Continuing on with this research I've analysed the open issues on bugzilla for recent mis-issuances requiring revocation with more than 100 certificates.
The full dataset is held at:
https://docs.google.com/spreadsheets/d/1DmqupuUfx5bQvtm99I6OZZnYj3BL9Eawo1gu0uPST0E/edit?usp=sharingPublished HTML version:
https://docs.google.com/spreadsheets/d/e/2PACX-1vRM7a7yCe3jYJAvrb-dR90iIh5xu3WAbj7EU42r14pgjLS1G7z7W4Vp2jOAesmStkMM6hw4emLKw9-K/pubhtmlTo reiterate this is checking mis-issued certificate batches against Certificate Revocation Lists. For every mis-issued batch (bar some exceptionally large issues) I've obtained the serial number and checked the CRL to see revocation timeframes and progress at 5 days, 15 days, and 30 days. This is to also to see if there's any data in the murmured proposals of an extension.
This information is provided to give an overall picture of compliance across all prominent incidents recently. If there are any questions or corrections feel free to email me. There are a number of caveats per-CA that I'll detail below alongside some figures. Consider this a rough summation given the various fuzzy factors involved.
Information was all updated as of 2024-04-27 14:00 UTC
General Caveats:- There is imprecise wording and different interpretations on when the revocation start timer begins, and how CAs note this in their incident reports. To that end I've separated the time that a CA seems to have internally confirmed the issue, and when they actively started some process of revocation: contacting subscribers or actively revoking.
- A number of these issues are still pending revocation and will be updated as more information arrives, consider the spreadsheet a living document
This covers 20 issues across 17 CAs - 17 of which get a detailed breakdown of individual certs to revocations:
1: ACCVIssue: ACCV: Certificates issued with cRLIssuer in CDP extension
Link:
https://bugzilla.mozilla.org/show_bug.cgi?id=1884532Impacted: 837
Missed at 5d: 0 (0.00%)
Missed at 15d: 0 (0.00%)
Missed at 30d: 0 (0.00%)
- An outlier for all surveyed CAs in this dataset: the CRL involved is 24MB and has 537k entries, useful for testing
- CA provided serial numbers speeding up this report
2: ActalisIssue: Actalis: Certificates issued with invalid RDN order
Link:
https://bugzilla.mozilla.org/show_bug.cgi?id=1884532Impacted: 263
Missed at 5d: 0 (0.00%)
Missed at 15d: 0 (0.00%)
Missed at 30d: 0 (0.00%)
- CA provided serial numbers speeding up this report
3: Buypass (1)Issue: Buypass: TLS certificates with incorrect Subject attribute order
Link:
https://bugzilla.mozilla.org/show_bug.cgi?id=1864204Impacted: 591
Missed at 5d: 544 (92.05%)
Missed at 15d: 15 (2.54%)
Missed at 30d: 2 (0.34%)
- There is an extreme outlier (so far) as full revocation time is over 65 days
- There isn't a clear start hour for when revocation procedures occurred
4: Buypass (2)Issue: Buypass: Using an external DNS Resolver for DNS lookups
Link:
https://bugzilla.mozilla.org/show_bug.cgi?id=1872371Impacted: 177060
Missed at 5d: 177060 (100%)
Missed at 15d: 90576 (51.16%)
Missed at 30d: 0 (0.00%)
- This is included based off of comments from the CA
- No detailed analysis is provided, the scale of this is out of scope
5: CertignaIssue: Certigna: TLS certificates with Basic constraint non-critical
Link:
https://bugzilla.mozilla.org/show_bug.cgi?id=1883416Impacted: 3794
Missed at 5d: 1243 (32.76%)
Missed at 15d: 1 (0.03%)
Missed at 30d: 0 (0.00%)
- Note: This is an ongoing incident
- There isn't a clear start hour for when revocation procedures occurred
- Counting it generously from 2024-03-21 (revocation start) to 2024-03-26 23:59 gives us 1243, when CA reports 1241?
6: certSIGNIssue: certSIGN: Certificates with incorrect Subject attribute order
Link:
https://bugzilla.mozilla.org/show_bug.cgi?id=1886624Impacted: 625
Missed at 5d: 306 (48.96%)
Missed at 15d: 0 (0.00%)
Missed at 30d: 0 (0.00%)
- Casualty of the fuzziness of the precise revocation start time, the 306 certs are revoked within 68 minutes after the deadline
7: CFCAIssue: CFCA: certificate basicConstraints extension not marked as critical
Link:
https://bugzilla.mozilla.org/show_bug.cgi?id=1886135Impacted: 2095*
Missed at 5d: 2089 (99.71%)
Missed at 15d: 1268 (60.53%)
Missed at 30d: 526 (25.11%)
- Note: This is an ongoing incident
- *Incident provides 2098 SHA256 sums, however this is 2095 de-duped
8: Chunghwa TelecomIssue: Chunghwa Telecom: Wrong Extended Key Usage setting by GTLSCA
Link:
https://bugzilla.mozilla.org/show_bug.cgi?id=1887096Impacted: 6453
Missed at 5d: 6450 (99.95%)
Missed at 15d: 6450 (99.95%)
Missed at 30d: 6448 (99.92%)
- Note: This is an ongoing incident
- The CRL is 6315 entries long, and this incident is 6298 of them currently
9: D-TrustIssue: D-Trust: LDAP-URL in Subscriber Certificate Authority Information Access field
Link:
https://bugzilla.mozilla.org/show_bug.cgi?id=1884714Impacted: 2601*
Missed at 5d: 0 (0.00%)
Missed at 15d: 0 (0.00%)
Missed at 30d: 0 (0.00%)
- *2 certificates are not CT-logged and not included in this figure
10: Entrust (1)Issue: Entrust: EV TLS Certificate cPSuri missing
Link:
https://bugzilla.mozilla.org/show_bug.cgi?id=1883843Impacted: 26668
Missed at 5d: 22838 (85.64%)
Missed at 15d: 20554 (77.07%)
Missed at 30d: 16655 (62.45%)
- Note: This is an ongoing incident
- This is included based off of comments from the CA
- 15d figure is taken from a comment at 14 days
- 30d figure is taken from a comment at 31 days
- No detailed analysis is provided, the scale of this is out of scope
11: Entrust (2)Issue: Entrust: clientAuth TLS Certificates without serverAuth EKU
Link:
https://bugzilla.mozilla.org/show_bug.cgi?id=1886467Impacted: 1176
Missed at 5d: 1076 (91.50%)
Missed at 15d: 1062 (90.31%)
Missed at 30d: 998 (84.87%)
- No caveats
12: Entrust (3)Issue: Entrust: CPS typographical (text placement) error
Link:
https://bugzilla.mozilla.org/show_bug.cgi?id=1890896Impacted: 6008
Missed at 5d: 6008* (100%)
Missed at 15d: 6008* (100%)
Missed at 30d: 6008* (100%)
- CA has refused to revoke as per the Baseline Requirements and their own CPS
- No detailed analysis is provided due to this
13: FirmaprofesionalIssue: Firmaprofesional: Policy Qualifiers other than id-qt-cps present for certificate
Link:
https://bugzilla.mozilla.org/show_bug.cgi?id=1889420Impacted: 499
Missed at 5d: 1 (0.20%)
Missed at 15d: 0 (0.00%)
Missed at 30d: 0 (0.00%)
- No caveats
14: FNMTIssue: FNMT: Certificates issued included Policy qualifiers other than id-qt-cps
Link:
https://bugzilla.mozilla.org/show_bug.cgi?id=1875942Impacted: 712
Missed at 5d: 0 (0.00%)
Missed at 15d: 0 (0.00%)
Missed at 30d: 0 (0.00%)
- CA provided serial numbers speeding up this report
15: Hongkong PostIssue: Hongkong Post: TLS certificates with Certificate Policies extension that does not assert http scheme
Link:
https://bugzilla.mozilla.org/show_bug.cgi?id=1886406Impacted: 1176
Missed at 5d: 1160 (98.64%)
Missed at 15d: 1160 (98.64%)
Missed at 30d: 1160 (98.64%)
- Note: This is an ongoing incident
16: NETLOCKIssue: NETLOCK: Policy Qualifiers other than id-qt-cps is included in TLS certificates
Link:
https://bugzilla.mozilla.org/show_bug.cgi?id=1889570Impacted: 522
Missed at 5d: 521 (99.81%)
Missed at 15d: 255 (48.85%)
Missed at 30d: N/A
- Note: This is an ongoing incident
- No 30d figure as incident ongoing, at time of writing (22d)
17: SectigoIssue: Sectigo: EV Certificate issuance with incorrect subject:serialNumber attribute value
Link:
https://bugzilla.mozilla.org/show_bug.cgi?id=1891245Impacted: 166
Missed at 5d: 0 (0.00%)
Missed at 15d: 0 (0.00%)
Missed at 30d: 0 (0.00%)
- CA provided serial numbers speeding up this report
18: Telekom SecurityIssue: Telekom Security: TLS certificates with basicConstraints not marked as critical
Link:
https://bugzilla.mozilla.org/show_bug.cgi?id=1875820Impacted: 816
Missed at 5d: 336 (41.18%)
Missed at 15d: 0 (0.00%)
Missed at 30d: 0 (0.00%)
- No caveats
19: TWCAIssue: TWCA: TLS certificates with non-critical basicConstraints
Link:
https://bugzilla.mozilla.org/show_bug.cgi?id=1885132Impacted: 16481
Missed at 5d: 4330* (22.23%)
Missed at 15d: 1933* (11.73%)
Missed at 30d: 1846* (11.20%)
- CA provided serial numbers speeding up this report
- However incident data included expired certificates inflating the missed certificate figures
20: VikingCloudIssue: VikingCloud: OV Precertificates with incorrect Subject RDN encoding order
Link:
https://bugzilla.mozilla.org/show_bug.cgi?id=1883779Impacted: 3208
Missed at 5d: 3123 (97.35%)
Missed at 15d: 2433 (75.84%)
Missed at 30d: 1596 (49.75%)
- Strictly speaking this is two incidents in one: additional small batch of EV certs were discovered 21 days into start of revocation
I hope this information is useful and gives an insight into how CAs are performing their incident response currently.
As mentioned any questions or comments feel free to comment publicly or privately.
- Wayne