EV evaluation breaks if "2.23.140.1.1" is present and the root is not enabled for it |
|||||||||
Issue descriptionThe current EV logic extracts the first EV-candidate OID (from all EV OIDs enabled for all CAs) from the leaf certificate, and then attempts to build a path for a certificate qualified for that OID. With Chrome 57, Issue 497605 was included which enabled Amazon's roots for the EV policy OID "2.23.140.1.1" (the generic CA/Browser Forum OID). As a consequence, other CAs that assert this OID in their leaf certificate as the first encoded OID will attempt to have a path built for this policy OID, and will then have it tested as to whether the root is enabled for "2.23.140.1.1" Outside of Amazon, no other CAs have been enabled for "2.23.140.1.1", so if they assert the policy OIDs in the order of: - 2.23.140.1.1 - [CA specific policy OID] Then the certificate will fail EV testing. However, if they assert - [CA specific policy OID] - 2.23.140.1.1 It will succeed, because it will use the CA-specific policy OID.
,
Mar 27 2017
,
Mar 27 2017
Assigned based on triage. Example cert attached.
,
Mar 28 2017
The following revision refers to this bug: https://chromium.googlesource.com/chromium/src.git/+/58d31a73a5143a2faee4f41fa5a2072aa8a34a9e commit 58d31a73a5143a2faee4f41fa5a2072aa8a34a9e Author: eroman <eroman@chromium.org> Date: Tue Mar 28 02:13:55 2017 De-prioritize 2.23.140.1.1 when searching for EV policy. This fixes an issue where Symantec issued certificates containing multiple EV policy OIDs were not being recognized as EV. BUG= 705285 Review-Url: https://codereview.chromium.org/2772283004 Cr-Commit-Position: refs/heads/master@{#459987} [modify] https://crrev.com/58d31a73a5143a2faee4f41fa5a2072aa8a34a9e/net/cert/cert_verify_proc_mac.cc [modify] https://crrev.com/58d31a73a5143a2faee4f41fa5a2072aa8a34a9e/net/cert/cert_verify_proc_nss.cc [modify] https://crrev.com/58d31a73a5143a2faee4f41fa5a2072aa8a34a9e/net/cert/cert_verify_proc_unittest.cc [modify] https://crrev.com/58d31a73a5143a2faee4f41fa5a2072aa8a34a9e/net/cert/cert_verify_proc_win.cc [modify] https://crrev.com/58d31a73a5143a2faee4f41fa5a2072aa8a34a9e/net/cert/ev_root_ca_metadata.cc [modify] https://crrev.com/58d31a73a5143a2faee4f41fa5a2072aa8a34a9e/net/cert/ev_root_ca_metadata.h [modify] https://crrev.com/58d31a73a5143a2faee4f41fa5a2072aa8a34a9e/net/cert/ev_root_ca_metadata_unittest.cc [modify] https://crrev.com/58d31a73a5143a2faee4f41fa5a2072aa8a34a9e/net/data/ssl/certificates/README [add] https://crrev.com/58d31a73a5143a2faee4f41fa5a2072aa8a34a9e/net/data/ssl/certificates/trustcenter.websecurity.symantec.com.pem
,
Mar 28 2017
,
Mar 28 2017
Note that Mac is not affected in the case of Symantec certificates (i.e. M57 Chrome on Mac will continue to display www.bankofamerica.com with EV indicator). (This is kind of by accident -- when parsing the EV policies it the lexicographically, and 2.23.140.1.1 is hence checked after 2.16.840.1.113733.1.7.23.6) Mac is not affected in the case of the Symantec certificates
,
Mar 28 2017
correction of typos in comment #6: "it the lexicographically" --> "it sorts them lexicographically"
,
Mar 29 2017
Your change meets the bar and is auto-approved for M58. Please go ahead and merge the CL to branch 3029 manually. Please contact milestone owner if you have questions. Owners: amineer@(Android), cmasso@(iOS), bhthompson@(ChromeOS), govind@(Desktop) For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Mar 29 2017
Hi eroman@ - any more to do here or can this be moved to Fixed?
,
Mar 29 2017
The following revision refers to this bug: https://chromium.googlesource.com/chromium/src.git/+/661879796f049b78a15c5590c367d5a6c2187697 commit 661879796f049b78a15c5590c367d5a6c2187697 Author: Eric Roman <eroman@chromium.org> Date: Wed Mar 29 15:17:33 2017 De-prioritize 2.23.140.1.1 when searching for EV policy. This fixes an issue where Symantec issued certificates containing multiple EV policy OIDs were not being recognized as EV. BUG= 705285 Review-Url: https://codereview.chromium.org/2772283004 Cr-Commit-Position: refs/heads/master@{#459987} (cherry picked from commit 58d31a73a5143a2faee4f41fa5a2072aa8a34a9e) Review-Url: https://codereview.chromium.org/2781093003 . Cr-Commit-Position: refs/branch-heads/3029@{#474} Cr-Branched-From: 939b32ee5ba05c396eef3fd992822fcca9a2e262-refs/heads/master@{#454471} [modify] https://crrev.com/661879796f049b78a15c5590c367d5a6c2187697/net/cert/cert_verify_proc_mac.cc [modify] https://crrev.com/661879796f049b78a15c5590c367d5a6c2187697/net/cert/cert_verify_proc_nss.cc [modify] https://crrev.com/661879796f049b78a15c5590c367d5a6c2187697/net/cert/cert_verify_proc_unittest.cc [modify] https://crrev.com/661879796f049b78a15c5590c367d5a6c2187697/net/cert/cert_verify_proc_win.cc [modify] https://crrev.com/661879796f049b78a15c5590c367d5a6c2187697/net/cert/ev_root_ca_metadata.cc [modify] https://crrev.com/661879796f049b78a15c5590c367d5a6c2187697/net/cert/ev_root_ca_metadata.h [modify] https://crrev.com/661879796f049b78a15c5590c367d5a6c2187697/net/cert/ev_root_ca_metadata_unittest.cc [modify] https://crrev.com/661879796f049b78a15c5590c367d5a6c2187697/net/data/ssl/certificates/README [add] https://crrev.com/661879796f049b78a15c5590c367d5a6c2187697/net/data/ssl/certificates/trustcenter.websecurity.symantec.com.pem
,
Mar 29 2017
,
Mar 29 2017
,
Mar 30 2017
Note that this bug impacts EV certs issued by other CAs as well. e.g. https://www.haikongjinrong.com https://ssl.trustwave.com
,
Mar 30 2017
Thanks, that is correct -- those are affected by the same issue. I have verified that the fix in M58 addresses those instances.
,
Jul 24
The following revision refers to this bug: https://chromium.googlesource.com/chromium/src.git/+/4ea221486494c8e4b46784b52141ba48163a49f4 commit 4ea221486494c8e4b46784b52141ba48163a49f4 Author: Nick Harper <nharper@chromium.org> Date: Tue Jul 24 09:56:16 2018 Replace certificate for multiple OID EV test CertVerifyProcInternalTest.EVVerificationMultipleOID uses a certificate from trustcenter.websecurity.symantec.com, but the test fails with the upcoming Symantec Legacy PKI distrust. This replaces the test certificate with another that has the 2.23.140.1.1 OID before 2.16.840.1.113733.1.7.23.6 in X509v3 Certificate Policies extension. Bug: 705285 , 796230 Change-Id: I0ed5d50d727a712d7c38babdb9ecfdfd30d50cc5 Reviewed-on: https://chromium-review.googlesource.com/1147665 Commit-Queue: Ryan Sleevi <rsleevi@chromium.org> Reviewed-by: Ryan Sleevi <rsleevi@chromium.org> Cr-Commit-Position: refs/heads/master@{#577471} [modify] https://crrev.com/4ea221486494c8e4b46784b52141ba48163a49f4/net/BUILD.gn [modify] https://crrev.com/4ea221486494c8e4b46784b52141ba48163a49f4/net/cert/cert_verify_proc_unittest.cc [modify] https://crrev.com/4ea221486494c8e4b46784b52141ba48163a49f4/net/data/ssl/certificates/README [add] https://crrev.com/4ea221486494c8e4b46784b52141ba48163a49f4/net/data/ssl/certificates/login.trustwave.com.pem [delete] https://crrev.com/c44f810cbe81532a80b76259d267f063a253278f/net/data/ssl/certificates/trustcenter.websecurity.symantec.com.pem |
|||||||||
►
Sign in to add a comment |
|||||||||
Comment 1 by rsleevi@chromium.org
, Mar 26 2017