Apparently they haven’t yet, but we’ll assume that they will.  

Does the community expect a remediation plan for their code and then a 
revocation-and-replacement plan?

 

Ben Wilson, JD, CISA, CISSP

VP Compliance

+1 801 701 9678



 

From: Alex Gaynor [mailto:[email protected]] 
Sent: Friday, August 11, 2017 8:31 AM
To: Ben Wilson <[email protected]>
Cc: Jeremy Rowley <[email protected]>; Jonathan Rudenberg 
<[email protected]>; [email protected]
Subject: Re: Certificates with less than 64 bits of entropy

 

Have they fixed whatever issue there is with their PKI infrastructure that 
leads to this issue? From skimming, I see this pool contains certs issued as 
recently as one month ago.

 

Alex

 

On Fri, Aug 11, 2017 at 10:26 AM, Ben Wilson via dev-security-policy 
<[email protected] 
<mailto:[email protected]> > wrote:

With regard to Siemens, given the large number of certificates and the 
disruption that massive revocations will have on their infrastructure, what 
does this community expect them to do?


-----Original Message-----
From: dev-security-policy [mailto:dev-security-policy-bounces+ben 
<mailto:dev-security-policy-bounces%2Bben> [email protected] 
<mailto:[email protected]> ] On Behalf Of Jeremy Rowley via 
dev-security-policy
Sent: Thursday, August 10, 2017 12:01 PM
To: Jonathan Rudenberg <[email protected] <mailto:[email protected]> >; 
[email protected] 
<mailto:[email protected]> 
Subject: RE: Certificates with less than 64 bits of entropy

Hi Jonathan,

InfoCert's sub CA was revoked on August 1, 2017. We'll reach out to Siemens. 
They moved to Quovadis a while ago and are no longer issuing from that Sub CA.

Jeremy

-----Original Message-----
From: dev-security-policy [mailto:dev-security-policy-bounces+jeremy.rowley 
<mailto:dev-security-policy-bounces%2Bjeremy.rowley> 
[email protected] <mailto:[email protected]> ] On 
Behalf Of Jonathan Rudenberg via dev-security-policy
Sent: Thursday, August 10, 2017 9:26 AM
To: [email protected] 
<mailto:[email protected]> 
Subject: Re: Certificates with less than 64 bits of entropy


> On Aug 10, 2017, at 11:20, Jonathan Rudenberg via dev-security-policy 
> <[email protected] 
> <mailto:[email protected]> > wrote:
>
> QuoVadis (560)
>    Siemens Issuing CA Internet Server 2016 (560)
>
> D-TRUST (224)
>    D-TRUST SSL Class 3 CA 1 2009 (178)
>    D-TRUST SSL Class 3 CA 1 EV 2009 (45)
>    D-TRUST Root Class 3 CA 2 EV 2009 (1)
>
> DigiCert (85)
>    Siemens Issuing CA Class Internet Server 2013 (82)
>    InfoCert Web Certification Authority (3)
>
> Izenpe S.A. (62)
>    EAEko Herri Administrazioen CA - CA AAPP Vascas (2) (62)
>
> Government of The Netherlands, PKIoverheid (Logius) (55)
>    Digidentity Services CA - G2 (55)
>
> Government of Turkey, Kamu Sertifikasyon Merkezi (Kamu SM) (38)
>    Cihaz Sertifikası Hizmet Sağlayıcı - Sürüm 4 (38)

It looks like my summary missed one QuoVadis intermediate:

Bayerische SSL-CA-2016-01 (3)

_______________________________________________
dev-security-policy mailing list
[email protected] 
<mailto:[email protected]> 
https://lists.mozilla.org/listinfo/dev-security-policy


_______________________________________________
dev-security-policy mailing list
[email protected] 
<mailto:[email protected]> 
https://lists.mozilla.org/listinfo/dev-security-policy

 

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to