Closed Bug 1866091 Opened 2 years ago Closed 2 years ago

SwissSign: EV JurisdictionStateOrProvinceName - one certificate not selected for revocation

Categories

(CA Program :: CA Certificate Compliance, task)

Tracking

(Not tracked)

RESOLVED FIXED

People

(Reporter: roman.fischer, Assigned: roman.fischer)

Details

(Whiteboard: [ca-compliance] [ev-misissuance] )

Incident Report

Summary

In the recent incident regarding EV certificates using codes for jurisdictionSateOrProvinceName instead of full names, one certificate was not selected for revocation because it was in "domain validation pending" state. The domain validation was completed by the customer after the fix was implemented but the certificate was issued with the code instead of the full name of the jurisdictionStateOrProvinceName.

Impact

One EV certificate was mis-issued after implementation of the fix for Bugzilla https://bugzilla.mozilla.org/show_bug.cgi?id=1860750.

Timeline

2023-10-20:

2023-11-21:

  • 15:31 UTC A SwissSign developer working on an updated self-audit script notices the mis-issued certificate and informs Compliance team via email

2023-11-22:

  • 07:30 UTC Compliance confirms mis-issuance and starts mis-issuance process
  • 08:15 UTC Affected customer and audit body is informed
  • 08:45 UTC Affected certificate revoked by customer
  • 15:50 UTC Bugzilla posted

Root Cause Analysis

Our new CA system uses different internal states than the self-developed old one. When compiling the list of certificates affected by Bugzilla 1860750, we had to re-write the script that selects the affected certificates and creates the to-be-revoked list because it was the first large-scale mis-issuance that we couldn't handle manually on the new CA system.
This script did not take into account that there may be certificate-request with "pending domain verification". Such requests should have been cancelled before implementing any changes affecting certificate content. This was not done. So the request remained in the system and when the customer eventually verified the domain, it got issued.

Lessons Learned

What went well

  • Internal self-audit picked up the mis-issued certificate

What didn't go well

  • The pending certificate request was not cancelled when implementing the fix for Bugzilla 1860750

Where we got lucky

  • Only one certificate request was pending at the time of the incident

Action Items

Action Item Kind Due Date
Revoke mis-issued certificate -> Done Mitigate 2023-11-22
Checked that no other certificate requests are pending with wrong information -> Done Mitigate 2023-11-22
Clarify with vendor of CA system that no other states or border-cases need to be considered when doing mass-revocation Prevent 2023-11-30
Update internal process description for mass-revocation on the new CA system to include cancelling of pending certificate requests Prevent 2023-11-30

Appendix

Details of affected certificates

Serial: 4747bc74c34e1b0ab7235c1d223342d743936d51
SHA 256: 2A09929B6014AFCD60C0A9F712715A64700C6A2A77C65FA95B3033E62D603E2D
Link: https://crt.sh/?id=10904522597

Assignee: nobody → roman.fischer
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true
Whiteboard: [ca-compliance] [ev-misissuance]

Update on action items

  • Clarification with vendor of CA system done.
  • Internal proces description for mass-revocation updated.

Are there any open questions regarding this incident?

As there seem to be no more questions... can we close this Bugzilla?

I will close this on Friday, 8-Dec-2023, unless there are any questions or concerns.

Flags: needinfo?(bwilson)
Status: ASSIGNED → RESOLVED
Closed: 2 years ago
Flags: needinfo?(bwilson)
Resolution: --- → FIXED
You need to log in before you can comment on or make changes to this bug.