IdenTrust: S/MIME certificates issued in violation of New S/MIME Baseline Requirements v1.0
Categories
(CA Program :: CA Certificate Compliance, task)
Tracking
(Not tracked)
People
(Reporter: roots, Assigned: roots)
Details
(Whiteboard: [ca-compliance] [smime-misissuance])
Attachments
(1 file)
3.58 KB,
text/csv
|
Details |
Actual results:
- How your CA first became aware of the problem (e.g. via a problem report submitted to your Problem Reporting Mechanism, a discussion in the MDSP mailing list, a Bugzilla bug, or internal self-audit), and the time and date.
In the course of normal activities, on 06 September 2023 IdenTrust discovered that 114 S/MIME certificates had been issued after 01 September 2023 in violation of certificate details contained in the CA/B Forum S/MIME Baseline Requirements version 1.0 that went into effect on that day.
Specifically, the new certs were issued in violation of these requirements:
• Section 3.2.2.2 – 112-bit entropy requirements: 68 certificates.
• Section 7.1.4.2.5 – Subject DN attributes for sponsor‑validated profile: 27
certificates.
• Section 7.1.4.2.6 – Subject DN attributes for individual‐validated profile: 19
certificates.
-
A timeline of the actions your CA took in response. A timeline is a date-and-time-stamped sequence of all relevant events. This may include events before the incident was reported, such as when a particular requirement became applicable, or a document changed, or a bug was introduced, or an audit was done.
• 2023-09-01 1:20 AM MDT – Improper issuance began.
• 2023-09-06 4:00 PM MDT - IdenTrust discovered that 114 S/MIME certificates
had been issued using the old processes and profiles.
• 2023-09-06 5:17 PM MDT – Issuance was stopped.
• 2023-09-07 4:30 PM MDT – IdenTrust completed sending revocation notices to
affected certificate holders.
• 2023-09-11 2:29 PM MDT – Hotfix deployed to fix entropy size issue. Certificate
profiles were also updated to include the subject givenName and surname
attributes.
• 2023-09-11 2:30 PM MDT – All affected certificates were revoked.
• 2023-09-11 3:00 PM MDT – IdenTrust enabled the new issuance process for
mailbox-validated S/MIME certificates. -
Whether your CA has stopped, or has not yet stopped, certificate issuance or the process giving rise to the problem or incident. A statement that you have stopped will be considered a pledge to the community; a statement that you have not stopped requires an explanation
• Issuance was stopped 2023-09-06 5:17 PM MDT
-
In a case involving certificates, a summary of the problematic certificates. For each problem: the number of certificates, and the date the first and last certificates with that problem were issued. In other incidents that do not involve enumerating the affected certificates (e.g. OCSP failures, audit findings, delayed responses, etc.), please provide other similar statistics, aggregates, and a summary for each type of problem identified. This will help us measure the severity of each problem.
• First Issuance with the problem – 09/01/2023 1:20 AM MDT.
• Last Issuance with the problem – 09/13/2023 16:24 PM MDT
• Validation review of email address and change in Identity document
requirement.
• 106 certificates were affected. A list is attached. Of this number:
o 68 were issued in violation of the entropy requirements.
o 27 sponsor-validated certificates were issued without a given name in the
given Name field.
o 11 individual-validated certificates were issued without a surname in the
surname field. -
In a case involving TLS server certificates, the complete certificate data for the problematic certificates. The recommended way to provide this is to ensure each certificate is logged to CT and then list the fingerprints or crt.sh IDs, either in the report or as an attached spreadsheet, with one list per distinct problem. It is also recommended that you use this form in your list "https://crt.sh/?sha256=[sha256-hash]", unless circumstances dictate otherwise. When the incident being reported involves an SMIME certificate, if disclosure of personally identifiable information in the certificate may be contrary to applicable law, please provide at least the certificate serial number and SHA256 hash of the certificate. In other cases not involving a review of affected certificates, please provide other similar, relevant specifics, if any.
• N/A. These were S/MIME certificates.
-
Explanation about how and why the mistakes were made or bugs introduced,
and how they avoided detection until now.• Misinterpreted CA/B Forum S/MIME Baseline Requirements version 1.0 for the
givenName attribute.
• Missed the new entropy requirements of the CA/B Forum Baseline
requirements version 1.0. -
List of steps your CA is taking to resolve the situation and ensure that such situation or incident will not be repeated in the future, accompanied with a binding timeline of when your CA expects to accomplish each of these remediation steps.
• All affected certificates were revoked.
• We updated the problematic fields and have commenced a new issuing
process.
• We increased multi-team reviews of changes in S/MIME baseline requirements.
• We are planning to implement an updated S/MIME linting tool no later than
January 2024.
• Monthly updates will be provided until an updated linting tool is implemented.
Next update is scheduled for 2023-10-18
Updated•1 year ago
|
Updated•1 year ago
|
This is to confirm that we are on track to implement an updated S/MIME linting tool no later than January 2024.
Our next update willbe provided by November 30, 2023.
Updated•1 year ago
|
We are on track to implement the updated S/MIME linting tool as promised no later than January 31, 2024.
We will post a status update by December 29, 2023.
We are on track to implement the updated S/MIME linting tool as promised no later than January 31, 2024.
We will post the next status update by January 31, 2024.
Updated•11 months ago
|
Over the weekend (1/20/2024), we successfully implemented the promised linting tool for S/MIME certificates. Throughout the week, we have confirmed its proper functionality. With no outstanding tasks remaining, we consider this issue resolved.
Comment 6•10 months ago
|
||
I will close this on Friday, 26-Jan-2024.
Updated•10 months ago
|
Description
•