Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

9/20/2011
04:42 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

DigiNotar Hacked Out Of Business

Doomed certificate authority files for bankruptcy, and industry looks for answers on preventing more CA hacks

Say goodbye to certificate authority DigiNotar: The beleaguered Dutch CA has filed for bankruptcy in the wake of the recent massive breach at the firm, its parent company VASCO Security said today, and has exited the CA business altogether. While the demise of DigiNotar comes as no real surprise given the chain of events that have transpired since it was first learned the CA had been hacked, its downfall has ignited debate over what can be done to prevent digital certificate disasters in the future.

There's no easy way to ensure CAs don't get hacked, or that one is more trustworthy than another if they pass their audits. But there is a way to discourage CA hacks altogether, says Roel Schouwenberg, senior antivirus researcher for Kaspersky Lab: Browser vendors could store a whitelist of proper certificates for the top 10 or 20 targets of cyberespionage, such as Facebook, Gmail, Yahoo, and Tor, as well as any high-profile sites.

DigiNotar's hack was first exposed last month when Google's Chrome team noticed a DigiNotar-issued certificate for google.com that didn't match its internal certificate list for google.com. Schouwenberg says browser vendors could add a similar feature to their software so they could automatically confirm the legitimacy of a certificate. "You need to disincentivize actors to hack CAs. In the current system, we need to live with the fact that CAs can be hacked," he says. Adding a list of known certificates for, say, the top 20 targeted websites would give browsers the ability to vet certs before users get duped.

"Simply doing this within the browser would really disincentivize attackers," he says. "So fixing this aspect of the broken trust model is quite easy."

Revoking certificates is problematic: Not only is it difficult to remove a certificate once a CA accepts it, but when a CA's trust is revoked, there is fallout: "When you try to revoke trust for a CA, you will see major repercussions," such as with the Dutch government agencies that had certs with DigiNotar, Schouwenberg says. "It truly crippled part of the Dutch infrastructure," including hospitals, financial services, and law firms, he says.

So far, most browser vendors have blackballed DigiNotar certs in response. Mozilla took it a step further and called for CAs to beef up their security by conducting a series of security audits and steps this month.

In the wake of the DigiNotar breach, more than 500 rogue DigiNotar digital certificates were created for such high-profile domains as cia.gov, microsoft.com, Microsoft's windowsupdate.com, and mozilla.org, as well as one posing as VeriSign Root CA. In addition, more than 300,000 IP addresses, mostly in Iran, were compromised, and the hacker who breached a Comodo reseller earlier this year claimed responsibility for the DigiNotar hack.

What ultimately doomed DigiNotar was it had known about the hack for weeks before publicly acknowledging the damage.

The DigiNotar disaster, coupled with the breach targeting Comodo, have shed light on worries security researchers have had for some time about the security and ultimate trustworthiness of the existing CA model.

"I think many end users are wondering just why exactly they are trusting these CAs. In many cases these CAs are companies the end users has never heard of. Why did your Web browser blindly trust a medium-size Dutch company [that] had issued a certificate for google.com? Why did your Windows system blindly trust a medium-size Dutch vompany [that] had issued code-signing certificates under the name 'VeriSign Root CA?' It just doesn't make any sense," says Mikko Hypponen, chief research officer of F-Secure Lab.

Take the Bermudan company Quo Vadis Global, Hypponen says. You might have never heard of this root CA, but your browser inherently trusts it: "Your browsers and operating systems blindly trust any certificate issued by this company because they are a root CA. You also blindly trust any certificate issued by the Chinese government via CNNIC root CA," he says.

Meanwhile, VASCO officials maintained that the parent company's authentication technology was not compromised in the DigiNotar incident. "The technological infrastructures of VASCO and DigiNotar remain completely separated, meaning that there is no risk for infection of VASCO’s strong authentication business … We also plan to cooperate with the Dutch government in its investigation of the person or persons responsible for the attack on DigiNotar," said T. Kendall Hunt, VASCO’s chairman and CEO, in a statement.

VASCO has no plans to return to the CA business any time soon, but hopes to "integrate the PKI/identity verification technology acquired from DigiNotar into our core authentication platform. As a result, we expect to be able to offer a stronger authentication product line in the coming year to our traditional customers," Jan Valcke, president and COO of VASCO, said in a statement.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5423
PUBLISHED: 2020-12-02
CAPI (Cloud Controller) versions prior to 1.101.0 are vulnerable to a denial-of-service attack in which an unauthenticated malicious attacker can send specially-crafted YAML files to certain endpoints, causing the YAML parser to consume excessive CPU and RAM.
CVE-2020-29454
PUBLISHED: 2020-12-02
Editors/LogViewerController.cs in Umbraco through 8.9.1 allows a user to visit a logviewer endpoint even if they lack Applications.Settings access.
CVE-2020-7199
PUBLISHED: 2020-12-02
A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gaining privileged access,...
CVE-2020-14260
PUBLISHED: 2020-12-02
HCL Domino is susceptible to a Buffer Overflow vulnerability in DXL due to improper validation of user input. A successful exploit could enable an attacker to crash Domino or execute attacker-controlled code on the server system.
CVE-2020-14305
PUBLISHED: 2020-12-02
An out-of-bounds memory write flaw was found in how the Linux kernel’s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat ...