Open Bug 1904038 Opened 14 days ago Updated 11 days ago

Chunghwa Telecom: “Test Website - Valid" URL disclosed to CCADB is expired

Categories

(CA Program :: CA Certificate Compliance, task)

Tracking

(Not tracked)

ASSIGNED

People

(Reporter: tmkuo, Assigned: tmkuo)

Details

(Whiteboard: [ca-compliance] [policy-failure])

Incident Report

Summary

During the email communication with the Browser contact, this problem was found and notify by the Browser contact.

Impact

A total of 1 certificate (good.epkiov.hinet.net) is affected.

Timeline

All times are UTC.

2024-06-12

  • 00:22 Received the response email including the notification of expired.
  • 17:43 Investigated and reviewed the cause.

2024-06-13

  • 10:51 Submit the certificate request.
  • 17:17 Complete the review and certificate issuance.
  • 18:30 Complete certificate replacement.

Root Cause Analysis

The CA system sent an expiration notification letter, but the website administrator of ePKI ignored it.

Lessons Learned

  • Even well-trained administrators can make low-level mistakes, we have warned the website administrator of ePKI should not ignore again, and calendar reminders is set to avoid the same mistake.

Where we got lucky

Action Items

Action Item Kind Due Date
Complete certificate replacement. Detect 2024-06-13
Conduct a discussion and review meeting, and calendar reminders is set to avoid the same mistake. Prevent 2024-06-20

Appendix

Details of affected certificate

https://good.epkiov.hinet.net

Based on Incident Reporting Template v. 2.0

Does Chunghwa Telecom believe this incident report is complete? It is remarkably thin on details and I think compares very unfavourably to reports being submitted by your peers in the web PKI community.

In particular, the timeline seems to be missing key events like the initial issuance of the certificate, and the date the certificate expired. I also believe your action items fail to provide meaningful assurance that this event won't happen again.

Why isn't the deployment of certificate renewal automation being considered as an action item?
What about improvements to your own monitoring practices as an action item? Why was this not discovered by your own team?

Assignee: nobody → tmkuo
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true
Whiteboard: [ca-compliance] [policy-failure]

(In reply to Daniel McCarney from comment #1)

Does Chunghwa Telecom believe this incident report is complete? It is remarkably thin on details and I think compares very unfavourably to reports being submitted by your peers in the web PKI community.

In particular, the timeline seems to be missing key events like the initial issuance of the certificate, and the date the certificate expired.

Let me restructure the timeline as follows:

Timeline

All times are UTC.

2022-09-08:

2023-09-08

  • 19:59 The expiration of the cert.

2024-06-12:

  • 00:22 Received the response email from the browser, including the notification of expired, where the cert expired 278 days ago.
  • 17:43 Investigated and reviewed the cause.

2024-06-13

  • 10:51 Submit the certificate request.
  • 17:17 Complete the review and certificate issuance.
  • 18:30 Complete certificate replacement.

I also believe your action items fail to provide meaningful assurance that this event won't happen again.
Why isn't the deployment of certificate renewal automation being considered as an action item?
What about improvements to your own monitoring practices as an action item? Why was this not discovered by your own team?

Thanks for your comment, we will discuss ways to automate certificate renewal and whether it can be achieved in a short time.

You need to log in before you can comment on or make changes to this bug.