Doug,

Responding to your original question, I look at crt.sh and other data
sources for certificate errors when reviewing inclusion requests or doing
other sorts of investigations. I am not currently reviewing the crt.sh
report for misissuance on a regular basis, but maybe I should.

I went through the current list and identified the following problems
affecting certificates trusted by Mozilla:
* KIR S.A.: Multiple issues -
https://bugzilla.mozilla.org/show_bug.cgi?id=1495497
* Government of Spain FNMT: OU exceeds 64 characters -
https://bugzilla.mozilla.org/show_bug.cgi?id=1495507
* Assecco DS (Certum): Unallowed key usage for EC public key -
https://bugzilla.mozilla.org/show_bug.cgi?id=1495518
* Certinomis: issued & revoked a precertificate containing a SAN of 'www',
didn't report it - https://bugzilla.mozilla.org/show_bug.cgi?id=1495524

- Wayne

On Mon, Oct 1, 2018 at 8:51 AM Rob Stradling via dev-security-policy <
[email protected]> wrote:

> Hi IƱigo.
>
> I suspect it's because my script that produces the 1 week summary data
> [1] isn't using a consistent view of the underlying linting results
> throughout its processing.  Hopefully this [2] will fix it.
>
> 100% errors from that Comodo issuing CA is because it's issuing SHA-1
> certs that chain to a no-longer-publicly-trusted root.
>
>
> [1]
>
> https://github.com/crtsh/certwatch_db/blob/master/lint_update_1week_stats.sql
>
> [2]
>
> https://github.com/crtsh/certwatch_db/commit/8ce0c96c9c50bfb51db33c6f44c9c1d1a9f5a96c
>
> On 01/10/2018 15:35, Inigo Barreira wrote:
> > And checking this site, how can Comodo have more certs with errors
> (15030) than certs issued (15020).
> >
> > Regards
> > ________________________________________
> > From: dev-security-policy <[email protected]>
> on behalf of Adriano Santoni via dev-security-policy <
> [email protected]>
> > Sent: Monday, October 01, 2018 10:09 PM
> > To: Rob Stradling; Doug Beattie
> > Cc: mozilla-dev-security-policy
> > Subject: Re: Increasing number of Errors found in crt.sh
> >
> > I also agree.
> >
> > As I said before, that's a non-trusted certificate. It was issued by a
> > test CA that does /not/ chain to a public root.
> >
> >
> > Il 01/10/2018 16:04, Rob Stradling ha scritto:
> >> On 01/10/2018 15:02, Doug Beattie via dev-security-policy wrote:
> >>> Hi Adriano,
> >>>
> >>> First, I didn't mean to call you out specifically, but you happened
> >>> to be
> >>> first alphabetically, sorry.  I find this link very helpful to list
> >>> all CAs
> >>> with errors or warnings: https://crt.sh/?cablint=1+week
> >>>
> >>> Second, How do you define a "test CA"?  I thought that any CA that
> >>> chains to
> >>> a public root was by definition not a test CA,
> >>
> >> I agree with that.
> >>
> >>> and since the issued cert was
> >>> in CT logs, I assumed that your root was publicly trusted. Maybe I'm
> >>> mistaken on one of these points
> >>
> >> Actually, some non-publicly-trusted roots are accepted by some of the
> >> logs that crt.sh monitors.
> >>
> >>> Doug
> >>>
> >>> -----Original Message-----
> >>> From: dev-security-policy
> >>> <[email protected]> On
> >>> Behalf Of Adriano Santoni via dev-security-policy
> >>> Sent: Monday, October 1, 2018 9:49 AM
> >>> To: [email protected]
> >>> Subject: Re: Increasing number of Errors found in crt.sh
> >>>
> >>> Thank you Rob!
> >>>
> >>> If I am not mistaken, it seems to me that we have just 1 certificate
> >>> in that
> >>> list, and it's a non-trusted certificate (it was issued by a test CA).
> >>>
> >>>
> >>> Il 01/10/2018 15:43, Rob Stradling via dev-security-policy ha scritto:
> >>>> On 01/10/2018 14:38, Adriano Santoni via dev-security-policy wrote:
> >>>>> Is it possible to filter the list https://crt.sh/?cablint=issues
> >>>>> based on the issuing CA ?
> >>>>
> >>>> Yes.
> >>>>
> >>>> First, visit this page:
> >>>> https://crt.sh/?cablint=1+week
> >>>>
> >>>> Next, click on the link in the "Issuer CN, OU or O" column that
> >>>> corresponds to the issuing CA you're interested in.
> >>>>
> >>>>> Il 01/10/2018 15:26, Doug Beattie via dev-security-policy ha scritto:
> >>>>>> Hi Wayne and all,
> >>>>>>
> >>>>>>
> >>>>>> I've been noticing an increasing number of CA errors,
> >>>>>> https://crt.sh/?cablint=issues  Is anyone monitoring this list and
> >>>>>> asking
> >>>>>> for misissuance reports for those that are not compliant? There
> >>>>>> are 15
> >>>>>> different errors and around 300 individual errors (excluding the
> >>>>>> SHA-1
> >>>>>> "false" errors).  Some CAs are issuing certs to CNs of localhost,
> are
> >>>>>> including RFC822 SANs, not including OCSP links and many more.
> >>>>>>
> >>>>>> -          Actalis,
> >>>>>>
> >>>>>> -          Digicert,
> >>>>>>
> >>>>>> -          Microsoft,
> >>>>>>
> >>>>>> -
> >>>>>>
> >>>>>>
> >>>>>> There are also some warning checks that should actually be errors
> >>>>>> like
> >>>>>> underscores in CNs or SANs.
> >>>>>>
> >>>>>>
> >>>>>> Doug
> >>
>
> --
> Rob Stradling
> Senior Research & Development Scientist
> Email: [email protected]
> Bradford, UK
> Office: +441274730505
> ComodoCA.com
>
> This message and any files associated with it may contain legally
> privileged, confidential, or proprietary information. If you are not the
> intended recipient, you are not permitted to use, copy, or forward it,
> in whole or in part without the express consent of the sender. Please
> notify the sender by reply email, disregard the foregoing messages, and
> delete it immediately.
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to