GlobalSign: IP in dnsName
Categories
(CA Program :: CA Certificate Compliance, task)
Tracking
(Not tracked)
People
(Reporter: jonathan, Assigned: douglas.beattie)
Details
(Whiteboard: [ca-compliance] [ov-misissuance])
GlobalSign issued the following certificates with invalid dnsNames containing IP addresses. It looks like they stopped issuing these invalid certificates in 2016, but they did not revoke them, provide an incident report, or explain their decision to let them expire instead of revoking when they stopped this practice.
I notified them at 2019-01-29 17:47 UTC via an email to their problem reporting address (report-abuse@globalsign.com) and have not received a response. The certificates have not been revoked.
https://crt.sh/?opt=zlint&id=4922163
https://crt.sh/?opt=zlint&id=6567385
https://crt.sh/?opt=zlint&id=8624033
https://crt.sh/?opt=zlint&id=9983306
https://crt.sh/?opt=zlint&id=10829774
https://crt.sh/?opt=zlint&id=12464551
https://crt.sh/?opt=zlint&id=12986911
https://crt.sh/?opt=zlint&id=16239227
https://crt.sh/?opt=zlint&id=20495143
https://crt.sh/?opt=zlint&id=38682657
https://crt.sh/?opt=zlint&id=42288706
https://crt.sh/?opt=zlint&id=42346388
https://crt.sh/?opt=zlint&id=42543558
https://crt.sh/?opt=zlint&id=42547871
https://crt.sh/?opt=zlint&id=42675872
https://crt.sh/?opt=zlint&id=282638676
https://crt.sh/?opt=zlint&id=282646126
https://crt.sh/?opt=zlint&id=282646184
https://crt.sh/?opt=zlint&id=282646238
https://crt.sh/?opt=zlint&id=282646294
https://crt.sh/?opt=zlint&id=282908450
https://crt.sh/?opt=zlint&id=282908749
https://crt.sh/?opt=zlint&id=282908753
https://crt.sh/?opt=zlint&id=282910659
Comment 1•6 years ago
|
||
Linus: Could you provide an update and Incident Report (per https://wiki.mozilla.org/CA/Responding_To_An_Incident ) about why GlobalSign failed to meet the Baseline Requirements revocation window?
Updated•6 years ago
|
Assignee | ||
Comment 2•6 years ago
|
||
This is the file Peter Bowen created a few times to let all the CAs know about issues that lead up to the identification of GlobalSign certificates with IP addresses in dnsName:
https://docs.google.com/spreadsheets/d/1lJt-1tkgKcbw5woEr4-tcpqB-M-HKwjFNSdX2jla2EU/edit#gid=1516961828
At the time this list of non-compliant certificates was reported, there was continued discussion about this IP address topic and how browsers handled (or not) IP addresses in the SAN. Some need IP address in dnsName, others need in the ipAddress:
https://groups.google.com/d/msg/mozilla.dev.security.policy/Av6oZxbjvB4/QxveVM45BwAJ
During this period, the incident reporting process and rules for what constituted an "incident" weren't as formal nor as high visibility. The report Peter posted had over 45,000 entries from essentially every CA, and I don't recall there being hundreds of incidents. Certainty today there would be no question about how to handle an issue like this. In late 2015 and early 2016 the process wasn't as clear.
As you noticed, we updated our systems in July 2016 to address this to stop issuing new certificates with IP addresses in the dnsName field. We'll initiate revocation shortly on the list of still-active certificates.
Updated•6 years ago
|
Assignee | ||
Comment 3•6 years ago
|
||
All of the identified certificates have been revoked.
Comment 4•6 years ago
|
||
Doug: thank you for the information.
As you point out, these certificates were originally brought to GlobalSign's attention at a time when incident reporting and revocation expectations were much different than they are today. My main concern in this bug is that GlobalSign apparently failed to respond to the problem report within 24 hours as required by BR section 4.9.5. If that is the case, please explain why that happened and how it will be prevented in the future.
Also, can you explain why GlobalSign apparently decided not to revoke these certificates until the issue was publicly reported via this bug? I suspect this is related to your answer in comment #2, but just want to understand the thinking around the BR section 4.9.1.1 requirements when an issue is reported a second time.
Assignee | ||
Comment 5•6 years ago
|
||
On January 29th,17:47 GMT: We received the report
On January 29th, 19:22, we closed this report as a duplicate because, as listed above, this topic was already reviewed and closed. What the support team didn't pull out as a new action was the comment about these certificates not being revoked. We had addressed the situation at the time under different terms and assumptions than we do today, and that distinction wasn't apparent to the team that processed this request.
We're currently reviewing the "report-abuse" process looking for ways to add proper rigger to future cases. At a minimum, we'll be bringing in applicable compliance experts on future emails to "report-abuse" to avoid this in the future.
Comment 6•6 years ago
|
||
Even if a problem report is reporting a duplicate problem, doesn't BR 4.9.5 require the CA to respond to the reporter within 24 hours? According to the description, GlobalSign never responded to the reporter.
Assignee | ||
Comment 7•6 years ago
|
||
Yes, and we're updating the process to be sure that there is a response. Normally there is, but due to this being handled like a duplicate that was inadvertently omitted. While we took action within a couple of hours, the proper interpretation of the issue and the response weren't up to our standards and this driving the need to review/update the process.
Comment 8•6 years ago
|
||
Doug: please update this bug with the results of GlobalSign's review of the "report-abuse" process.
Assignee | ||
Comment 9•6 years ago
|
||
We’ve reviewed and updated our process to handle incoming emails to the report-abuse address.
We’re integrating 2 existing organizations into the processing of these reports:
-
The GlobalSign Security Operations Center (SOC) will receive copies of all incoming reports in parallel with our support organization. They will assure that the support organization responses within a timely manner (goal of maximum of 4 hours). In the event that support does not process the request, the built-in SOC escalation flow will be followed to assure timely acknowledgement. The SOC, being well versed in security and compliance topics, will provide guidance on the proper handling of incoming emails (Spam, phishing, etc)
-
All final decisions of these reported cases will be reviewed and approved by the GlobalSign Operational Governance team. After applicable research and investigation, the support organization will escalate the final decisions to this group which is well versed in risk management to assure the proper decision is rendered. The Operational Governance team will bring in subject matter experts from the Product Management, Root embedding, and Compliance groups as needed depending on the type of reported issue.
This resolves both of the issues that were uncovered here (not sending a timely acknowledgement and mis-interpreting the incident).
If you have any further questions or comments, please let us know.
Comment 10•6 years ago
|
||
It appears that remediation is complete.
Updated•2 years ago
|
Updated•2 years ago
|
Description
•