Closed Bug 1651553 Opened 5 years ago Closed 4 years ago

QuoVadis: Failure to revoke within 7 days: OCSP EKU issue

Categories

(CA Program :: CA Certificate Compliance, task)

Tracking

(Not tracked)

RESOLVED FIXED

People

(Reporter: stephen.davidson, Assigned: stephen.davidson)

Details

(Whiteboard: [ca-compliance] [ca-revocation-delay] [ocsp-failure])

Although we have made significant progress, we acknowledge that QuoVadis will not be able to revoke all CAs impacted by the issue referenced under Bug1649938 in the mandated period.

We will update our report within the week with additional details.

Assignee: bwilson → stephen.davidson
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true
Whiteboard: [ca-compliance] [delayed-revocation-ca]

An update is needed. Thanks.

Flags: needinfo?(stephen.davidson)
Whiteboard: [ca-compliance] [delayed-revocation-ca] → [ca-compliance] [delayed-revocation-ca] Next update 24-July-2020

QuoVadis provides an update at Bug 1649938 on progress towards the replacement and eventual revocation/key destructions.

Flags: needinfo?(stephen.davidson)

(In reply to Stephen Davidson from comment #2)

QuoVadis provides an update at Bug 1649938 on progress towards the replacement and eventual revocation/key destructions.

Why is that relevant?

This bug is about why you could not revoke within 7 days, what steps you are taking to fulfill that requirement in the BR in future, and to demonstrate how these steps will prevent this situation in future.

You have not come up with a single line about that in 17 days, leading to questions if you take this seriously at all. A CA that does not want to improve is not something I would want to rely on as a Firefox user.

And this is a very troubling pattern with QuoVadis. In both bug 1645708 and bug 1649880, you did not take the chance to either at least take a look at the certificate in question (you would have seen that both "none" and "Government Entity" were not correct as serialNumber) or research the BR's history instead of guessing its interpretation. At both incidents, it took me less than 10 minutes to figure that out, whereas you apparently did not even spend that time. If you do not take any time to look at the context of problems, it leads me to the conclusion that you do not want to improve at all.

Whiteboard: [ca-compliance] [delayed-revocation-ca] Next update 24-July-2020 → [ca-compliance] [delayed-revocation-ca] Next update 10-Aug-2020

A progress update has been provided at Bug 1649938.

The failure to revoke within 7 days was driven by the complexity of this bug, which involves 30 issuing CAs under the QuoVadis roots. The issuing CAs were not homogeneous, including both TLS and nonTLS as well as internal and externally operated CAs. All told the task requires the replacement of ~1.3 million end entity certificates. A project of this scale has required careful coordination to not create additional security harm in remediating the bug.

As far as addressing the root cause of the issue, QuoVadis ceased using the id-kp-OCSPSigning EKU in new issuing CAs in 2019. In terms of ongoing improvements, QuoVadis is part of DigiCert efforts to review existing practices in toto against standards such as the BR (on top of our rolling efforts for new ballots); to adopt standard certificate profiles and signoffs of CA ceremony documents; and to adopt automation tools to reduce and/or catch errors.

Whiteboard: [ca-compliance] [delayed-revocation-ca] Next update 10-Aug-2020 → [ca-compliance] [delayed-revocation-ca] Next update 19-Aug-2020

We have updated timelines for revocation posted here: https://bugzilla.mozilla.org/show_bug.cgi?id=1649938#c7

Another update on this bug was posted here: https://bugzilla.mozilla.org/show_bug.cgi?id=1649938#c8

Whiteboard: [ca-compliance] [delayed-revocation-ca] Next update 19-Aug-2020 → [ca-compliance] [delayed-revocation-ca] Next update 1-Oct-2020

Another update on this bug was posted here: https://bugzilla.mozilla.org/show_bug.cgi?id=1649938#c9

A progress update is provided at: https://bugzilla.mozilla.org/show_bug.cgi?id=1649938#c11. We will provide a next update on revocations and key destructions ~Nov 3.

Whiteboard: [ca-compliance] [delayed-revocation-ca] Next update 1-Oct-2020 → [ca-compliance] [delayed-revocation-ca] Next update 2020-12-01

A progress update is provided at: https://bugzilla.mozilla.org/show_bug.cgi?id=1649938#c14. Although activity related to this bug continues apace, we suggest a next-update of January 7, 2021.

QuoVadis is on track for the schedule described in https://bugzilla.mozilla.org/show_bug.cgi?id=1649938#c14. We suggest a next-update of January 7, 2021.

QuoVadis is on track for the schedule described in https://bugzilla.mozilla.org/show_bug.cgi?id=1649938#c14. We suggest a next-update of January 22.

Whiteboard: [ca-compliance] [delayed-revocation-ca] Next update 2020-12-01 → [ca-compliance] [delayed-revocation-ca] Next update 2021-01-22

The final QuoVadis operated CAs have been revoked with key destruction. Further updates will be provided as available on the remaining Siemens operated CAs. See https://bugzilla.mozilla.org/show_bug.cgi?id=1649938#c17.

We have no updates at this time; next steps are the completion of the audit report for key destructions of the QuoVadis-hosted CAs and revocation of the remaining Siemens CAs.

On track per update at https://bugzilla.mozilla.org/show_bug.cgi?id=1649938#c19. We suggest a next-update of March 15.

The remaining Siemens operated subCAs affected by this bug have been revoked, see more at https://bugzilla.mozilla.org/show_bug.cgi?id=1649938#c20

This concludes the CA revocations related to this bug.

I think this bug can be closed and the key destruction report from Siemens can be covered by Bugzilla Bug #1649938. I'll schedule this to be closed on or about next Wednesday, 31-March-2021.

Flags: needinfo?(bwilson)
Status: ASSIGNED → RESOLVED
Closed: 4 years ago
Flags: needinfo?(bwilson)
Resolution: --- → FIXED
Product: NSS → CA Program
Whiteboard: [ca-compliance] [delayed-revocation-ca] Next update 2021-01-22 → [ca-compliance] [ca-revocation-delay] [ocsp-failure]
You need to log in before you can comment on or make changes to this bug.