Hello dev.security.policy

Apologies if I have made any mistakes in how I post, this is my first time posting here. Anyway:


I have managed to issue a certificate with a FQDN in the SAN that I do not have control of via Digicert.


The precert is here: https://crt.sh/?id=1231411316

SHA256: 651B68C520492A44A5E99A1D6C99099573E8B53DEDBC69166F60685863B390D1


I have notified Digicert who responded back with a generic response followed by the certificate being revoked through OCSP. However I believe that this should be wider investigated, since this cert was issued by me adding 69.168.110.79.in-addr.arpa to my SAN, a DNS area that I do control though reverse DNS.


When I verified 5.168.110.79.in-addr.arpa (same subdomain), I noticed that the whole of in-addr.arpa became validated on my account, instead of just my small section of it (168.110.79.in-addr.arpa at best).


To test if digicert had just in fact mis-validated a FQDN, I tested with the reverse DNS address of 192.168.1.1, and it worked and Digicert issued me a certificate with 1.1.168.192.in-addr.arpa on it.


Is there anything else dev.security.policy needs to do with this? This seems like a clear case of mis issuance. It's also not clear if in-addr.arpa should even be issuable.


I would like to take a moment to thank Ben Cartwright-Cox and igloo22225 in pointing out this violation.


Regards

Cynthia Revström

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to