Closed Bug 1891225 Opened 1 year ago Closed 1 year ago

D-Trust: Issuance of 15 certificates with incorrect subject attribute order

Categories

(CA Program :: CA Certificate Compliance, task)

Tracking

(Not tracked)

RESOLVED FIXED

People

(Reporter: l.sahin, Assigned: l.sahin)

Details

(Whiteboard: [ca-compliance] [ev-misissuance] Next update 2024-08-01)

Attachments

(1 file)

Preliminary Incident Report

Summary

This is a preliminary report.

After September 15th, 2023 D-Trust issued TLS certificates from the Subordinate CA “D-TRUST CA 2-2 EV 2016” that didn’t have the defined subject attributes (RDN) order according to the TLS Baseline Requirements.

Before the Ballot SC62 came into force, D-Trust changed the order of the subject attributes (RDN) for all publicly trusted TLS Subordinate CAs. Unfortunately, the change wasn’t completed for the Subordinate CA “D-TRUST CA 2-2 EV 2016”. Currently we’re investigating the subject.
After we were made aware, D-Trust stopped production. D-Trust implemented quickly the change in question for the affected Subordinate CA. After successful testing, D-Trust restarted production.

All affected customers were informed. We supported customers to replace and revoke the affected TLS certificates.

Impact

After September 15th, 2023 D-Trust issued TLS certificates from the Subordinate CA “D-TRUST CA 2-2 EV 2016” that didn’t have the defined subject attributes (RDN) order according the TLS Baseline Requirements.
15 TLS certificates were revoked.

Timeline

2023-02-06:

  • 07:30 Check of existing certificate profiles against Ballot SC62

2023-09-15: Entry into force of the provisions from Ballot SC62

2024-04-09:

  • 08:15 Email via ssl-issue@bdr.de about a potential violation of the BRs regarding the order of the subject attributes (RDN)

2024-04-10:

  • 07:00 Start of investigation
  • 08:00 Stop of production
  • 11:00 Analyzing of existing affected TLS certificates issued after September 15th, 2023
  • 12:30 Correction of the configuration followed by a test in the reference system
  • 15:30 Correction of the configuration in the productive system

2024-04-11:

  • 07:00 Calling all affected customers
  • 08:40 Emailing all affected customers
  • 08:30 Conformity Assessment Body was informed about the issue.
  • 16:05 Restart of the production after correction
  • 16:11 Test of the production system by issuing a certificate from the affected product type

2024-04-12:

  • 12:05 All affected certificates were revoked.

Root Cause Analysis

D-Trust issued TLS certificates from the Subordinate CA “D-TRUST CA 2-2 EV 2016” that didn’t have the defined attributes order according to the TLS Baseline Requirements.
As part of Ballot SC62, the changes were made regarding the order of the subject attributes (RDN). Unfortunately, the change wasn’t completed for the Subordinate CA “D-TRUST CA 2-2 EV 2016”. This means a deviation to the TLS BRs. Therefore, D-Trust supported customers to replace and revoke the affected TLS certificates.

Lessons Learned

  • Will be provided with a next update

What didn't go well

  • Will be provided with a next update

Where we got lucky

  • Will be provided with a next update

Action Items

Action Item Kind Due Date
Will be provided with a next update

Appendix

Details of affected certificates

Will be provided with a next update

Assignee: nobody → l.sahin
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true
Whiteboard: [ca-compliance] [ev-misissuance]

During our root cause investigation of this incident, we discovered that there was also a non-conformity of TLS BR 4.9.5. As a result, we have opened the following incident report: https://bugzilla.mozilla.org/show_bug.cgi?id=1893610
Further developments regarding this incident will be documented there.

When will the full incident report be posted for this issue?

Flags: needinfo?(l.sahin)

Thanks for asking. The next update will be published on Monday.

Flags: needinfo?(l.sahin)

Final Incident Report

Summary

This is the final report.

After September 15th, 2023 D-Trust issued TLS certificates from the Subordinate CA “D-TRUST CA 2-2 EV 2016” that didn’t have the defined subject attributes (RDN) order according to the TLS Baseline Requirements.

