User Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:65.0) Gecko/20100101 Firefox/65.0
Steps to reproduce:
On February 25th 2019 during a detailed policy documents review comparing differences between the Baseline Requirements and Mozilla Policy, we discovered that HARICA had issued Intermediate CA Certificates with ECDSA P-384 key and SHA256 hashing algorithm which is a violation of Section 5.1 of the Mozilla Root store Policy.
The effective date of the Mozilla Root store Policy that only allows specific curve-hash pairs was February 28, 2017. Please note that this issue is not considered a violation of the Baseline Requirements which describe allowed curves and hashing algorithms in section 6.1.5.
HARICA's CA Software (EJBCA) was set to inherit the Root CA's combination of Key and hash algorithms and used the SHA256ECDSA algorithm although the key was using curve P-384. This led to issuing subCA Certificates and end-entity certificates with the same pair (SHA256, P-384).
As soon as the finding was verified and an internal Incident created (Ticket#2019022610002302), Certificate issuance was disabled from the affected subCAs.
A full database scan was conducted and revealed only one (1) affected end-entity certificate issued for a test web site operated by HARICA. Five (5) intermediate CA Certificates were also affected.
Mitigation measures are implemented to minimize the risk of reoccurance. More details in section 2.7 of the attached report.
The problematic Certificates are planned to be revoked by March 8th, 2019.
Please let us know if you have any further questions or concerns about this incident.