaluate the possibility of replacing them during > the freeze? Are routine changes permitted during the change? If so, why is > a certificate replacement not a routine change? I'm highlighting this, because it does sound like renaming the hosts (which wouldn't need to be completed until April 30) is being conflated with replacing the certificates (which SC12 sets at Jan 15). From the reply, it sounds like the view is that it is just as risky to replace certificates as it is to wholly rename hosts, which is both surprising and concerning, and I think something worth understanding more about. From looking at these hosts in sampling (I have not plugged the whole set into a query/analytic engine), it seems they follow the pattern that was discussed leading up to the meeting in October; namely, that potentially renaming the hosts could be delayed much longer, through the use of wildcard certificates, which can be issued after April 1, still, and will then just depend on whether the client software support underscores for hostnames, which, presumably all platforms this is being used on does. I think it's absolutely good to move away from such hostnames, to be clear, but in that risk assessment, it seems like that larger task/effort (of renaming hosts and updating references) is being conflated with what is meant to be 'simpler', namely, changing certificates. I think Wayne can add any color to that question, but I did want to highlight it was still hanging out there on the list, and was specific to this ("Organization One"). On my side: During the discussions of underscores and SC12, multiple requests were made to CAs to examine their systems and ensure any historic-but-still-valid underscore certificates (i.e. those issued before the CT transition date) were logged, to make sure that analysis properly considered and scoped the impact. From the remarks on the mailing list and this bug, it does appear that new certificates were recently logged, hence the delay for crt.sh links. **1**) What steps has DigiCert taken to log its full corpus of underscore certificates (those requesting exception and those revoked)? **2**) If no steps have been taken, when will they be taken? I ask these questions, because it is clear that CVS Health (as Matt highlighted on the list, is clear from the O in the certificates) is and was DigiCert's largest customer of impact. This was discussed during and following the Shanghai F2F. This is captured https://cabforum.org/pipermail/servercert-wg/2018-October/000331.html , noting that outside of vIPtela (which used old Symantec roots), CVS was the largest/most impacted organization. Knowing the full corpus of certificates (not just CVS) that DigiCert has issued with underscores helps us have a concrete discussion about whether we're talking about a third of the misissued certs, or something less than that. The current request is, it seems, 412 certificates, which is a marked increase from even what was discussed. Understanding the cause of 139 certificates to be 'missing' from conversation - whether it was DigiCert that didn't log them or a flawed analysis on my part - helps further inform the risk. **3**) Is it also fair to say that, looking at the corpus of certificates, CVS Health was a legacy customer of Symantec's that was acquired in the transition to DigiCert? It looks like the transition of DigiCert issuing a larger number of underscore certificates begins around https://crt.sh/?id=272911464 , which aligns with the Symantec/DigiCert transition date. Based on the aforementioned threads, it seems this was a practice that was 10x more prevalent with Symantec than other CAs, which then caused an increase in DigiCert-related issuance following the integration and transition. I'm just wanting to confirm this analysis is correct, in the context of this request, since it seems to fit into the "How we got here" timeline.
Reporter | ||
Comment 8•5 years ago
|
||
Sorry for the delay. Re: Wayne's question: The two are related because trying to get approvals to a replacement first, then a name change, then another certificate replacement is far longer and more difficult than changing everything at one. The slow part is not the updating, it's the testing by third parties and third party approvals using the services required to make the change. Re: Ryan's questions We've identified all of the certificates but have logged all certificates that will be part of the incident report. The original bug shows all of the certificates where there will be an incident on Jan 15. We aren't planning on logging the rest because they will be revoked on Jan 15th. The non-logged certificates are used only for server-to-server transactions and don't require trust in Google or Mozilla. The total corpus of certificates originally was about 2200. However, we've been reducing that number as we work with the customers to identify additional certificates that can be replaced prior to the date or where revocation won't impact use of the certificates. You are correct about legacy DigiCert vs. legacy Symantec. However, DigiCert did issue certs to underscore domains up until Oct 1. Verizon, for example, was legacy DigiCert. Now that I think about it, Verizon was probably the only legacy DigiCert customer on that list.