Before the Ballot SC62 came into force, D-Trust changed the order of the subject attributes (RDN) for all publicly trusted TLS Subordinate CAs. Unfortunately, the change wasn’t completed for the Subordinate CA “D-TRUST CA 2-2 EV 2016”. Currently we’re investigating the subject.
After we were made aware, D-Trust stopped production. D-Trust implemented quickly the change in question for the affected Subordinate CA. After successful testing, D-Trust restarted production.

All affected customers were informed. We supported customers to replace and revoke the affected TLS certificates.

Impact

After September 15th, 2023 D-Trust issued TLS certificates from the Subordinate CA “D-TRUST CA 2-2 EV 2016” that didn’t have the defined subject attributes (RDN) order according the TLS Baseline Requirements.
15 TLS certificates were revoked.

Timeline

2023-02-06:

  • 07:30 Check of existing certificate profiles against Ballot SC62

2023-09-15: Entry into force of the provisions from Ballot SC62

2024-04-09:

  • 08:15 Email via ssl-issue@bdr.de about a potential violation of the BRs
    regarding the order of the subject attributes (RDN)
    2024-04-10:
  • 07:00 Start of investigation
  • 08:00 Stop of production
  • 11:00 Analyzing of existing affected TLS certificates issued after
    September 15th, 2023
  • 12:30 Correction of the configuration followed by a test in the reference
    system
  • 15:30 Correction of the configuration in the productive system

2024-04-11:

  • 07:00 Calling all affected customers
  • 08:40 Emailing all affected customers
  • 08:30 Conformity Assessment Body was informed about the issue.
  • 16:05 Restart of the production after correction
  • 16:11 Test of the production system by issuing a certificate from the
    affected product type

2024-04-12:

  • 12:05 All affected certificates were revoked.

2024-04-26:

Root Cause Analysis

D-Trust issued TLS certificates from the Subordinate CA “D-TRUST CA 2-2 EV 2016” that didn’t have the defined attributes order according to the TLS Baseline Requirements.
As part of Ballot SC62, the necessary changes were made regarding the order of the subject attributes (RDN). Unfortunately, the change wasn’t completed for the Subordinate CA “D-TRUST CA 2-2 EV 2016”. This means a deviation to the TLS BRs.
How did this error occur? D-Trust uses configuration sets for the standardized creation of products. The error occurred because a configuration set was named incorrectly. Due to the incorrect naming, the configuration set was not selected and was not adapted to the requirements of SC62.

In our opinion, the best way to avoid this is to ensure that the dedicated linter(s) is/are updated to comply with new standards before they become effective. If this is not possible, additional checks must be carried out. Hence, such errors can be avoided from the outset.

Lessons Learned

What went well

  • Customers needed to be contacted before the weekend in order to replace the affected certificates in a timely manner. Despite the short time before the weekend, we were able to reach all customers. The revocation of the affected certificates was carried out on time. We were lucky that only a small number of customers were affected.

What didn't go well

  • It took more than 24 hours to notify the affected Subscriber and the person who filed the Certificate Problem Report.
  • Our linter did not detect the error.

Where we got lucky

  • Only a small number of customers were affected by the incident.

Action Items

The implementation of the lints must be checked and implemented prior to the effective date of a specification change comes into effect. If this is not done by the effective date, we will perform additional checks. To do this, the following two actions must be implemented.

Action Item Kind Due Date
Require improvement of the linters:
If a linter does not have lints that comply with the last specification change, internal checks must be established to implement the necessary lints. Prevent 2024-05-02
Integrate at least one additional linter. Prevent 2024-08-01

Appendix

Details of affected certificates

https://bugzilla.mozilla.org/attachment.cgi?id=9396433

What happened between 2024-04-26 and today? If the incident report took until today to come out, I would like to see that reflected in the timeline as well.

Integrate at least one additional linter.

What's preventing this from happening earlier than ~3 months?

Especially considering the opinion here:

In our opinion, the best way to avoid this is to ensure that the dedicated linter(s) is/are updated to comply with new standards before they become effective. If this is not possible, additional checks must be carried out.

