PKIoverheid: TSP Cleverbase Findings in 2025 ETSI Audit - Incident Report #1 – Incorrect issuer CA listed in CPS
Categories
(CA Program :: CA Certificate Compliance, task)
Tracking
(Not tracked)
People
(Reporter: pkioverheid, Assigned: pkioverheid)
Details
(Whiteboard: [ca-compliance] [audit-finding])
Full Incident Report
Summary
-
CA Owner CCADB unique ID: A000068
-
Incident description:
During the annual audit for CA Cleverbase ID B.V. (a PKIoverheid subCA) a minor non-conformity was registered with regards to the contents of the CPS of Cleverbase.
The Cleverbase CPS which was in force at the time of the audit (Version 2.0 as of 02-04-2025) gave an overview over the PKIoverheid G3 and G4 PKI hierarchies in section “1.1 Overview”. In this overview the root and intermediate CA for the G4 hierarchy were named “Staat der Nederlanden - G4 Root Priv G-Other – 2024” and “Staat der Nederlanden - G4 Intm Priv G-Other NP – 2024”.
However, the G4 CA certificate for Cleverbase was issued by the “Staat der Nederlanden - G4 Intm EUTL G-Sigs NP – 2024” CA, hence the correct naming for the root and intermediate CA is “Staat der Nederlanden - G4 Root EUTL G-Sigs – 2024” and “Staat der Nederlanden - G4 Intm EUTL G-Sigs NP – 2024”.
Since the issued certificate for the issuing-CA “Cleverbase ID - G4 PKIo EUTL G-Sigs NP – 2024” shows the correct issuer-CN (“Staat der Nederlanden - G4 Intm EUTL G-Sigs NP– 2024”), this was just an minor error in the CPS and this issue was fixed in the next CPS update. -
Timeline summary:
- Non-compliance start date:
- 02-03-2025
- Non-compliance identified date:
- 02-04-2025
- Non-compliance end date:
- 02-06-2025
-
Relevant policies:
Certification Practice Statement Cleverbase ID B.V. -
Source of incident disclosure:
Conformity Assessment Report/Audit Attestation Letter Cleverbase ID B.V.
Impact
-
Total number of certificates:
N/A -
Total number of "remaining valid" certificates:
N/A -
Affected certificate types:
N/A -
Incident heuristic:
N/A -
Was issuance stopped in response to this incident, and why or why not?:
No. No certificates had been issued under this TSP intermediate certificate yet (CA certificate was not in use yet) -
Analysis:
N/A -
Additional considerations:
Cleverbase has never issued S/MIME certificates but operates a subordinate CA which is S/MIME capable due to the fact that PKIoverheid TSP CA certificate profiles were created in the past with the S/MIME EKU (emailProtection) in mind for legacy compatibility issues with certain software suites (signing applications)
Timeline
See contributing factor 1
Related Incidents
N/A
Root Cause Analysis
A new CPS version needed to be created to incorporate all the changes that were expected for the new G4 CA certificate. Changes to the Cleverbase CPS are normally not frequent and/or large in scope, which makes reviewing and publishing the changes for the new version quite controlled and orderly.
Since these new changes contained details for issuing new type of certificates (G4) which features major changes in design compared to the previous G3 hierarchy, the choice was made to bundle all small changes to the CPS in one big release (2.0). This includes a significant amount of very specific detailed changes that resulted in a complex change. Making this amount of detailed changes by hand is error prone and the large amount of changes also makes catching errors in the review process harder.
Ultimately the mentioned error slipped through and made its way to production.
Contributing Factor 1: Human error
-
Description:
As preparation for setting up a new CA under a new government intermediate and root a draft CPS was created.
This draft CPS included a substantial amount of changes to accompany the release of this new CA (Profiles, status information, etc.)
During the creation and review of the CPS by a second pair of eyes the error in the hierarchy was not noticed. -
Timeline:
26-2-2025: Draft CPS was created and reviewed. The error went unnoticed.
2-3-2025: A draft CPS was sent as audit documentation to the CAB.
2-4-2025: The CAB found the minor non-conformity during the audit.
2-6-2025: A new CPS version including the fix for the minor non-conformity was published. -
Detection:
The CAB inspected our CPS, finding it stated the wrong intermediate root in the hierarchy for the issuer certificate that was being audited. -
Interaction with other factors:
NA -
Root Cause Analysis methodology used:
5 Whys
Lessons Learned
- What went well:
- Substantial amount of changes to our CPS were succesfully released
- The error was contained and fixed in a timely manner
- What didn’t go well:
- The review on the CPS was not thorough enough to catch the error.
- Where we got lucky:
- The error had no impact on any certificates or running operations
- Additional:
- NA
Action Items
| Action Item | Kind | Corresponding Root Cause(s) | Evaluation Criteria | Due Date | Status |
|---|---|---|---|---|---|
| A mandatory review checklist for critical parts of the CPS will be incorporated in the change and release process for CPS updates. | Prevent | Root Cause # 1 | Review Checklist must include all critical fields of CPS and be approved by the Compliance Officer | 2025-05-21 | Done |
| Analysis of technical measures to prevent human errors in critical parts of the CPS | Prevent | Root Cause # 1 | Report with decision regarding technical measures | 2026-04-14 | To do |
Appendix
Updated•4 months ago
|
| Assignee | ||
Comment 1•4 months ago
|
||
PKIoverheid is monitoring this bug and we're open for additional questions or remarks people might have. Currently we don't have any updates with regards to the Action Items.
| Assignee | ||
Comment 2•2 months ago
|
||
PKIoverheid is monitoring this bug and we're open for additional questions or remarks people might have. Currently we don't have any updates with regards to the Action Items.
This report has gone stale.
You may request a next update that's beyond the normal weekly cadence but, absent that being accepted, you are required to provide an update on a weekly basis.
Comment 4•24 days ago
|
||
All action items have been completed. A closure statement will be posted shortly.
Comment 5•10 days ago
|
||
This report has gone stale. If it is ready for closure, please file a Closure Report.
Comment 6•9 days ago
|
||
Comment 4 falsely claimed all action items had been completed. Statements regarding another incident got mixed-up with this one resulting in posting in the wrong bug. Action item #2 is still ongoing and its due date remains 2026-04-14.
| Assignee | ||
Updated•5 days ago
|
Description
•