Hello Ryan,
In the design of this template, one of the concerns was about understanding *how* a problem happened, not just how a CA responded. This is why it includes text such as "This may include events before the incident was reported, such as when a particular requirement became applicable, or a document changed, or a bug was introduced, or an audit was done." 1) When were the policy templates introduced We are using Verizon UniCERT PKI software. Policy or templates are integral part of the software and they exists there all along. 2) When were the policy templates reviewed All policies/templates were reviewed right after the incident occurred. We have also added procedural step for periodic certificate policy templates validation. 3) What are the templates review practices. We have added dual CAO control for modifying policy template which requires the presence of 2 CAO's (Certification Authority Operators) All policies/templates are reviewed against the purpose of given policy and CP/CPS. 4) What controls, if any, exist to ensure that all templates are appropriate to the controls? We have started process of implementing pre-issuance linting just after email pointing our misissuance. We have requested pre-issuance linting functionality/patch with high priority from Verizon UniCERT. We will implement post-issuance linting with crt.sh as well. Best regards, Piotr Grabowski ________________________________ Od: Ryan Sleevi <[email protected]> Wysłane: wtorek, 9 października 2018 02:25:27 Do: Grabowski Piotr DW: mozilla-dev-security-policy Temat: Re: 46 Certificates issued with BR violations (KIR) On Mon, Oct 8, 2018 at 11:25 AM piotr.grabowski--- via dev-security-policy <[email protected]<mailto:[email protected]>> wrote: Here's the incident report: 1. How your CA first became aware of the problem (e.g. via a problem report submitted to your Problem Reporting Mechanism, via a discussion in mozilla.dev.security.policy, or via a Bugzilla bug), and the date. Email from Wayne Thayer Oct 1, 2018 2. A timeline of the actions your CA took in response. A. Oct 2, 2018 - Investigation began. B. Oct 4, 2018 - Found impacted certificate policy templates. C Oct 4, 2018 - All the certificates owners were contacted and agreed on issuance new BR compliant certificates in time convenient for them, preferably not later than by the end of this year and revocation current ones. D. Oct 8, 2018 - Fixed impacted certificate policy templates. E. Oct 8, 2018 - This disclosure. Can you please re-review https://wiki.mozilla.org/CA/Responding_To_An_Incident#Incident_Report ? In the design of this template, one of the concerns was about understanding *how* a problem happened, not just how a CA responded. This is why it includes text such as "This may include events before the incident was reported, such as when a particular requirement became applicable, or a document changed, or a bug was introduced, or an audit was done." 1) When were the policy templates introduced 2) When were the policy templates reviewed 3) What are the templates review practices 4) What controls, if any, exist to ensure that all templates are appropriate to the controls? The misconfiguration of certificate policy templates is a significant incident, precisely because there have been significant CA misissuances as a result of it. In this regard, a CA that is misconfiguring policy templates is arguably as negligent as one failing to perform domain validation - this is an incredibly significant mistake by a CA. A responsible CA seeking continued trust in their certificates would thus want to demonstrate that they understood how significant this was, and provide detailed descriptions about the timeline of events and the controls and practices they have in place to mitigate the risk of template misconfiguration. Anything short of that is gross negligence on behalf of a CA. [logo] Krajowa Izba Rozliczeniowa S.A., zarejestrowana w Sądzie Rejonowym dla m. st. Warszawy, XIII Wydział Gospodarczy Krajowego Rejestru Sądowego pod nr KRS 0000113064, NIP 526-030-05-17, REGON 012105474, kapitał zakładowy i wpłacony 5.445.000 zł Informacja zawarta w tej korespondencji jest przeznaczona tylko dla osoby lub jednostki, do której jest adresowana. Może ona zawierać zastrzeżone i poufne informacje i jeżeli to nie Państwo są wskazanym odbiorcą, nie można kopiować, rozpowszechniać lub podejmować żadnych czynności w oparciu o nią. W przypadku otrzymania tej korespondencji przez pomyłkę, proszę powiadomić nadawcę za pomocą emaila zwrotnego i usunąć tę korespondencję (wraz z załącznikami) z Państwa systemu. The information contained in this transmission is intended only for the individual or entity to whom it is addressed. It may contain privileged and confidential information and if you are not an indicated recipient, you must not copy, distribute or take any action in reliance on it. If received in error, please notify the sender by return email and delete his transmission (and any attachments) from your system. _______________________________________________ dev-security-policy mailing list [email protected] https://lists.mozilla.org/listinfo/dev-security-policy

