On Sat, Mar 21, 2020 at 01:53:31AM +0000, Nick Lamb wrote:
> On Sat, 21 Mar 2020 09:25:26 +1100
> Matt Palmer via dev-security-policy
> <[email protected]> wrote:
>
> > These two certificates:
> >
> > https://crt.sh/?id=2602048478&opt=ocsp
> > https://crt.sh/?id=2601324532&opt=ocsp
> >
> > Were issued by Let's Encrypt more than 24 hours ago, and remain
> > unrevoked, despite the revocation of the below two certificates,
> > which use the same private key, for keyCompromise prior to the above
> > two certificates being issued:
> >
> > https://crt.sh/?id=2602048478&opt=ocsp
> > https://crt.sh/?id=2599226028&opt=ocsp
> >
> > As per recent discussions here on m.d.s.p, I believe this is a breach
> > of BR s4.9.1.1.
>
> I haven't looked at the substance of your concern yet, but the 1st and
> 3rd links you gave above both look identical to me whereas your text
> implies they should differ. Perhaps this is a copy-paste error?
Oh the facepalm, it burns (probably too much hand sanitizer)... let me try
that again.
Recently issued and as-yet-unrevoked certificate, the first:
https://crt.sh/?id=2602048478&opt=ocsp
Previously revoked certificate for the same key:
https://crt.sh/?id=2599363087&opt=ocsp
Recently issued and as-yet-unrevoked certificate, the second:
https://crt.sh/?id=2601324532&opt=ocsp
Previously revoked certificate for the same key:
https://crt.sh/?id=2599226028&opt=ocsp
I've also, since my initial report, come across some more keys that have
been successfully re-used by Let's Encrypt customers after being revoked for
key compromise. You can pull the details out of the recent history:
https://crt.sh/?spkisha256=c5b2c5acc5a35409cb18c7f820b93a3d53e2fd17d99df165875881d60ff91ca2
https://crt.sh/?spkisha256=35e61785dc449d235568dc5919f9f4bca31a234f0768e6c057f1d9e39491d76d
https://crt.sh/?spkisha256=bb84a7d81dafd4e59877bb31595545eb5a205a4cc7db881b027fa499c5086c1c
There's also this one, which is another reuse-after-revocation, but the
prior history of this key suggests that there's something *far* more
interesting going on, given the variety of CAs and domain names it has been
used for (and its current residence, on a Taiwanese traffic stats server):
https://crt.sh/?spkisha256=69fc5edbd904577629121b09c49b711e201c46213e5b175bbee08a4d1d30b3c7
If anyone figures out the story with that last key, I'd be most pleased to
hear about it.
- Matt
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy