IdenTrust: Invalid special characters in S/MIME Certificates
Categories
(CA Program :: CA Certificate Compliance, task)
Tracking
(Not tracked)
People
(Reporter: roots, Assigned: roots)
Details
(Whiteboard: [ca-compliance] [smime-misissuance])
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36
Steps to reproduce:
Preliminary Incident Report
###Summary:
We are currently investigating an issue concerning special characters in the subject of S/MIME certificates, affecting 1 active and 1 revoked S/MIME certificates.
The problem involves incorrect encoding of special characters in the Subject's common name field not in line with section 7.1 of the RFC-5280.
###Current Actions
- Revoking the active certificate
- Updating the configuration to stop mis-issuance – already completed
- Gathering information for root cause analysis
We will disclose a complete Incident report by August 9, 2024
Updated•1 year ago
|
FINAL REPORT
Summary
There was a configuration issue that caused improper encoding of the special character in the Subject's common name field which is not in line with section 7.1 of the RFC-5280 for one of our customer’s accounts. This was discovered by our engineering team. After investigating the issue further, we were able to confirm that two certificates presented the same issue.
Impact
The issue resulted in a mis-issuance of two S/MIME certificates. One of the certificates was active while the other was revoked.
Timeline
All times are MT.
2024-06-20: We were notified by our customer that a certificate generated on 2024-06-18 was not working with their system
2024-06-21: An improper encoding special character in the subject common name field was discovered. We updated the client profile to prevent similar issues
2024-06-25: The certificate generated on 2024-06-18 was revoked and a new certificate was generated
2024-06-27: The client reached out confirming they are running into the same issue. We continue to work with the customer to investigate the issue further
2024-07-23: The engineering team discovered one mis-issued certificate which was revoked on 2024-06-25
2024-07-24:
• 12:30 A further investigation was initiated to confirm if there were any additional affected certificates
• 14:00 A preliminary list of 18 potentially affected certificates was identified.
2024-07-25: We ran all the 18 potentially affected certificates certs through the linter tool manually and identified 2 mis-issued certificates. 1 active and 1 revoked certificate (revoked 2024-06-25) were identified
2024-07-26:
• 12:21 We notified the customer to revoke the affected certificate
• 14:11 The client confirmed the issue was fixed
2024-07-29: The active certificate was revoked and replaced
Root Cause Analysis
• Configuration issue that caused improper encoding of the special character in the Subject's common name field
• PKILint was not properly configured for this account as a result the certificate did not complete the linting process
Lessons Learned
• Ensuring that the linting is configured for all accounts
• The PKI team made a change in the configuration to fix the encoding issue but didn’t realize that other certificates could be affected and it
violates the RFC-5280 encoding requirements
What went well
• Revocation of the affected certificate was completed within the permissible timeline
• Publishing of the preliminary report was completed within the permissible timeline
What didn't go well
• The PKI team made a change in the configuration to fix the encoding issue but didn’t realize that other certificates could be affected and it
violates the RFC-5280 encoding requirements
• PKIlint was not configured properly for this account type as a result the linting did not occur
Where we got lucky
Only one of the two certificates affected was active which ensured timely revocation and reduced disruption to the client processes.
Action Items
| Action Item | Kind | Due Date |
| Configure the PKIlint tool to scan all SMIME certificate accounts | Prevent | Completed |
| Implement a process to include the linting configuration as a part of enterprise customer onboarding | Prevent | 2024-08-31 |
We would like to confirm that we have successfully implemented the linting process for both existing and new enterprise customers. As a result, we consider this issue resolved.
Comment 3•1 year ago
|
||
I'll take a look at closing this on Friday, 6-Sept-2024.
Updated•1 year ago
|
Description
•