Open Bug 1916489 Opened 20 days ago Updated 4 days ago

SwissSign: LDAP URL still in CRL distribution point (CDP)

Categories

(CA Program :: CA Certificate Compliance, task)

Tracking

(Not tracked)

ASSIGNED

People

(Reporter: sandy.balzer, Assigned: sandy.balzer)

Details

(Whiteboard: [ca-compliance] [crl-failure])

Attachments

(1 file, 1 obsolete file)

Attached file affectedCertificates.txt (obsolete) (deleted) —

Preliminary Incident Report

Summary

On September 2, 2024, we received a private message through social media recommending we investigate certificates.
While the (vague) description of the issue did not lead to the discovery of mis issued certificates, further internal research discovered additional certificates, accounting for a total of 1071 miss issued certificates (2143 including pre-certificates).
This certificates were issued with the LDAP URL still in CRL distribution point (CDP) but TLS BR changed on 15.09.2023 and since then this is not allowed.
Revocation of these certificates is scheduled for September 8, 2024, 10:00 UTC latest.
Currently our investigation shows that this error only occurred on our old CA software platform, which is not in use anymore, and therefore no further mis issuance can happen and we have not stopped the issuance process from the new CA platform.

Impact

Internal investigation confirmed 1071 TLS certificates (plus 1072 pre-certificates, for a total of 2143 certificates) were affected.
See attached list

Timeline

All times are UTC.

2023-09-15
On this date the TLS BR chapter 7.1.2.11.2 was released, that requires the scheme of each GeneralName MUST be “http”.

2023-09-15,
04:44:10
First mis-issuance

2024-01-31,
07:30:05
Last mis-issuance

2024-09-02,
10:30 Info on possible mis issuance, unconfirmed but further Investigation starts

2024-09-03
10:05 Investigation confirms mis issuance

2024-09-03,
16:00 Posting of this Bugzilla

Root Cause Analysis

RCA is ongoing

Lessons Learned

What went well

RCA ongoing

What didn't go well

RCA ongoing

Where we got lucky

RCA ongoing

Action Items

Action Item Kind Due Date
revocation of affected certificates in progress latest 2024-09-08 at 10:00:00 UTC

Appendix

Details of affected certificates

See attached list

Assignee: nobody → sandy.balzer
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true
Whiteboard: [ca-compliance] [crl-failure]

supplying corrected list with the needed columns, nr of certificates stays same

Attachment #9422295 - Attachment is obsolete: true
The content of attachment 9422295 [details] has been deleted for the following reason: Deleted on request

Update

All affected certificates have been revoked on time.
RCA is ongoing.

Timeline

All times are UTC.

2023-09-15
On this date the TLS BR chapter 7.1.2.11.2 was released, that requires the scheme of each GeneralName MUST be “http”.

2023-09-15,
04:44:10 First mis issuance

2024-01-31,
07:30:05 Last mis issuance

2024-09-02,
10:30 Info on possible mis issuance, unconfirmed but further Investigation starts

2024-09-03,
10:05 Investigation confirms mis issuance

2024-09-03,
16:00 Posting of this Bugzilla

2024-09-08,
08:59 revocation of affected certificates finished

2024-09-09,
14:00 updating Bugzilla on certificate revocation status

Action Item Kind Due Date
revocation of affected certificates mitigate done 2024-09-08 08:59 UTC

Update

RCA completed and we are updating this incident report.

Timeline

All times are UTC.

2023-09-15
On this date the TLS BR chapter 7.1.2.11.2 was released, that requires the scheme of each GeneralName MUST be “http”.

2023-09-15,
04:44:10 First mis issuance

2024-01-31,
07:30:05 Last mis issuance

2024-09-02,
10:30 Info on possible mis issuance, unconfirmed but further Investigation starts

2024-09-03,
10:05 Investigation confirms mis issuance

2024-09-03,
16:00 Posting of this Bugzilla

2024-09-08,
08:59 revocation of affected certificates finished

2024-09-09,
14:00 updating Bugzilla on certificate revocation status

2024-09-11,
09:15 updating Bugzilla with RCA

Root Cause Analysis

In 2023, we transitioned to a new Certificate Authority (CA) software, and during the migration, our customers were onboarded in phases. At the time of a regulatory update, we were simultaneously issuing certificates through both the old and new systems. Our error occurred when we mistakenly assumed that only the new system was issuing TLS certificates, which resulted in the updated controls not being applied to the old CA software. Consequently, this led to a mis issuance from the legacy system, while the new CA software followed to the proper issuance processes.

Since we no longer issue certificates from the old CA software, this issue cannot reoccur. The transition to the new system has been fully completed, ensuring compliance with all current regulations.

Lessons Learned

What went well

N/A

What didn't go well

Phaseout of the old CA was not synchronized with regulation changes.

Where we got lucky

N/A

Action Items

Action Item Kind Due Date
revocation of affected certificates mitigate done 2024-09-08 08:59 UTC

Update 2024-09-19

With the last post, all open Action Items are done.
We will monitor this Bugzilla for further questions from the community.

Based on the incident and root cause analysis, I believe that there should be more detail in your lessons learned and remediation action items. SwissSign should review its change management and its system maintenance processes, especially when it plans to transition between old and new systems or performs phased transitions to new systems. These steps might include running test plans on both the new and old systems and implementing monitoring and alerting related to issuance of certificates across both systems. SwissSign should take this opportunity to revisit its change management procedures and update its internal policies and procedures to reflect lessons learned when transitioning from one system to another.

You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: