IdenTrust: Unauthorized OCSP responses for cross-signed roots
Categories
(CA Program :: CA Certificate Compliance, task)
Tracking
(Not tracked)
People
(Reporter: roots, Assigned: roots, NeedInfo)
Details
(Whiteboard: [ca-compliance] [ocsp-failure])
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/144.0.0.0 Safari/537.36
Steps to reproduce:
Preliminary Incident Report
Summary
-
Incident Description
During routine monitoring with SSLMate’s watch, we identified four cross-signed certificates issued by our CA that were flagged for an "unauthorized OCSP response error." Upon investigation, we confirmed that OCSP was not functioning for these four cross-signed certificates because the corresponding ICAs had not been properly included in the OCSP configuration prior to disclosing the certificates to CCADB. -
Relevant policies:
RFC 6960 Section 2.3 and BR section 4.9.9
Source of incident disclosure:
CA Owner self-disclosed
Impact
Since the required ICAs were missing from the OCSP configuration, OCSP checks for the four cross-signed certificates returned error responses.
We will provide a full incident report by February 17, 2024
Comment 1•1 month ago
|
||
During routine monitoring with SSLMate’s watch, we identified four cross-signed certificates issued by our CA that were flagged for an "unauthorized OCSP response error." Upon investigation, we confirmed that OCSP was not functioning for these four cross-signed certificates because the corresponding ICAs had not been properly included in the OCSP configuration prior to disclosing the certificates to CCADB.
My pardon, but if the report is only made possible because of a third-party tool - is it truly "self-disclosed" as claimed in this 'Preliminary Incident Report'?
Updated•1 month ago
|
(In reply to Dean F. Reed from comment #1)
Thank you for raising this point. To clarify, the identification of the issue was aided by SSLMate’s monitoring tool, but the confirmation, root cause analysis, and subsequent full incident disclosure is to be performed internally by our team. We interpret the term “self-disclosed” as the fact that we voluntarily reported the incident after our own investigation, rather than being notified by an external party. The third-party tool serves as an alerting mechanism, not as the source of the disclosure.
Full Incident Report
Summary
- CA Owner CCADB unique ID: A000036
- Incident description:
During routine monitoring with SSLMate’s watch, we identified four cross-signed certificates issued by our CA that were flagged for an "unauthorized OCSP response error." Upon investigation, we confirmed that OCSP was not functioning for these four cross-signed certificates because the corresponding ICAs had not been properly included in the OCSP configuration prior to disclosing the certificates to CCADB. - Timeline summary:
- Non-compliance start date: 2026-01-26
- Non-compliance identified date: 2026-02-02
- Non-compliance end date: 2026-02-05
- Relevant policies:
RFC 6960 Section 2.3 and BR section 4.9.9 - Source of incident disclosure:
CA Owner self-disclosed
Impact
- Total number of certificates: 4
- Total number of "remaining valid" certificates: 4
- Affected certificate types: Cross-Signed roots
- Incident heuristic: See list in appendix
- Was issuance stopped in response to this incident, and why or why not?: N/A
- Analysis:
- Additional considerations:
Timeline - All times are in UTC
- 2026-01-29 15:49 - Issue the cross-signed certificates
- 2026-01-29 18:29 - Disclosed the cross-signed certificate in CCADB
- 2026-02:02 16:30 - Noticed OCSP errors in SSLMate’s watch
- 2026-02:02 20:30 - Uploaded missing certificates in OCSP DB
- 2026-02-05 17:30 - Disclosed preliminary Incident
- 2026-02-17 17:30 - Disclosed full incident report
Related Incidents
| Bug | Date | Description |
|---|---|---|
| 1985307 | 2025-08-26 | OCSP and CRL traffic not being proxied for 3 Subordinate CAs |
| 1964866 | 2025-05-06 | OCSP service response error |
| 1905446 | 2024-06-28 | Unauthorized OCSP response on a Timestamp certificate |
Root Cause Analysis
OCSP was not functioning for four cross signed ICAs because they were omitted from the OCSP database.
Contributing factors:
1. Configuration gap: Cross signed ICAs were not included in the OCSP responder’s certificate inventory/profile.
2. Process oversight: The operational checklist for adding new or cross signed ICAs to OCSP did not explicitly cover all cross sign scenarios prior to CCADB disclosure.
3. Change management timing: CCADB disclosure occurred before the OCSP config update and validation were completed for the cross signed path(s).
Lessons Learned
Disclosure sequencing matters: CCADB publication should follow verifiable OCSP readiness checks for every chain variant.
- What went well:
Effective external monitoring and detection, Promopt internal investigation and confirmation and timely remediation. - What didn’t go well:
Incomplete operational readiness checks prior to disclosure - Where we got lucky:
- Additional:
Action Items
| Action Item | Kind | Corresponding Root Cause(s) | Evaluation Criteria | Due Date | Status |
|---|---|---|---|---|---|
| Disclosed certificates in OCSP DB | Correct | Root Cause | No longer flagged in monitors | 2026-02-02 | Complete |
| Add cross-signed certificate type to the OCSP validation checking process in place for other certificates | Prevent | Root Cause | Not flagged in error on in monitors | 2026-02-02 | Complete |
Appendix
The CRLs and OCSP responses generated by these cross-signed roots CAs were temporarily impacted:
We have no further pending actions for this issue. Can this ticket be closed?
IdenTrust,
The process for requesting incident report closure is clearly documented in the CCADB IRGs. You must file a Closure Report, following the template. https://www.ccadb.org/cas/incident-report#closure-report
We'll submit a closure report, by end of next week.
Report Closure Summary
-
Incident description:
During routine monitoring with SSLMate’s watch, we identified four cross-signed certificates issued by our CA that were flagged for an "unauthorized OCSP response error." Upon investigation, we confirmed that OCSP was not functioning for these four cross-signed certificates because the corresponding ICAs had not been properly included in the OCSP configuration prior to disclosing the certificates to CCADB. -
Incident Root Cause(s):
OCSP was not functioning for four cross signed ICAs because they were omitted from the OCSP database.Contributing factors:
- Configuration gap: Cross signed ICAs were not included in the OCSP responder’s certificate inventory/profile.
- Process oversight: The operational checklist for adding new or cross signed ICAs to OCSP did not explicitly cover all cross sign scenarios prior to CCADB disclosure.
- Change management timing: CCADB disclosure occurred before the OCSP config update and validation were completed for the cross signed path(s).
-
Remediation description:
After OCSP cert was posted in database, correct OCSP responses were restored. -
Commitment summary:
Commited action items are now complete:Action Item Kind Corresponding Root Cause(s) Evaluation Criteria Due Date Status Disclosed certificates in OCSP DB Correct Root Cause Not flagged in error on in monitors 2026-02-02 Complete Add cross-signed certificate type to the OCSP validation checking process in place for other certificates Prevent Root Cause Not flagged in error on in monitors 2026-02-02 Complete
All Action Items disclosed in this report have been completed as described, and we request its closure.
Description
•