Hi Wayne and all,

Thank you for providing this notice Wayne. I agree all CAs (particularly
those using Open MPIC + EJBCA) should immediately check their
configurations. I will say that based on confidential conversations with
Open MPIC users it is my understanding as well that there are many CAs
using the combination of EJBCA and Open MPIC.

I also wanted to provide a brief statement from the Open MPIC side:

Our group maintains the Open MPIC github repositories and we make our best
effort to ensure compliance with the Baseline Requirements for aspects that
are within the purview of the project (e.g., selection of remote
perspectives from an available set, computing correctness of challenges
seen by those perspectives etc...). We do not take responsibility for any
code or configurations outside of the project including the popular EJBCA
integration. We try to have good communication with the maintainers of that
project and are always open to ways Open MPIC can help support smooth and
compliant usage.

Also, our understanding of the issue is that it did not pertain to the
multi-perspective check itself (which was performed in a compliant manner
via Open MPIC), but was instead caused by the use of Open MPIC solely
without a corroborating primary perspective. For web PKI issuance, Open
MPIC is always intended to be used in addition to a primary perspective
that is performing Baseline-Requirement-Compliant domain control validation
and corroborating that result with Open MPIC. No code maintained by Open
MPIC is intended to be used for primary perspective domain control
validation. There are also important subtle differences between primary DCV
and the MPIC DCV (e.g., DNSSEC validation) and open MPIC does not address
this.


Best,
Henry



On Mon, Apr 6, 2026 at 10:31 AM Wayne <[email protected]> wrote:

> On 2026-04-03 SSL.com proactively published a preliminary incident report
> <https://bugzilla.mozilla.org/show_bug.cgi?id=2029230> on their use of
> EJBCA
> > An incorrect Open MPIC Lambda implementation by the EJBCA ACME service
> allowed DCV to be completed based only on the remote Network Perspectives.
>
> A security reporter had notified them early on 2026-04-02, and presumably
> have alerted other CAs. To date there's only SSL.com mentioning a report
> though.
>
> The impact is quite large, SSL.com dealt with revoking 1.7m within 24
> hours. This should be viewed as a success of the Mass Revocation Plan in
> practice.
>
> Currently only one other CA has reported having the same issue: HARICA
> <https://bugzilla.mozilla.org/show_bug.cgi?id=2029643>.
>
> There are quite a few
> <https://bugzilla.mozilla.org/buglist.cgi?longdesc_type=allwordssubstr&resolution=---&resolution=FIXED&resolution=INVALID&resolution=WONTFIX&resolution=INACTIVE&resolution=DUPLICATE&resolution=WORKSFORME&resolution=INCOMPLETE&resolution=SUPPORT&resolution=EXPIRED&resolution=MOVED&query_format=advanced&product=CA%20Program&component=CA%20Certificate%20Compliance&longdesc=ejbca&list_id=17917927&classification=Client%20Software&classification=Developer%20Infrastructure&classification=Components&classification=Server%20Software&classification=Other>
> CAs using EJBCA, I'd be surprised if it were limited to only these two CAs.
>
> Could any CA using EJBCA prioritize checking if they are impacted by this
> issue? The longer this waits, the more certificates will be impacted.
>
> - Wayne
>
> --
> You received this message because you are subscribed to the Google Groups "
> [email protected]" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> To view this discussion visit
> https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/fd9c43c1-512d-44d7-9601-bdbc61df4bcen%40mozilla.org
> <https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/fd9c43c1-512d-44d7-9601-bdbc61df4bcen%40mozilla.org?utm_medium=email&utm_source=footer>
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-security-policy/CAGxVKU4cmUKo26m7_iHu%2B15RhmiP6FrukiBvmLGQQ-O%3D4yC4aQ%40mail.gmail.com.

Reply via email to