On Sun, Dec 16, 2018 at 11:49 PM please please <
pleasei...@hotmail.com>
wrote:
> I just noticed that Comodo CA has finally posted its incident report in
>
https://bugzilla.mozilla.org/show_bug.cgi?id=1492006
>
> Comments:
> - The report suggests that no BR violation occurred because I was not the
> Subscriber to fulfill the conditions in bullet point 1 of BR 4.9.1.1.
> However, I believe I fulfilled the conditions for triggering the 24 hours
> revocation anyway because of bullet point 6 of the same BR, which states "The
> CA is made aware of any circumstance indicating that use of a Fully
> Qualified Domain Name or IP address in the Certificate is no longer legally
> permitted (e.g. [...] a relevant licensing or services agreement between
> the Domain Name Registrant and the Applicant has terminated [...])", as I
> explicitly stated in my initial revocation request email that Cloudflare
> was no longer authorized to represent my domain but still controlled the
> private keys.
>
Sectigo's (formerly Comodo's) response does seem to both admit the
violation and downplay it. Shortly after the violation the BRs were changed
to allow 5 days for most revocations, and that may be the motivation for
calling out that the Subscriber didn't request revocation. However, I
believe this case still falls under the 24-hour rule due to 4.9.1.1(4):
The CA obtains evidence that the validation of domain authorization or
control for any Fully-Qualified Domain Name or IP address in the
Certificate should not be relied upon.
- Comodo CA claims that my request was "potentially ambiguous", but did not
> explain in what regard, nor did they ever asked me for clarifications. I
> can only assume as of now that the issue was to get an exhaustive list of
> certificates as I ran into the same problem and could not do so efficiently
> myself, but assumed Comodo CA would have had the means necessary to extract
> them easily from their own data based on my request.
>
I've requested more information in the bug. This may be a case of Sectigo
falling back on the interpretation that the revocation clock doesn't start
until the certificates have been identified. However, Sectigo also accepts
responsibility by stating "The urgency of the revocation request was not
adequately communicated as the request was passed along."
- I'm concerned that the incident report was posted more than 2 months past
> Mozilla's soft deadline to do so, especially when considering that the
> incident was also about being late to take necessary action for a deadline.
>
> Yes, this is a concern. When a CA exhibits a pattern of slow responses, it
is taken into consideration when Mozilla is making decisions about the CA,
such as whether to include new roots.
Let me know if you need additional information from me to complete your
> assessment of the incident.
>
> Guillaume Fortin-Debigaré
> *Sent:* October 11, 2018 19:19
> *To:* Wayne Thayer
> *Cc:* MDSP
> *Subject:* Re: Violation report - Comodo CA certificates revocation delays
>
> I was under the impression that CAs were allowed to remove CRL entries and
> OCSP support for expired certificates for some reason. Good to know!
>
> On a slightly-unrelated note, you might also want to poke Comodo CA about
>
https://bugzilla.mozilla.org/show_bug.cgi?id=1461391
>
> Thanks again!
>
> Guillaume Fortin-Debigaré
> *Sent:* October 11, 2018 13:53
> *Subject:* Re: Violation report - Comodo CA certificates revocation delays
> wrote:
>
> Any update behind the scenes about this issue? I've noticed that the soft
> limit to fill an Incident Report expired more than a week ago, and I'm
> starting to be a bit worried that some of the evidence in the CT logs might
> disappear if the investigation is not completed before December 6th, the
> earliest expiration date among the affected certificates.
>
> Guillaume Fortin-Debigaré
> ------------------------------
> *From:* please please <
pleasei...@hotmail.com>
> *Sent:* September 17, 2018 23:39
> *To:* Wayne Thayer
> *Cc:* MDSP
> *Subject:* Re: Violation report - Comodo CA certificates revocation delays
>
> Good to know, and thank you very much for following up on this!
>
> Small update by the way: I finally received a reply from Comodo CA
> confirming their 2nd wave of revocations a few hours ago, on September 17
> at 16:55 UTC to be exact. Strangely, it was in response to an email where I
> informed them that I had already noticed they fully completed my revocation
> request. I don't think it's a relevant detail but I wanted to mention it to
> avoid any potential confusion.
>
> Guillaume Fortin-Debigaré
>
> *Subject:* Re: Violation report - Comodo CA certificates revocation delays
>
> I have created a bug and requested a response from Comodo:
>
https://bugzilla.mozilla.org/show_bug.cgi?id=1492006
>
> As noted, there are no specific requirements regarding how CAs validate
> revocation requests in the BRs. Every CA may do this however they choose,
> so I don't believe there is any action required in regard to DigiCert's
> response to their problem report.
>
> - Wayne
>
> On Sun, Sep 16, 2018 at 8:30 PM please please via dev-security-policy <
>
dev-secur...@lists.mozilla.org> wrote:
>
> Hello, I am the domain owner of
debigare.com. I would like to make you
> aware that Comodo CA took more than 5 days to revoke certificates they had
> signed for my domain and subdomains after requesting them to do through
> their sslabuse email address, past the 24 hours maximum mentioned in the
> Baseline Requirements as stipulated in section 4.9.1.1.
>
> For context, I was previously using Cloudflare's Universal SSL feature,
> but disabling it did not revoke the old certificates that had not yet
> expired, but simply removed them from its system, and some of the
> certificates were still valid for more than 6 months.
>
> I first attempted to contact Cloudflare's support to ask them to revoke
> the certificates themselves on September 6 at 7:43 UTC. This only led to
> irrelevant responses and confused customer support agents that had no idea
> what I was talking about, and this appeared to go nowhere. I eventually got
> a response from them on September 11 at 5:53 UTC that they would request
> CAs to perform the revocation, but that was after I did so myself, and I
> never got a status report back afterwards.
>
> There were two CAs affected by this issue. The vast majority of
> certificates were signed by Comodo CA, and the rest by DigiCert. I did not
> run into any issues with DigiCert (they in fact proactively checked with
> Cloudflare my claim and revoked the certificates before I even had the
> chance to attempt their domain ownership challenge), but Comodo CA was
> another story entirely.
>
> My first request to Comodo CA to revoke the certificates for
debigare.com
>
https://lists.mozilla.org/listinfo/dev-security-policy
>
>