certSIGN: Findings in 2025 ETSI Audit - Audit Incident Report
Categories
(CA Program :: CA Certificate Compliance, task)
Tracking
(Not tracked)
People
(Reporter: gabriel.petcu, Assigned: gabriel.petcu)
Details
(Whiteboard: [ca-compliance] [audit-finding])
Steps to reproduce:
certSIGN had the yearly audit for 2025 and received the Audit Attestation letters.
Actual results:
Findings reported in:
LSTI Standard Audit Attestation (CAB-Forum_AAL_Standard_Audit_1612-377-v2) from 28-04-2025
LSTI TLS BR Audit Attestation (CAB-Forum_AAL_TLS-BR_Audit_1612-377-v2) from 28-04-2025
LSTI TLS EV Audit Attestation (CAB-Forum_AAL_TLS-EV_Audit_1612-377-v2) from 28-04-2025.
All the findings were considered by the auditors as minor non-conformities.
Expected results:
Finding #1
On CPS "certSIGN Web CA for QWAC & EV Certificates" the association of each policy identifier with each specific OID was not explicit (ETSI EN 319 411-1 OVR-7.1-02)
Root Cause Analysis
The policy identifiers were specified only as numbers in the CPS tables for each certSIGN OID:
as ‘Policy Identifier=0.4.0.2042.1.4’ for Extended Validation end-user certificates and
as ‘Policy Identifier=0.4.0.2042.1.4’ plus ‘Policy Identifier=0.4.0.194112.1.4’ for QWAC end-user certificates and the auditors insisted to add also the associated acronyms ‘EVCP’, respective ‘QEVCP-w’ – for clarity.
Action Item | Kind | Due Date |
---|---|---|
Correct the CPS | Correct | 2025-03-21 |
Quarterly review | Prevent | permanent/quarterly |
Update the CPS on the #1.3.1 Certification Authorities, to include also the acronyms of the policies: EVCP and QEVCP-w
Finding #2
On a set of OID (certificate profiles not yet delivered to customers), the certificates are issued for testing purposes in a manner that does not follow the normal registration process, and no reasonable assurance that these certificates cannot be used outside of the testing scope is currently given. (ETSI EN 319 411-1 OVR-6.9.2-01C)
Root Cause Analysis
certSIGN did not used test certificates on Production. Only on Demo/Test platforms.
Action Item | Kind | Due Date |
---|---|---|
Update the CPS | Correct | 2025-05-30 |
Update Test procedures | Correct | 2025-05-30 |
Quarterly review | Prevent | permanent/quarterly |
This is not applicable to TLS certificates where we already have the test certificates on site. Update the Public and Qualified CPS-es on the #4.3 Certificate Issuance, to include test certificates for Production environment. Update the testing procedures to include the testing conditions and limitations for the Production testing.
Finding #3
OID 1.3.6.1.4.1.25017.3.1.4.6 is not listed in OIDs list from certSIGN Web CA - Terms and conditions (ETSI EN 319 411-1 DIS-6.1-05 )
Root Cause Analysis
Delayed publication of the updated version of the Terms and Conditions after the CPS update.
Action Item | Kind | Due Date |
---|---|---|
Update the T&C | Correct | 2025-02-21 |
Sync CPS & T&C updates | Prevent | permanent/quarterly |
Finding #4
The test certificate from 2023 : "testssl-expired-evcp.certsign.ro.crt" does not respect the relative order of the Subject attributes as required in BR #7.1.4.2 (CA/Browser Forum v2.1.2 #7.1.4.2)
Root Cause Analysis
When created the list for the bug #1886624 “certSIGN: Certificates with incorrect Subject attribute order”, we included the certificate above: crt.sh/?serial=234F86B9A9DC729F0531.
The fix was to revoke all valid certificates, and as this certificate was expired, it remained as it is.
Action Item | Kind | Due Date |
---|---|---|
Replace the certificate | Correct | 2025-03-21 |
Quarterly review | Prevent | permanent/quarterly |
Finding #5
Conflicting information in "Certification Practice Statement certSIGN Web CA for DV SSL Certificates" on chapter 3.2.2.1 Identity. (ETSI EN 319 411-1 REG-6.2.2-03A)
Root Cause Analysis
Typo error. On the yearly update a previously deleted text in a paragraph was restored by error and was not viewed and corrected by the verifier.
Action Item | Kind | Due Date |
---|---|---|
Update the CPS | Correct | 2025-03-21 |
Update Review process | Prevent | 2025-06-01 |
Updated•22 days ago
|
Updated•22 days ago
|
Should a separate bug be opened for each of these issues? These fall under different root causes with different questions and community discussion:
Finding #1 and #5 - Incorrect CPS information where information was unintentionally changed. For these two findings, we probably want to look at the process in place to review CPS and changes and the approval process.
Finding #2 and #3 and #4- Cert profiles going outside the flow or have incorrect information. Does that means these certs were not being linted?? What other checks were skipped?
Comment 2•20 days ago
|
||
[In response to Comment 1]
The existing CCADB Policy still references the concept of an “Audit Incident Report” - which is what certSIGN appears to have disclosed here.
When the CCADB Steering Committee updated the CCADB Incident Reporting Guidelines (IRGs), the corresponding “Audit Incident Report” guidance was removed under the expectation that all incident reports would follow the same reporting process going forward. In part, this change was motivated by the public discussion process.
Recently announced, the CCADB Steering Committee is working on an update to the CCADB Policy - which further removes the concept of an “Audit Incident Report” from CCADB.org - and will hopefully reduce opportunities for confusion.
While the IRGs offer some degree of flexibility related to the scope of reports (“There SHOULD be a single Incident Report for each distinct matter, and CA Owners MUST submit an additional, separate Incident Report when…”), from Chrome’s view, we would prefer distinct reports for each issue/audit finding using the current IRG templates to allow more thoughtful root cause analysis and evaluation of action items.
Assignee | ||
Comment 3•17 days ago
|
||
We will submit separate tickets for each finding, using the recommended template.
Assignee | ||
Comment 4•10 days ago
|
||
I have opened separate tickets for each audit finding:
- certSIGN: Findings in 2025 ETSI Audit - Audit Incident Report #1 - https://bugzilla.mozilla.org/show_bug.cgi?id=1965804
- certSIGN: Findings in 2025 ETSI Audit - Audit Incident Report #2 - https://bugzilla.mozilla.org/show_bug.cgi?id=1965805
- certSIGN: Findings in 2025 ETSI Audit - Audit Incident Report #3 - https://bugzilla.mozilla.org/show_bug.cgi?id=1965806
- certSIGN: Findings in 2025 ETSI Audit - Audit Incident Report #4 - https://bugzilla.mozilla.org/show_bug.cgi?id=1965807
- certSIGN: Findings in 2025 ETSI Audit - Audit Incident Report #5 - https://bugzilla.mozilla.org/show_bug.cgi?id=1965808
I propose the closing of this preliminary audit report.
Assignee | ||
Comment 5•3 days ago
|
||
If no further requirements we propose to close this incident.
Comment 6•3 days ago
|
||
I think this can be closed because five other incident reports have been opened that replace this incident report.
Description
•