Comment 9•5 years ago
|
||
(In reply to Jeremy Rowley from comment #8) > Sorry for the delay. > > Re: Wayne's question: > The two are related because trying to get approvals to a replacement first, > then a name change, then another certificate replacement is far longer and > more difficult than changing everything at one. The slow part is not the > updating, it's the testing by third parties and third party approvals using > the services required to make the change. I can't speak for Wayne, but it's not clear to me how this response answers those questions. There were specific examples given in the hypothetical, such as: >> My hypothetical is that of a >> critical vulnerability in one of Organization One's systems being >> discovered on 16-Oct. Does Organization One hold off on patching until Feb? >> If not, what makes these certificates different? That's about replacing the certificates with shorter-lived certificates, not about renaming. The problem is trying to put together a coherent picture of the problems, and the shorter answers aren't really helping put together a narrative that explains the timelines or the challenges. We're left trying to piece it together from the bits. For example, from the timeline, we know that migration starts 02-15 and is expected to complete by 04-01 - meaning 6 weeks to both replace certificates and rename hosts. In that time, the expectation is that hosts will be renamed, certificates replaced, and acceptance testing performed. What's missing from that, which Wayne's questions got to, is "Are you saying there is no way to replace certificates from 10-15 to 02-01" - that is, replace the certificates, not rename the hosts. Given that we know what the bound on that timeline is - that no work starts until 02-15 as planned - it's unclear why or how it's far longer and far more difficult to replace the certificates in that interim. It's also unclear where the acceptance testing comes in - presumably, these would be issued from the same hierarchy, and thus present no issues. Now, I can try and guess reasons that aren't being stated. For example, it may be implied that "It will take longer than two weeks to replace the remaining certificates. Further, once those certificates have been replaced, they would need to be replaced again within 30 days of their issuance, thus likely in the early part of February. As a result, work to rename hosts will not be able to begin until replacing the certificates the second time has completed. Further, given the timeline, certificates will need to be replaced a third time in parallel during that migration, sometime in early-mid March, thus causing further risk to the timeline to rename". Of course, that's not stated, and it's all based on trying to understand what the challenges are with replacing the certificates, which still has not really been responded to in substance since the discussion begin. > Re: Ryan's questions > We've identified all of the certificates but have logged all certificates > that will be part of the incident report. The original bug shows all of the > certificates where there will be an incident on Jan 15. We aren't planning > on logging the rest because they will be revoked on Jan 15th. The > non-logged certificates are used only for server-to-server transactions and > don't require trust in Google or Mozilla. I would encourage DigiCert to revisit this decision as quickly as possible. One of the key aspects of transparency is understanding the (incident) versus (total) certificates. Knowing this prior to SC12 may have helped DigiCert avoid an incident entirely - for example, if the problem was 2X worse than it was, or 4X, or however much, discussions about the feasability of migration and shorter-lived certificates could have gone differently. Post-SC12, knowing about whether DigiCert is planning to treat 98% of their certificates as part of an incident vs 2% of their certificates seems very valuable in measuring the impact.
Reporter | ||
Comment 10•5 years ago
|
||
>> My hypothetical is that of a >> critical vulnerability in one of Organization One's systems being >> discovered on 16-Oct. Does Organization One hold off on patching until Feb? >> If not, what makes these certificates different? Security vulnerabilities are patched based on their rating, the practical mitigation efforts that don't require a change to key systems, the system, and number. Whether the vulnerability waits until Feb or not depends specifically on the vulnerability. The difference between the two is there is no CVSS to point to, there's no way to identify what options there are other than replace the cert, and there's no process for exceptions where the CAB Forum decides something. >> For example, from the timeline, we know that migration starts 02-15 and is expected to complete by 04-01 - meaning 6 weeks >> to both replace certificates and rename hosts. In that time, the expectation is that hosts will be renamed, certificates >> replaced, and acceptance testing performed. What's missing from that, which Wayne's questions got to, is "Are you saying >> there is no way to replace certificates from 10-15 to 02-01" - that is, replace the certificates, not rename the hosts. I'll get back to you on this one. I'm not intending to have short answers only. This incident report is different than any other ones I've filed because the root cause is not directly with DigiCert. If we mis-issue a certificates, finding the issue, reporting what happened, and remediating the issue isn't difficult. Having third parties involved is increasing the complexity in reporting the information.
Comment 11•5 years ago
|
||
(In reply to Jeremy Rowley from comment #10) > >> For example, from the timeline, we know that migration starts 02-15 and is expected to complete by 04-01 - meaning 6 weeks > >> to both replace certificates and rename hosts. In that time, the expectation is that hosts will be renamed, certificates > >> replaced, and acceptance testing performed. What's missing from that, which Wayne's questions got to, is "Are you saying > >> there is no way to replace certificates from 10-15 to 02-01" - that is, replace the certificates, not rename the hosts. > > I'll get back to you on this one. I'm not intending to have short answers > only. This incident report is different than any other ones I've filed > because the root cause is not directly with DigiCert. If we mis-issue a > certificates, finding the issue, reporting what happened, and remediating > the issue isn't difficult. Having third parties involved is increasing the > complexity in reporting the information. Is there an update here?
Updated•5 years ago
|
Reporter | ||
Comment 12•5 years ago
|
||
Based on the conversation on the forum, the post from Wayne, and instruction from Google, our understanding is there is no exception or extension possible and the expectation is that all CAs will revoke the certificates on the date required by the BRs. We hope that the same rules/penalties/expectations will be applied to those CAs who fail to revoke on the required date. Thank you for the discussion. Although we were hoping for more compassionate results, we do appreciate the feedback and clarification on expectations.
Reporter | ||
Comment 13•5 years ago
|
||
Seems there was a mis-communication on the intent of the discussions. We will post an update answering Ryan's questions tomorrow. Please ignore my previous post. Apologies for the confusion.
Assignee | ||
Comment 14•5 years ago
|
||
In reply to Ryan's prompt on comment #11, here's the response back to the following:
For example, from the timeline, we know that migration starts 02-15 and is expected to complete by 04-01 - meaning 6 weeks
to both replace certificates and rename hosts. In that time, the expectation is that hosts will be renamed, certificates
replaced, and acceptance testing performed. What's missing from that, which Wayne's questions got to, is "Are you saying
there is no way to replace certificates from 10-15 to 02-01" - that is, replace the certificates, not rename the hosts.
Customer response:
"It’s just as much work AND risk to both change the name of and replace a cert as it is to just replace the cert, because in both cases we’re “touching” the application that relies on the cert – which means application testing in non-production before the cert replacement, and in production after the cert replacement. Any touch to core PBM application now, in the heart of welcome season, constitutes significant, inadvisable, risk."
The customer is mitigating the risk of loss of customer service and benefits disruption during the busiest time of the annual enrollment period.
Comment 15•5 years ago
|
||
That risk assessment is surprising and somewhat against what would result from common industry practice. It is hoped that any remediation plan, if an incident occurs, will detail how such a situation will be mitigated in the future.
For example, past incidents have revealed a number of possible options:
- Migration to a private (non-BR audited) PKI
- The use and adoption of certificate automation, such that acceptance testing is not tied to individual certificates (a similar concern with pinning)
- The use of TLS intermediary devices (reverse proxies) that support more rapid upgrade and deployment, as explored through the SHA-1 and Symantec deprecations
While the BRs have long had an industry-standard, CA-agnostic revocation requirement, ultimately, the CA is responsible for making the decision to revoke or not revoke. It is hoped that a CA that makes a decision not to revoke will take concrete steps to prevent a reoccurrence in the future and identify concrete steps that they will take to ensure that.
Comment 16•5 years ago
|
||
Jeremy: Can you confirm whether an incident occurred and ensure that all of the details of affected certs are accurate?
Assignee | ||
Comment 17•5 years ago
|
||
Hi Ryan, I will be responding to provide updates on the underscore incidents. I can confirm that an incident has occurred and the details provided are accurate to the best of our knowledge. Our planned extension to revoke the remaining certificates (listed above) is 31-May-2019. We will provide periodic updates as progress is made.
Comment 18•5 years ago
|
||
Brenda: I believe that date is different than the past discussions, and so want to understand how this target moved.
Comment #0 stated:
They plan on replacing all certificates by April 30th
Comment #4 stated:
target completion of the certificate swaps by the end of March
Comment #6 stated:
2019-04-01: No new underscore certificates are needed or will be issued
So now I'm trying to understand Comment #17:
Our planned extension to revoke the remaining certificates (listed above) is 31-May-2019
Assignee | ||
Comment 19•5 years ago
|
||
Hi Ryan, I will say the 31-May-2019 is an error on my part. I meant to align it to the March 31st date. With that said, I'd like to report that the customer has made significant progress and Digicert plans to revoke their remaining underscores by Friday, February 8, 2019.
Updated•5 years ago
|
Updated•5 years ago
|
Assignee | ||
Comment 20•5 years ago
|
||
The remaining underscore certificates listed above in Jeremy's initial report were all revoked as of today, February 8, 2019.
Comment 21•5 years ago
|
||
Thanks for the update, Brenda. I'm glad to hear this was resolved more timely than the originally proposed March 31.
I spot-checked a dozen, and they all show revoked, so I'm going to close this issue as Resolved, tagging Wayne in case he has any questions.
Updated•5 years ago
|
Updated•1 year ago
|
Updated•1 year ago
|
Description
•