Hi Rob,
Thank you for providing a summary of the S/MIME BR Audit disclosure status. On behalf of TWCA, I would like to raise a few questions regarding the alerts on https://crt.sh/mozilla-disclosures:
If we have misunderstood the information presented on the disclosure page or misinterpreted any CCADB attributes, please let us know. If this is confirmed as an incident, we will disclose it on Bugzilla following the latest CCADB incident reporting template.
Thank you.
Best regards,
ChyaHung Tsai
TWCA
Hi Rob,
thank you for your efforts to improve the security of the web PKI.
We have conducted a quick investigation into the reported S/MIME audit issue and believe we have found the possible root cause of the issue.
For the problematic "Microsec e-Szigno Root CA 2009" root, Microsec has a "working" root certificate that is included in several Root Programs.
For different reasons, two doppelganger certificates have been issued for this root, which are not active and are not directly trusted by any of the Root Programs.
These two doppelganger certificates have been added to CCADB as subordinate certificates under the "working" root CA certificate and the audits are marked "as parents".
Microsec has a total of 3 root certificates for this root entity, but there are 4 instances in CCADB, as shown in the following table.
We do not know how and why, but one of the doppelganger certificates has been added to CCADB as a separate root as well, and this may be the source of the problem.
Microsec e-Szigno Root CA 2009
SHA256 hash | Cert Serial Number | CCADB Unique ID | Included in CCADB as | Included in Root Programs |
3C5F81FEA5FAB82C64BFA2EAECAFCDE8E077FC8620A7CAE537163DF36EDBF378 | 00C27E43044E473F19 | A000164 | root | included |
8E8C6EBF77DC73DB3E38E93F4803E62B6B5933BEB51EE4152F68D7AA14426B31 | 00C27E43044E473F18 | A010460 | root | not included |
8E8C6EBF77DC73DB3E38E93F4803E62B6B5933BEB51EE4152F68D7AA14426B31 | 00C27E43044E473F18 | A004417 | subordinate | same as parent |
72F9AF2158181BAF16D60C9B4E6F4BD7CA8D2341AD48AFDB67CB4C8332D546F6 | 00E8849639AB66105A | A006945 | subordinate | same as parent |
We contact the CCADB operators and ask them what to do to solve this issue.
Kind Regards,
Sándor
Dr. Sándor SZŐKE
dep. Director of eIDAS Trust Services
Microsec Ltd. | Ángel Sanz Briz Road 13.
Budapest, H-1033 Hungary
Graphisoft Park Southern Area, Building SP3, 3th floor
T: +36 1 802-4418 | +36 1 505-4477 / 488
sandor...@microsec.com
--
You received this message because you are subscribed to the Google Groups "CCADB Public" group.
To unsubscribe from this group and stop receiving emails from it, send an email to public+un...@ccadb.org.
To view this discussion visit https://groups.google.com/a/ccadb.org/d/msgid/public/MW4PR17MB47298BAE9940F13E86CB678BAACB2%40MW4PR17MB4729.namprd17.prod.outlook.com.
Hi Rob,
we sent an email to CCADB operator yesterday, and we opened an incident ticket in Mozilla: https://bugzilla.mozilla.org/show_bug.cgi?id=1952519
I feel that the management of doppelganger root certificates is problematic in CCADB, it would be useful to develop clear rules for this.
Kind Regards,
Sándor
Entrust:Two applicable Root Certificate records don’t specify any S/MIME BR audit details. Although these roots have been distrusted for further issuance of TLS server certificates, they are still fully trusted for the issuance of S/MIME certificates. Has Entrust undergone an S/MIME BR audit?
Siemens (externally-operated Sub-CAs under Entrust):Several applicable Intermediate Certificate records specify no S/MIME BR audit details. Has Siemens undergone an S/MIME BR audit?
We believe the CCADB issue is that the CAs in question are issued from a Technically Constrained CA, where the CA certificate is reissued on an annual basis, and the previous certificate is then revoked. In CCADB, we change the CA hierarchy to point to the most recent Technically Constrained CA certificate, which unfortunately is not included in the audit report. This breaks the AVI test. The test should pass after the new compliance report is referenced in CCADB.