So, now this linter isn't going to be in place for about ~1 year after SC62 came into effect, and about 1.5 years after it was adopted?

If a linter does not have lints that comply with the last specification change, internal checks must be established to implement the necessary lints.

What does this mean? What are the internal checks?

It has been over a week and no reply to the above questions have been provided.

(In reply to amir from comment #6)

What happened between 2024-04-26 and today? If the incident report took until today to come out, I would like to see that reflected in the timeline as well.

We will adjust the incident report as you requested.

Integrate at least one additional linter.

What's preventing this from happening earlier than ~3 months?

This is an estimate of when we will have completed the process. We are currently reviewing the linters available on the market, including commercially available versions. Tests are required before such a tool can be put into operation at our company. This also includes testing in the reference system. This is the standard procedure in our company.

Especially considering the opinion here:

In our opinion, the best way to avoid this is to ensure that the dedicated linter(s) is/are updated to comply with new standards before they become effective. If this is not possible, additional checks must be carried out.

So, now this linter isn't going to be in place for about ~1 year after SC62 came into effect, and about 1.5 years after it was adopted?

We use the current version of ZLint. We are aware that not all SC62 changes have yet been implemented in ZLint. That’s why we have additional measures outside of ZLint in place to address the changes of SC62 right now.

If a linter does not have lints that comply with the last specification change, internal checks must be established to implement the necessary lints.

What does this mean? What are the internal checks?

If we determine that a linter used by us does not support changes to the specifications, we will implement other measures to check the changes. For example, these can be internal extensions to the linter developed in-house or other checks that we can implement ourselves in our Certificates Management System.
We can’t predict if the linters will address future changes to the specifications. If they do not, then we will choose an appropriate way to check the compliance of our products, based on the nature of the change.

(In reply to Wayne from comment #7)

It has been over a week and no reply to the above questions have been provided.

Please accept our apologies for the delay.

Final Incident Report

Summary

This is an update to the final report.

After September 15th, 2023 D-Trust issued TLS certificates from the Subordinate CA “D-TRUST CA 2-2 EV 2016” that didn’t have the defined subject attributes (RDN) order according to the TLS Baseline Requirements.

Before the Ballot SC62 came into force, D-Trust changed the order of the subject attributes (RDN) for all publicly trusted TLS Subordinate CAs. Unfortunately, the change wasn’t completed for the Subordinate CA “D-TRUST CA 2-2 EV 2016”. Currently we’re investigating the subject.
After we were made aware, D-Trust stopped production. D-Trust implemented quickly the change in question for the affected Subordinate CA. After successful testing, D-Trust restarted production.

All affected customers were informed. We supported customers to replace and revoke the affected TLS certificates.

Impact

After September 15th, 2023 D-Trust issued TLS certificates from the Subordinate CA “D-TRUST CA 2-2 EV 2016” that didn’t have the defined subject attributes (RDN) order according the TLS Baseline Requirements.
15 TLS certificates were revoked.

Timeline

2023-02-06:

  • 07:30 Check of existing certificate profiles against Ballot SC62

2023-09-15: Entry into force of the provisions from Ballot SC62

2024-04-09:

  • 08:15 Email via ssl-issue@bdr.de about a potential violation of the BRs
    regarding the order of the subject attributes (RDN)
    2024-04-10:
  • 07:00 Start of investigation
  • 08:00 Stop of production
  • 11:00 Analyzing of existing affected TLS certificates issued after
    September 15th, 2023
  • 12:30 Correction of the configuration followed by a test in the reference
    system
  • 15:30 Correction of the configuration in the productive system

2024-04-11:

  • 07:00 Calling all affected customers
  • 08:40 Emailing all affected customers
  • 08:30 Conformity Assessment Body was informed about the issue.
  • 16:05 Restart of the production after correction
  • 16:11 Test of the production system by issuing a certificate from the
    affected product type

2024-04-12:

  • 12:05 All affected certificates were revoked.

2024-04-26:

2024-05-06:

  • 21:29 Publication of the final report.

2024-05-17:

  • 14:47 Publication of an update to the final report.

