Thank you Hanno for bringing this to our attention. It turns out one of our sales engineers used this key pair to issue a certificate during a demonstration. Since it wasn't in the blocklist, it issued.
We have about 1.5M key pairs in our blocklist, but there are a lot of places to look for key pairs, and we hadn't searched OpenSSL for them. We did that today in response to your discovery.
As an aside, I'd like to encourage people to use the RFC 9500 test keys, where feasible, instead of generating new ones. This makes it much easier to block test keys in a more comprehensive way.
We have added the OpenSSL private keys that were not already present on our key blocklist. For CAs who track external blocked keys, here is a list of OpenSSL private keys:
https://github.com/openssl/openssl/tree/master/test/certs.
For general awareness, we also maintain a page where compromised private keys may be reported:
https://problemreport.digicert.com/.
-Tim
> --
> You received this message because you are subscribed to the Google Groups
> "
dev-secur...@mozilla.org" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to
dev-security-po...@mozilla.org.
> To view this discussion visit
>
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-
> policy/20241125164859.326b3b7d%40computer.