Attacks/Breaches

9/20/2011
04:42 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

DigiNotar Hacked Out Of Business

Doomed certificate authority files for bankruptcy, and industry looks for answers on preventing more CA hacks

Say goodbye to certificate authority DigiNotar: The beleaguered Dutch CA has filed for bankruptcy in the wake of the recent massive breach at the firm, its parent company VASCO Security said today, and has exited the CA business altogether. While the demise of DigiNotar comes as no real surprise given the chain of events that have transpired since it was first learned the CA had been hacked, its downfall has ignited debate over what can be done to prevent digital certificate disasters in the future.

There's no easy way to ensure CAs don't get hacked, or that one is more trustworthy than another if they pass their audits. But there is a way to discourage CA hacks altogether, says Roel Schouwenberg, senior antivirus researcher for Kaspersky Lab: Browser vendors could store a whitelist of proper certificates for the top 10 or 20 targets of cyberespionage, such as Facebook, Gmail, Yahoo, and Tor, as well as any high-profile sites.

DigiNotar's hack was first exposed last month when Google's Chrome team noticed a DigiNotar-issued certificate for google.com that didn't match its internal certificate list for google.com. Schouwenberg says browser vendors could add a similar feature to their software so they could automatically confirm the legitimacy of a certificate. "You need to disincentivize actors to hack CAs. In the current system, we need to live with the fact that CAs can be hacked," he says. Adding a list of known certificates for, say, the top 20 targeted websites would give browsers the ability to vet certs before users get duped.

"Simply doing this within the browser would really disincentivize attackers," he says. "So fixing this aspect of the broken trust model is quite easy."

Revoking certificates is problematic: Not only is it difficult to remove a certificate once a CA accepts it, but when a CA's trust is revoked, there is fallout: "When you try to revoke trust for a CA, you will see major repercussions," such as with the Dutch government agencies that had certs with DigiNotar, Schouwenberg says. "It truly crippled part of the Dutch infrastructure," including hospitals, financial services, and law firms, he says.

So far, most browser vendors have blackballed DigiNotar certs in response. Mozilla took it a step further and called for CAs to beef up their security by conducting a series of security audits and steps this month.

In the wake of the DigiNotar breach, more than 500 rogue DigiNotar digital certificates were created for such high-profile domains as cia.gov, microsoft.com, Microsoft's windowsupdate.com, and mozilla.org, as well as one posing as VeriSign Root CA. In addition, more than 300,000 IP addresses, mostly in Iran, were compromised, and the hacker who breached a Comodo reseller earlier this year claimed responsibility for the DigiNotar hack.

What ultimately doomed DigiNotar was it had known about the hack for weeks before publicly acknowledging the damage.

The DigiNotar disaster, coupled with the breach targeting Comodo, have shed light on worries security researchers have had for some time about the security and ultimate trustworthiness of the existing CA model.

"I think many end users are wondering just why exactly they are trusting these CAs. In many cases these CAs are companies the end users has never heard of. Why did your Web browser blindly trust a medium-size Dutch company [that] had issued a certificate for google.com? Why did your Windows system blindly trust a medium-size Dutch vompany [that] had issued code-signing certificates under the name 'VeriSign Root CA?' It just doesn't make any sense," says Mikko Hypponen, chief research officer of F-Secure Lab.

Take the Bermudan company Quo Vadis Global, Hypponen says. You might have never heard of this root CA, but your browser inherently trusts it: "Your browsers and operating systems blindly trust any certificate issued by this company because they are a root CA. You also blindly trust any certificate issued by the Chinese government via CNNIC root CA," he says.

Meanwhile, VASCO officials maintained that the parent company's authentication technology was not compromised in the DigiNotar incident. "The technological infrastructures of VASCO and DigiNotar remain completely separated, meaning that there is no risk for infection of VASCO’s strong authentication business … We also plan to cooperate with the Dutch government in its investigation of the person or persons responsible for the attack on DigiNotar," said T. Kendall Hunt, VASCO’s chairman and CEO, in a statement.

VASCO has no plans to return to the CA business any time soon, but hopes to "integrate the PKI/identity verification technology acquired from DigiNotar into our core authentication platform. As a result, we expect to be able to offer a stronger authentication product line in the coming year to our traditional customers," Jan Valcke, president and COO of VASCO, said in a statement.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
RDP Ports Prove Hot Commodities on the Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17208
PUBLISHED: 2018-09-19
Linksys Velop 1.1.2.187020 devices allow unauthenticated command injection, providing an attacker with full root access, via cgi-bin/zbtest.cgi or cgi-bin/zbtest2.cgi (scripts that can be discovered with binwalk on the firmware, but are not visible in the web interface). This occurs because shell me...
CVE-2018-17205
PUBLISHED: 2018-09-19
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting ofproto_rule_insert__ in ofproto/ofproto.c. During bundle commit, flows that are added in a bundle are applied to ofproto in order. If a flow cannot be added (e.g., the flow action is a go-to for a group id that does not ex...
CVE-2018-17206
PUBLISHED: 2018-09-19
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding.
CVE-2018-17207
PUBLISHED: 2018-09-19
An issue was discovered in Snap Creek Duplicator before 1.2.42. By accessing leftover installer files (installer.php and installer-backup.php), an attacker can inject PHP code into wp-config.php during the database setup step, achieving arbitrary code execution.
CVE-2017-2855
PUBLISHED: 2018-09-19
An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HT...