Root Cause Analysis

D-Trust issued TLS certificates from the Subordinate CA “D-TRUST CA 2-2 EV 2016” that didn’t have the defined attributes order according to the TLS Baseline Requirements.
As part of Ballot SC62, the necessary changes were made regarding the order of the subject attributes (RDN). Unfortunately, the change wasn’t completed for the Subordinate CA “D-TRUST CA 2-2 EV 2016”. This means a deviation to the TLS BRs.
How did this error occur? D-Trust uses configuration sets for the standardized creation of products. The error occurred because a configuration set was named incorrectly. Due to the incorrect naming, the configuration set was not selected and was not adapted to the requirements of SC62.

In our opinion, the best way to avoid this is to ensure that the dedicated linter(s) is/are updated to comply with new standards before they become effective. If this is not possible, additional checks must be carried out. Hence, such errors can be avoided from the outset.

Lessons Learned

What went well

  • Customers needed to be contacted before the weekend in order to replace the affected certificates in a timely manner. Despite the short time before the weekend, we were able to reach all customers. The revocation of the affected certificates was carried out on time. We were lucky that only a small number of customers were affected.

What didn't go well

  • It took more than 24 hours to notify the affected Subscriber and the person who filed the Certificate Problem Report.
  • Our linter did not detect the error.

Where we got lucky

  • Only a small number of customers were affected by the incident.

Action Items

The implementation of the lints must be checked and implemented prior to the effective date of a specification change comes into effect. If this is not done by the effective date, we will perform additional checks. To do this, the following two actions must be implemented.

Action Item Kind Due Date
Require improvement of the linters:
If a linter does not have lints that comply with the last specification change, internal checks must be established to implement the necessary lints. Prevent 2024-05-02
Integrate at least one additional linter. Prevent 2024-08-01

Appendix

Details of affected certificates

https://bugzilla.mozilla.org/attachment.cgi?id=9396433

A full incident report must be produced within 2 weeks. What will be done to make sure this happens in the future?

CCADB:

An initial report should be filed within 72 hours of the CA Owner being made aware of the incident. If a full incident report is not yet ready, CA Owners should provide a preliminary report containing an executive summary of the incident and a date by which the full report will be posted. The full incident report must be posted within two weeks of the incident.

Hi Wayne,

Firstly, I would like to apologise for the fact that we failed to comply with the CCADB policy and were unable to provide a final incident report within the timeframe.

I would like to briefly explain the background as to why it took us so long in this specific case. As part of the investigation into this incident, we unfortunately discovered that there was a further non-compliance of the BR requirements. We have already opened another bug (https://bugzilla.mozilla.org/show_bug.cgi?id=1893610) for this. Because of this incident, we have chosen to examine the entire internal reporting and response process once again. In doing so, we identified potential for improvements, the implementation of which has already begun.
However, we did not meet the deadline for the complete incident report.

How will we ensure that this does not happen again in the future?

We have expanded our internal process guidelines on this point and trained all responsible employees once again. We are currently preparing a separate checklist to be considered in the event of an incident being processed at Bugzilla. The clear timelines are also set out there once again.

Regards, Leyla

(In reply to Leyla Sahin from comment #8)

We use the current version of ZLint. We are aware that not all SC62 changes have yet been implemented in ZLint. That’s why we have additional measures outside of ZLint in place to address the changes of SC62 right now.

Are you saying that you have already implemented your own pre-issuance lint to check for subject attribute order? When was that done? Shouldn't that be listed in your actions items?

Have you checked that your existing lints actually cover all the other changes of SC62?

It has been over a week and no reply to the above questions have been provided.

Flags: needinfo?(l.sahin)

(In reply to Wayne from comment #14)

It has been over a week and no reply to the above questions have been provided.

I appreciate the reminder and apologize for the delay.

Flags: needinfo?(l.sahin)

(In reply to Mathew Hodson from comment #13)

(In reply to Leyla Sahin from comment #8)

We use the current version of ZLint. We are aware that not all SC62 changes have yet been implemented in ZLint. That’s why we have additional measures outside of ZLint in place to address the changes of SC62 right now.

Are you saying that you have already implemented your own pre-issuance lint to check for subject attribute order? When was that done? Shouldn't that be listed in your actions items?

Have you checked that your existing lints actually cover all the other changes of SC62?

Hi Mathew,
The tests are carried out in different ways. We have not implemented any new lints in our currently used linter ZLint.

For example, we have implemented organizational measures outside of ZLint to check the order of subject attributes and to cover the other changes from SC62.
I will add this to the action items.

Regards,
Leyla

Final Incident Report

Summary

This is the latest update of the final report.

After September 15th, 2023 D-Trust issued TLS certificates from the Subordinate CA “D-TRUST CA 2-2 EV 2016” that didn’t have the defined subject attributes (RDN) order according to the TLS Baseline Requirements.

Before the Ballot SC62 came into force, D-Trust changed the order of the subject attributes (RDN) for all publicly trusted TLS Subordinate CAs. Unfortunately, the change wasn’t completed for the Subordinate CA “D-TRUST CA 2-2 EV 2016”. Currently we’re investigating the subject.
After we were made aware, D-Trust stopped production. D-Trust implemented quickly the change in question for the affected Subordinate CA. After successful testing, D-Trust restarted production.

All affected customers were informed. We supported customers to replace and revoke the affected TLS certificates.

Impact

After September 15th, 2023 D-Trust issued TLS certificates from the Subordinate CA “D-TRUST CA 2-2 EV 2016” that didn’t have the defined subject attributes (RDN) order according the TLS Baseline Requirements.
15 TLS certificates were revoked.

Timeline

2023-02-06:

  • 07:30 Check of existing certificate profiles against Ballot SC62

2023-09-15: Entry into force of the provisions from Ballot SC62

2024-04-09:

  • 08:15 Email via ssl-issue@bdr.de about a potential violation of the BRs
    regarding the order of the subject attributes (RDN)
    2024-04-10:
  • 07:00 Start of investigation
  • 08:00 Stop of production
  • 11:00 Analyzing of existing affected TLS certificates issued after
    September 15th, 2023
  • 12:30 Correction of the configuration followed by a test in the reference
    system
  • 15:30 Correction of the configuration in the productive system

2024-04-11:

  • 07:00 Calling all affected customers
  • 08:40 Emailing all affected customers
  • 08:30 Conformity Assessment Body was informed about the issue.
  • 16:05 Restart of the production after correction
  • 16:11 Test of the production system by issuing a certificate from the
    affected product type

2024-04-12:

  • 12:05 All affected certificates were revoked.

2024-04-26:

2024-05-06:

  • 21:29 Publication of the final report.

2024-05-10:

  • Implementation of additional checks to cover the changes of the BRs by SC62.

2024-05-30:

  • Publication of an update to the final report.

Root Cause Analysis

D-Trust issued TLS certificates from the Subordinate CA “D-TRUST CA 2-2 EV 2016” that didn’t have the defined attributes order according to the TLS Baseline Requirements.
As part of Ballot SC62, the necessary changes were made regarding the order of the subject attributes (RDN). Unfortunately, the change wasn’t completed for the Subordinate CA “D-TRUST CA 2-2 EV 2016”. This means a deviation to the TLS BRs.
How did this error occur? D-Trust uses configuration sets for the standardized creation of products. The error occurred because a configuration set was named incorrectly. Due to the incorrect naming, the configuration set was not selected and was not adapted to the requirements of SC62.

In our opinion, the best way to avoid this is to ensure that the dedicated linter(s) is/are updated to comply with new standards before they become effective. If this is not possible, additional checks must be carried out. Hence, such errors can be avoided from the outset.

Lessons Learned

What went well

  • Customers needed to be contacted before the weekend in order to replace the affected certificates in a timely manner. Despite the short time before the weekend, we were able to reach all customers. The revocation of the affected certificates was carried out on time. We were lucky that only a small number of customers were affected.

What didn't go well

  • It took more than 24 hours to notify the affected Subscriber and the person who filed the Certificate Problem Report.
  • Our linter did not detect the error.

Where we got lucky

  • Only a small number of customers were affected by the incident.

Action Items

The implementation of the lints must be checked and implemented prior to the effective date of a specification change comes into effect. If this is not done by the effective date, we will perform additional checks. To do this, the following two actions must be implemented.

Action Item Kind Due Date
Require improvement of the linters:
If a linter does not have lints that comply with the last specification change, internal checks must be established to implement the necessary lints. Prevent 2024-05-02
Integrate at least one additional linter. Prevent 2024-08-01

Appendix

Details of affected certificates

https://bugzilla.mozilla.org/attachment.cgi?id=9396433

Quick update: We are making progress with reviewing the linters available on the market. I kindly request to give the next update on 07/01/2024.

Flags: needinfo?(bwilson)
Flags: needinfo?(bwilson)
Whiteboard: [ca-compliance] [ev-misissuance] → [ca-compliance] [ev-misissuance] Next update 2024-07-01

(In reply to Leyla Sahin from comment #16)

For example, we have implemented organizational measures outside of ZLint to check the order of subject attributes and to cover the other changes from SC62.
I will add this to the action items.

What specifically have you implemented to ensure issued certificates are compliant with the changes in SC62? "Organizational measures" could mean many different things.

What specifically has been done since this incident was created? You have an action item with a date of 2025-05-02 that says, "If a linter does not have lints that comply with the last specification change, internal checks must be established to implement the necessary lints." That doesn't provide any detail at all.

You said that you will add something to the list of action items, but the list in comment #17 is the same as the one in comment #10.

Final Incident Report

This incident report contains a correction of the action items.

Summary

This is the latest update of the final report.

After September 15th, 2023 D-Trust issued TLS certificates from the Subordinate CA “D-TRUST CA 2-2 EV 2016” that didn’t have the defined subject attributes (RDN) order according to the TLS Baseline Requirements.

Before the Ballot SC62 came into force, D-Trust changed the order of the subject attributes (RDN) for all publicly trusted TLS Subordinate CAs. Unfortunately, the change wasn’t completed for the Subordinate CA “D-TRUST CA 2-2 EV 2016”. Currently we’re investigating the subject.
After we were made aware, D-Trust stopped production. D-Trust implemented quickly the change in question for the affected Subordinate CA. After successful testing, D-Trust restarted production.

All affected customers were informed. We supported customers to replace and revoke the affected TLS certificates.

Impact

After September 15th, 2023 D-Trust issued TLS certificates from the Subordinate CA “D-TRUST CA 2-2 EV 2016” that didn’t have the defined subject attributes (RDN) order according the TLS Baseline Requirements.
15 TLS certificates were revoked.

Timeline

2023-02-06:

  • 07:30 Check of existing certificate profiles against Ballot SC62

2023-09-15: Entry into force of the provisions from Ballot SC62

2024-04-09:

  • 08:15 Email via ssl-issue@bdr.de about a potential violation of the BRs
    regarding the order of the subject attributes (RDN)
    2024-04-10:
  • 07:00 Start of investigation
  • 08:00 Stop of production
  • 11:00 Analyzing of existing affected TLS certificates issued after
    September 15th, 2023
  • 12:30 Correction of the configuration followed by a test in the reference
    system
  • 15:30 Correction of the configuration in the productive system

2024-04-11:

  • 07:00 Calling all affected customers
  • 08:40 Emailing all affected customers
  • 08:30 Conformity Assessment Body was informed about the issue.
  • 16:05 Restart of the production after correction
  • 16:11 Test of the production system by issuing a certificate from the
    affected product type

2024-04-12:

  • 12:05 All affected certificates were revoked.

2024-04-26:

2024-05-06:

  • 21:29 Publication of the final report.

2024-05-10:

  • Implementation of additional checks to cover the changes of the BRs by SC62.

2024-05-30:

  • Publication of an update to the final report.

2024-06-12:

  • Publication of a new update to the final report that includes a correction of the action items.

Root Cause Analysis

D-Trust issued TLS certificates from the Subordinate CA “D-TRUST CA 2-2 EV 2016” that didn’t have the defined attributes order according to the TLS Baseline Requirements.
As part of Ballot SC62, the necessary changes were made regarding the order of the subject attributes (RDN). Unfortunately, the change wasn’t completed for the Subordinate CA “D-TRUST CA 2-2 EV 2016”. This means a deviation to the TLS BRs.
How did this error occur? D-Trust uses configuration sets for the standardized creation of products. The error occurred because a configuration set was named incorrectly. Due to the incorrect naming, the configuration set was not selected and was not adapted to the requirements of SC62.

In our opinion, the best way to avoid this is to ensure that the dedicated linter(s) is/are updated to comply with new standards before they become effective. If this is not possible, additional checks must be carried out. Hence, such errors can be avoided from the outset.

Lessons Learned

What went well

  • Customers needed to be contacted before the weekend in order to replace the affected certificates in a timely manner. Despite the short time before the weekend, we were able to reach all customers. The revocation of the affected certificates was carried out on time. We were lucky that only a small number of customers were affected.

What didn't go well

  • It took more than 24 hours to notify the affected Subscriber and the person who filed the Certificate Problem Report.
  • Our linter did not detect the error.

Where we got lucky

  • Only a small number of customers were affected by the incident.

Action Items

Action Item Kind Due Date
Define and implement additional internal checks to address the changes of SC62 Prevent 2024-05-02
Integrate at least one additional linter Prevent 2024-08-01
Implement additional checks to address some of the changes of SC62 in ZLint (please see also https://bugzilla.mozilla.org/show_bug.cgi?id=1884714) Prevent 2024-06-30

Appendix

Details of affected certificates

https://bugzilla.mozilla.org/attachment.cgi?id=9396433

(In reply to Mathew Hodson from comment #19)

(In reply to Leyla Sahin from comment #16)

For example, we have implemented organizational measures outside of ZLint to check the order of subject attributes and to cover the other changes from SC62.
I will add this to the action items.

What specifically have you implemented to ensure issued certificates are compliant with the changes in SC62? "Organizational measures" could mean many different things.

What specifically has been done since this incident was created? You have an action item with a date of 2025-05-02 that says, "If a linter does not have lints that comply with the last specification change, internal checks must be established to implement the necessary lints." That doesn't provide any detail at all.

You said that you will add something to the list of action items, but the list in comment #17 is the same as the one in comment #10.

Right now the latest ZLint version we use does not cover the changes of SC62. Together with the partner company MTG we are in the process of implementing some of the necessary changes to cover the changes of SC62 in ZLint that were not addressed by now.

However, we are also in the process of selecting a second linter to be implemented at D-Trust, which we will run independently from ZLint. For the meantime we defined and realized internal checks to address the changes of SC62. As written before, the internal checks are organizational measures. These are e.g. mostly additional checklists for new or existing certificate profiles but also technical checks in our CA system.

Apologies for the confusion in regard to the action items. We established the internal checks by 2024-05-02. Due to a formatting error, the action items list appears to be incomplete. I rewrote and reformatted the action items list so that it is hopefully clearer now.

Quick update:
We have decided to implement PKILint as a second linter. We are currently reviewing the internal timelines and implementation. Next week, we will have more information on this.

Quick update:
The PKILint will be implemented this month (July). We are on track with the plan to have it running by 08/01/2024 at the latest.

Whiteboard: [ca-compliance] [ev-misissuance] Next update 2024-07-01 → [ca-compliance] [ev-misissuance] Next update 2024-08-01

Good news:
On July 9th, 2024 we installed pkilint in our reference system and tested it successfully. On July 19th, 2024 pkilint was installed successfully in our production system and it has been running since then. Now we use two linters to run pre-issuance linting on our TLS pre-certificates and TLS certificates.

We have implemented all measures. They have already been successfully applied.
I kindly ask you to check whether this incident can be closed.

I intend to close this on or about next Wed. 7-Aug-2024, unless additional items need to be discussed or explained.

Flags: needinfo?(bwilson)
Status: ASSIGNED → RESOLVED
Closed: 1 year ago
Flags: needinfo?(bwilson)
Resolution: --- → FIXED
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: